	{"id":92411,"date":"2020-10-29T02:34:20","date_gmt":"2020-10-29T09:34:20","guid":{"rendered":"https:\/\/www.intego.com\/mac-security-blog\/?p=92411"},"modified":"2024-06-06T15:37:08","modified_gmt":"2024-06-06T22:37:08","slug":"how-quantum-computing-will-affect-computer-security-and-passwords","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/how-quantum-computing-will-affect-computer-security-and-passwords\/","title":{"rendered":"How Quantum Computing Will Affect Computer Security and Passwords"},"content":{"rendered":"<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-92429\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2020\/10\/quantum-600.png\" alt=\"\" width=\"1200\" height=\"533\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2020\/10\/quantum-600.png 1200w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2020\/10\/quantum-600-300x133.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2020\/10\/quantum-600-1024x455.png 1024w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2020\/10\/quantum-600-150x67.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2020\/10\/quantum-600-768x341.png 768w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2020\/10\/quantum-600-657x292.png 657w\" sizes=\"(max-width: 1200px) 100vw, 1200px\" \/><\/p>\n<p>One of the key elements in securing our data and our identities is the use of strong passwords. Using passwords that can&#8217;t be guessed\u2014unlike the perennial favorites <em>123456<\/em> or <em>password<\/em>\u2014helps ensure that hackers and cybercriminals can&#8217;t access your computer, mobile device, or websites where you&#8217;ve created accounts, and can&#8217;t steal your identity to pretend to be you, or empty your bank account.<\/p>\n<p>Simple passwords can be <em>cracked<\/em> using brute force; this is where an attacker uses tools that try every possible password until the correct one is found. This generally done using a <em>dictionary attack<\/em>, where an attacker will try known passwords and words until they find the one that unlocks an account. There are databases available on the internet that contain personal names as well as dictionary and slang words, in scores of languages, along with passwords found in data breaches, and more. One such database that I found through a simple web search contains 1.4 billion entries.<\/p>\n<p>But many people use unique, random passwords, such as m3*9V-jh&amp;3W (which I just generated with my password manager), and these passwords are generally not found in databases\u2014unless you use them for multiple websites, and one of those sites has been breached. (This is why you should never reuse the same password for more than one account.) Cracking this sort of password requires much more computing power. Estimates vary, but, as an example, cracking the password above would take a couple hundred thousand years using a standard computer, or a few years using a supercomputer or botnet.<\/p>\n<p>But what will happen when quantum computers become more common? These passwords could be cracked in minutes, or even seconds.<\/p>\n<h3>The evolution of computing speed<\/h3>\n<p>As computers get faster, tasks of this sort will be easier. It&#8217;s hard to compare the speeds of computers over time. My first Mac, a PowerBook 100, had a 16 MHz processor; my current iMac has a 3.6 GHz processor, and that theoretically makes it about 225 times as fast.<\/p>\n<p>In reality, though, raw speed isn&#8217;t everything; you need to factor in the increased efficiency of the CPU itself, as well as all the other elements that make computing fast: the disk or SSD, the amount and speed of RAM, and the input\/output (I\/O) bus that gets data to and from the processors. And with advanced GPUs (graphics processing units) and coprocessors like <a href=\"https:\/\/support.apple.com\/en-us\/HT208862\" target=\"_blank\" rel=\"noopener noreferrer\">Apple&#8217;s T2 chip<\/a>, the amount of computing time can be further reduced for certain tasks.<\/p>\n<p>There&#8217;s no easy way to reliably measure the difference, but my current iMac is roughly thousands of times as fast as that PowerBook, a huge increase over thirty years.<\/p>\n<p>While this has been an exponential increase in raw speed, all this will change with quantum computing. The speed difference between today&#8217;s fastest computers and a future quantum computer is several orders of magnitude. Google&#8217;s current quantum computer is 100 million times as fast as any standard computer, and <a href=\"https:\/\/ai.googleblog.com\/2019\/10\/quantum-supremacy-using-programmable.html\">Google claims<\/a> that its computer achieved &#8220;quantum supremacy,&#8221; that it took only 200 seconds to perform a task that would require the world&#8217;s fastest supercomputer 10,000 years to calculate. (There&#8217;s a lot of disagreement in the quantum computing world; <a href=\"https:\/\/www.ibm.com\/blogs\/research\/2019\/10\/on-quantum-supremacy\/\">IBM claims<\/a> that this task would only take 2.5 days for a classical computer.)<\/p>\n<p>This is leading to a race to determine whether passwords and encryption can keep up with these new tools. &#8220;Quantum computers are believed to be able to solve certain computational problems, such as integer factorization (which underlies RSA encryption), substantially faster than classical computers,&#8221; says <a href=\"https:\/\/en.wikipedia.org\/wiki\/Quantum_computing\">the Wikipedia article on quantum computing<\/a>. The field of <a href=\"https:\/\/en.wikipedia.org\/wiki\/Quantum_cryptography\">quantum cryptography<\/a> is progressing with the goal of using quantum computing to encrypt data, and <a href=\"https:\/\/en.wikipedia.org\/wiki\/Post-quantum_cryptography\">post-quantum cryptography<\/a> is examining ways to ensure encryption that can resist the brute-force strength of quantum computers.<\/p>\n<h3>Size matters<\/h3>\n<p>The length of passwords is a key element in their security, as is the number of characters available to use for the password. A four-digit PIN, for example, is relatively trivial to crack; there are only 10,000 possibilities (0000 through 9999). Even with a six-digit passcode, there are only 1 million possibilities (<a href=\"https:\/\/www.youtube.com\/watch?v=def3eBH-vWI\" target=\"_blank\" rel=\"noopener noreferrer\">000000<\/a> through 999999). In both cases, most people tend to use predictable patterns such as dates (birthdates, anniversaries, etc.).<\/p>\n<p>If you add letters onto that six-character password, however, then it becomes much harder to crack. Add symbols and other special characters, and it gets more difficult by several orders of magnitude. Every increase in length<span style=\"font-family: -apple-system, BlinkMacSystemFont, 'Segoe UI', Roboto, Oxygen-Sans, Ubuntu, Cantarell, 'Helvetica Neue', sans-serif;\">\u00a0<\/span><span style=\"font-family: -apple-system, BlinkMacSystemFont, 'Segoe UI', Roboto, Oxygen-Sans, Ubuntu, Cantarell, 'Helvetica Neue', sans-serif;\">exponentially<\/span><span style=\"font-family: -apple-system, BlinkMacSystemFont, 'Segoe UI', Roboto, Oxygen-Sans, Ubuntu, Cantarell, 'Helvetica Neue', sans-serif;\">\u00a0raises the amount of time needed to crack a password.<\/span><\/p>\n<p>I&#8217;m not very good at math, but <a href=\"https:\/\/www.scientificamerican.com\/article\/the-mathematics-of-hacking-passwords\/\">this Scientific American article gives some examples<\/a>. A six-character password using only lowercase letters could take a fraction of a second, but a 12-letter password could take more than 26,000 computing hours. Increase the number of possible characters (by adding uppercase letters, digits, special characters, etc.) to 100, and this could take 27 million computing hours.<\/p>\n<p>Of course, using quantum computing to crack passwords would massively reduce all those lengths of time. Passwords that might be nontrivial to break today could become trivial to break as soon as quantum computers are designed to tackle that specific task.<\/p>\n<h3>Key length also matters<\/h3>\n<p>While a quantum computer may be able to crack today&#8217;s encryption (which often uses a 128- or 256-bit key length), even using a much longer key\u2014which, as with passwords, increases the difficulty exponentially\u2014could still potentially be crackable. <a href=\"https:\/\/www.technologyreview.com\/2019\/05\/30\/65724\/how-a-quantum-computer-could-break-2048-bit-rsa-encryption-in-8-hours\/\">One study suggests<\/a> that encryption using a 2048-bit key could be cracked in 8 hours using a quantum computer.<\/p>\n<p>While 128- and 256-bit encryption keys may be sufficient for now, the reason we don&#8217;t often use longer keys is the amount of processing required on the devices doing the encryption and decryption. But as the processing power of standard devices increases, we may eventually see encryption key lengths increase, to try to keep up with the power of potential attackers.<\/p>\n<p>Considering that 128-bit keys were commonly considered &#8220;military grade&#8221; by the U.S. government way back in the 1990s, and processing technology has come a long way since then, it&#8217;s reasonable to assume that most devices nowadays should be able to handle much longer keys and more robust encryption algorithms.<\/p>\n<h3>Moore&#8217;s law vs. Neven&#8217;s law<\/h3>\n<p><a href=\"https:\/\/en.wikipedia.org\/wiki\/Moore%27s_law\" target=\"_blank\" rel=\"noopener noreferrer\">Moore&#8217;s law<\/a> has long said that computing power doubled every two years, and since it was posited, it has been more or less true. But now <a href=\"https:\/\/community.hitachivantara.com\/s\/article\/moores-law-is-replaced-by-nevens-law-for-quantum-computing\">Neven&#8217;s law suggests that computing power will start growing at a doubly exponential rate<\/a>. Under Moore&#8217;s law, computing power over ten two-year periods would increase from 1 to 1024 (2, 4, 8, 16, 32, etc.); Neven&#8217;s law is doubly exponential (2, 4, 16, 256, 65,536, etc.), and it says that increase over ten years would be 1.797693134862315907729305190789e+308, or 2 to the 1024th power, a number so large that it&#8217;s hard to comprehend.<\/p>\n<p>Don&#8217;t worry about this happening any time soon. Sure, quantum computers are working in labs and research centers, but we&#8217;re probably a long way from them becoming common. The real worry is for national security, since nation states may have these computers and use them to try to crack encryption of other countries, or of dissidents. But they may want to use them on their citizens, so using the strongest possible password is still the best approach users can take for now.<\/p>\n<p>As for the future of passwords, new techniques will have to be developed, extending the use of multifactor authentication, using more advanced biometrics (such as Touch ID and Face ID), and <a href=\"https:\/\/thenextweb.com\/security\/2020\/10\/09\/inside-fido-alliances-vision-of-a-future-free-of-passwords\/\">other techniques<\/a>. Perhaps quantum computing will lead to the demise of the password altogether.<\/p>\n<h3>How can I learn more?<\/h3>\n<p><a href=\"https:\/\/podcasts.apple.com\/us\/podcast\/intego-mac-podcast\/id1293834627\" target=\"_blank\" rel=\"noopener noreferrer\"><img loading=\"lazy\" class=\"alignright size-thumbnail wp-image-71818\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/10\/ios9-podcasts-app-tile-150x150.png\" sizes=\"(max-width: 50px) 100vw, 50px\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/10\/ios9-podcasts-app-tile-150x150.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/10\/ios9-podcasts-app-tile-32x32.png 32w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/10\/ios9-podcasts-app-tile-50x50.png 50w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/10\/ios9-podcasts-app-tile-64x64.png 64w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/10\/ios9-podcasts-app-tile-96x96.png 96w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/10\/ios9-podcasts-app-tile-128x128.png 128w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/10\/ios9-podcasts-app-tile.png 300w\" alt=\"\" width=\"50\" height=\"50\" data-pagespeed-url-hash=\"2337344131\" \/><\/a>We discussed quantum computing\u00a0on episode 159 of the <a href=\"https:\/\/podcast.intego.com\/\"><strong>Intego Mac Podcast<\/strong><\/a>. Be sure to <a href=\"https:\/\/podcasts.apple.com\/us\/podcast\/intego-mac-podcast\/id1293834627\" rel=\"noopener\">subscribe<\/a> to make sure you don\u2019t miss any episodes. You\u2019ll also want to subscribe to our <strong>e-mail newsletter<\/strong> and keep an eye here on <strong>The Mac Security Blog<\/strong> for the latest Apple security and privacy news.<\/p>\n<p><iframe loading=\"lazy\" src=\"https:\/\/player.fireside.fm\/v2\/GegHgcrH+c3BWSYtp?theme=dark\" width=\"740\" height=\"200\" frameborder=\"0\" scrolling=\"no\"><\/iframe><\/p>\n<p>You can also follow Intego on your favorite social and media channels: <a href=\"https:\/\/www.facebook.com\/Intego\" target=\"_blank\" rel=\"noopener noreferrer\">Facebook<\/a>, <a href=\"https:\/\/www.instagram.com\/intego_security\/\" target=\"_blank\" rel=\"noopener noreferrer\">Instagram<\/a>, <a href=\"https:\/\/twitter.com\/IntegoSecurity\" target=\"_blank\" rel=\"noopener noreferrer\">Twitter<\/a>, and <a href=\"https:\/\/www.youtube.com\/user\/IntegoVideo?sub_confirmation=1\" target=\"_blank\" rel=\"noopener noreferrer\">YouTube<\/a> (click the \ud83d\udd14 to get notified about new videos).<\/p>\n<p><span style=\"font-size: x-small;\">Image credits (via <a href=\"https:\/\/ai.googleblog.com\/2019\/10\/quantum-supremacy-using-programmable.html\" target=\"_blank\" rel=\"noopener noreferrer\">Google AI Blog<\/a>): Artist&#8217;s rendition of the Sycamore processor mounted in the cryostat (<a href=\"https:\/\/1.bp.blogspot.com\/-CmGPCx78J7U\/XbC8L7QzW_I\/AAAAAAAAE14\/fWozhMAgTB0W95MP-rbirIF_Pw08Tb7GgCLcBGAsYHQ\/s1600\/Google_Quantum_Nature_cover_art_small.png\" target=\"_blank\" rel=\"noopener noreferrer\">Full Res Version<\/a>; Forest Stearns, Google AI Quantum Artist in Residence); Photograph of Google&#8217;s Sycamore processor (<a href=\"https:\/\/1.bp.blogspot.com\/-4pbQ6nBDyxY\/XbC8MHKgTCI\/AAAAAAAAE10\/wu0JGYKYZ-wyCUIQRTvYt2PGzCPKmHsrACLcBGAsYHQ\/s1600\/Google_Quantum_Nature_cover_art_Sycamore_device_small.png\" target=\"_blank\" rel=\"noopener noreferrer\">Full Res Version<\/a>; Erik Lucero, Research Scientist and Lead Production Quantum Hardware).<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Quantum computing promises exponential increases is the speed and power of computers, but will also make passwords and encryption easier to crack.<\/p>\n","protected":false},"author":46,"featured_media":92430,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[13],"tags":[273,96,4600,319],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"Quantum computing promises exponential increases is the speed and power of computers, but will also make passwords and encryption easier to crack.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/how-quantum-computing-will-affect-computer-security-and-passwords\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How Quantum Computing Will Affect Computer Security and Passwords - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"Quantum computing promises exponential increases is the speed and power of computers, but will also make passwords and encryption easier to crack.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/how-quantum-computing-will-affect-computer-security-and-passwords\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2020-10-29T09:34:20+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-06-06T22:37:08+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2020\/10\/quantum-400.png\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Kirk McElhearn\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/how-quantum-computing-will-affect-computer-security-and-passwords\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2020\/10\/quantum-400.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2020\/10\/quantum-400.png\",\"width\":400,\"height\":260},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/how-quantum-computing-will-affect-computer-security-and-passwords\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/how-quantum-computing-will-affect-computer-security-and-passwords\/\",\"name\":\"How Quantum Computing Will Affect Computer Security and Passwords - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/how-quantum-computing-will-affect-computer-security-and-passwords\/#primaryimage\"},\"datePublished\":\"2020-10-29T09:34:20+00:00\",\"dateModified\":\"2024-06-06T22:37:08+00:00\",\"description\":\"Quantum computing promises exponential increases is the speed and power of computers, but will also make passwords and encryption easier to crack.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/how-quantum-computing-will-affect-computer-security-and-passwords\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/how-quantum-computing-will-affect-computer-security-and-passwords\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/how-quantum-computing-will-affect-computer-security-and-passwords\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How Quantum Computing Will Affect Computer Security and Passwords\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/how-quantum-computing-will-affect-computer-security-and-passwords\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/how-quantum-computing-will-affect-computer-security-and-passwords\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/a27d67016ab454807cd0c055fc28bb09\"},\"headline\":\"How Quantum Computing Will Affect Computer Security and Passwords\",\"datePublished\":\"2020-10-29T09:34:20+00:00\",\"dateModified\":\"2024-06-06T22:37:08+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/how-quantum-computing-will-affect-computer-security-and-passwords\/#webpage\"},\"wordCount\":1362,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/how-quantum-computing-will-affect-computer-security-and-passwords\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2020\/10\/quantum-400.png\",\"keywords\":[\"Encryption\",\"Passwords\",\"Quantum Computing\",\"Security\"],\"articleSection\":[\"Security &amp; Privacy\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/how-quantum-computing-will-affect-computer-security-and-passwords\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/a27d67016ab454807cd0c055fc28bb09\",\"name\":\"Kirk McElhearn\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/9ffd73df6063179d7cdcb79109ff0a2d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/9ffd73df6063179d7cdcb79109ff0a2d?s=96&d=mm&r=g\",\"caption\":\"Kirk McElhearn\"},\"description\":\"Kirk McElhearn has been writing about Apple product and computer security for more than 25 years. His blog, Kirkville, links to his work. He is co-host of the Intego Mac Podcast, as well as several other podcasts, and is a regular contributor to The Mac Security Blog, TidBITS, and several other websites and publications. Kirk has written more than two dozen books, including Take Control books about Apple's media apps, Scrivener, and LaunchBar. Follow him on Bluesky at @kirkville.com.\",\"sameAs\":[\"http:\/\/www.kirkville.com\"],\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/kirk-mcelhearn\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"Quantum computing promises exponential increases is the speed and power of computers, but will also make passwords and encryption easier to crack.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/how-quantum-computing-will-affect-computer-security-and-passwords\/","og_locale":"en_US","og_type":"article","og_title":"How Quantum Computing Will Affect Computer Security and Passwords - The Mac Security Blog","og_description":"Quantum computing promises exponential increases is the speed and power of computers, but will also make passwords and encryption easier to crack.","og_url":"https:\/\/www.intego.com\/mac-security-blog\/how-quantum-computing-will-affect-computer-security-and-passwords\/","og_site_name":"The Mac Security Blog","article_published_time":"2020-10-29T09:34:20+00:00","article_modified_time":"2024-06-06T22:37:08+00:00","og_image":[{"width":400,"height":260,"url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2020\/10\/quantum-400.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Kirk McElhearn","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/how-quantum-computing-will-affect-computer-security-and-passwords\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2020\/10\/quantum-400.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2020\/10\/quantum-400.png","width":400,"height":260},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/how-quantum-computing-will-affect-computer-security-and-passwords\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/how-quantum-computing-will-affect-computer-security-and-passwords\/","name":"How Quantum Computing Will Affect Computer Security and Passwords - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/how-quantum-computing-will-affect-computer-security-and-passwords\/#primaryimage"},"datePublished":"2020-10-29T09:34:20+00:00","dateModified":"2024-06-06T22:37:08+00:00","description":"Quantum computing promises exponential increases is the speed and power of computers, but will also make passwords and encryption easier to crack.","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/how-quantum-computing-will-affect-computer-security-and-passwords\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/how-quantum-computing-will-affect-computer-security-and-passwords\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/how-quantum-computing-will-affect-computer-security-and-passwords\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"How Quantum Computing Will Affect Computer Security and Passwords"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/how-quantum-computing-will-affect-computer-security-and-passwords\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/how-quantum-computing-will-affect-computer-security-and-passwords\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/a27d67016ab454807cd0c055fc28bb09"},"headline":"How Quantum Computing Will Affect Computer Security and Passwords","datePublished":"2020-10-29T09:34:20+00:00","dateModified":"2024-06-06T22:37:08+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/how-quantum-computing-will-affect-computer-security-and-passwords\/#webpage"},"wordCount":1362,"commentCount":0,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/how-quantum-computing-will-affect-computer-security-and-passwords\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2020\/10\/quantum-400.png","keywords":["Encryption","Passwords","Quantum Computing","Security"],"articleSection":["Security &amp; Privacy"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/how-quantum-computing-will-affect-computer-security-and-passwords\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/a27d67016ab454807cd0c055fc28bb09","name":"Kirk McElhearn","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/9ffd73df6063179d7cdcb79109ff0a2d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9ffd73df6063179d7cdcb79109ff0a2d?s=96&d=mm&r=g","caption":"Kirk McElhearn"},"description":"Kirk McElhearn has been writing about Apple product and computer security for more than 25 years. His blog, Kirkville, links to his work. He is co-host of the Intego Mac Podcast, as well as several other podcasts, and is a regular contributor to The Mac Security Blog, TidBITS, and several other websites and publications. Kirk has written more than two dozen books, including Take Control books about Apple's media apps, Scrivener, and LaunchBar. Follow him on Bluesky at @kirkville.com.","sameAs":["http:\/\/www.kirkville.com"],"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/kirk-mcelhearn\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2020\/10\/quantum-400.png","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-o2v","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/92411"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/46"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=92411"}],"version-history":[{"count":9,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/92411\/revisions"}],"predecessor-version":[{"id":92774,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/92411\/revisions\/92774"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/92430"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=92411"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=92411"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=92411"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}