Hacker News: Looking at some claims that quantum computers won’t work

Source URL: https://blog.cr.yp.to/20250118-flight.html
Source: Hacker News
Title: Looking at some claims that quantum computers won’t work

Feedly Summary: Comments

AI Summary and Description: Yes

Summary: The text discusses the ongoing debate about the necessity and feasibility of upgrading to post-quantum cryptography, particularly in light of arguments against the effectiveness of quantum computers. It highlights both the barriers to adoption and the growing examples of successful quantum cryptography deployment.

Detailed Description:
The text presents a critical analysis of the common arguments against investing in post-quantum cryptography (PQC). The author surveys various claims that discourage organizations from upgrading their systems and counters them with evidence and examples that support the transition to PQC. Below are some major points highlighted in the text:

– **Cost and Complexity Arguments**:
– Many voices in the tech community argue that transitioning to PQC is akin to the most significant cybersecurity shift to date, creating apprehension around its feasibility.
– The author emphasizes that similar past upgrades in technology prove that effective implementation is achievable and not overly complicated, citing successful adoptions by tools like OpenSSH and major tech firms like Google and Cloudflare.

– **Skepticism About Quantum Computers**:
– The author examines skepticism surrounding the actual effectiveness of quantum computers, highlighting various claims asserting that these machines are unlikely to function as theorized in the near future.
– By providing historical context, the author critiques those who dismiss pqcrypto advancements as merely hype, arguing that underestimating technological progress could lead to perilous shortcomings in security.

– **Arguments Addressed**:
– **Exponential Energy Argument**: Debunks claims suggesting that quantum computing requires exponential energy resources, asserting that current literature explains how PQC can be achieved with polynomial resource requirements.
– **Peer Pressure Tactics**: The author critiques those who rely on social dynamics to influence decisions about PQC, advocating for decisions grounded in evidence rather than trends.

– **Visibility and Spending Concerns**:
– Addresses the argument that quantum computing progress will be visible well in advance, positing that critical confidential data could be at risk long before any warning signals are apparent.
– The author questions whether the vast public investments compared to potential secret government funding indicate a lack of competitive edge.

– **Practical Perspectives**:
– The availability of easily-integrated PQC solutions, such as PQConnect and API support through libraries, is stressed, suggesting that technological readiness is already here for organizations willing to adapt.
– The historical examples given throughout demonstrate the potential risk of procrastinating in the adoption of PQC.

In summary, the text is pertinent to the fields of information security and encryption, particularly as they relate to emerging quantum technologies. It provides compelling arguments for why organizations should actively engage in the adoption of post-quantum cryptographic methodologies rather than delay or dismiss their necessity based on current skepticism and perceived barriers.