{"id":10750,"date":"2015-12-08T09:00:11","date_gmt":"2015-12-08T14:00:11","guid":{"rendered":"https:\/\/www.kaspersky.com\/blog\/?p=10750"},"modified":"2019-11-15T07:00:22","modified_gmt":"2019-11-15T12:00:22","slug":"prepare-to-quantim-computers-reality","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com\/blog\/prepare-to-quantim-computers-reality\/10750\/","title":{"rendered":"Quantum computers: what does it mean for you today?"},"content":{"rendered":"<p>Quantum computers are said to be coming quite soon and will change the world forever. While that phrase would typically mean a revolution in physics and medicine, the change which is undoubtfully hanging in the air is the change of the information security paradigm.<\/p>\n<p>The discussions surrounding <a href=\"https:\/\/en.wikipedia.org\/wiki\/Quantum_computing\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">quantum computers<\/a>, which are able \u2014 among other things \u2014 to <a href=\"https:\/\/en.wikipedia.org\/wiki\/Quantum_computing\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">quickly decrypt ciphers<\/a>, have been going on for decades. The idea remained a utopian concept upheld by scientists and did not crystalize in any realistic tech elaboration.<\/p>\n<p>Now we have reached the tipping point. In August the US National Security Agency (NSA) issued a new edition of its security <a href=\"https:\/\/threatpost.com\/nsas-divorce-from-ecc-causing-crypto-hand-wringing\/115150\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">recommendations<\/a> for the industry. Ironically the NSA, notorious for its pervasive wide-scale surveillance methods, at the same time performs a completely opposite function in this regard.<\/p>\n<p>The organization is designed to maintain secrecy of the critical and classified state-relevant information and propose recommendations on the most preferable and efficient encryption methods and other means on information protection to state organizations and private users. The major change which fueled the discussion on quantum computers was the agency\u2019s decision to move away from the recommended crypto standard, known as SUITE B.<\/p>\n<p>The NSA explains this decision by citing recent physics and technology breakthroughs evolving at a much faster pace than was previously assumed. The agency states, that practical quantum computers might become a reality quite soon, weakening existing systems based on encryption, digital signatures, or key exchange and making them vulnerable to the new generation of attacks.<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">Do you know what <a href=\"https:\/\/twitter.com\/hashtag\/quantum?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#quantum<\/a>   <a href=\"https:\/\/twitter.com\/hashtag\/cryptography?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#cryptography<\/a>  is? Find out over at Kaspersky Daily! <a href=\"http:\/\/t.co\/y7JJ4bieTW\" target=\"_blank\" rel=\"noopener nofollow\">http:\/\/t.co\/y7JJ4bieTW<\/a><\/p>\n<p>\u2014 Kaspersky (@kaspersky) <a href=\"https:\/\/twitter.com\/kaspersky\/status\/387315248438710272?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">October 7, 2013<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>To put it simply, the NSA revoked previous recommendations on ciphers and encryption algorithms but has not introduced the new ones, suggesting that users caught in limbo wait for some time until the next iteration of their recommendations are published. The latest recommendations are nowhere near, so while we are stuck in the waiting room, let\u2019s ponder over possible development and outcomes of the quantum revolution.<\/p>\n<h3>In theory<\/h3>\n<p>Website certificates, software digital signatures, encrypted communication in web banking tools, instant messengers and other commodity apps all rely on a couple of relevantly simple math tricks.<\/p>\n<p>Each of these use cases employs the principle of cryptography based on asymmetric keys. This means that the processes of ciphering and deciphering are performed via a pair of \u2018mathematically\u2019 connected keys, with the encryption key being publicly known and the decryption key available to the sole owner (a bank, an app developer, etc).<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">Crypto: a breakdown in the reliability of current standards &amp; need of \u2018post-quantum cryptography\u2019  <a href=\"https:\/\/twitter.com\/hashtag\/KL2016Prediction?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#KL2016Prediction<\/a> <a href=\"https:\/\/t.co\/B7EodEKlPM\" target=\"_blank\" rel=\"noopener nofollow\">https:\/\/t.co\/B7EodEKlPM<\/a><\/p>\n<p>\u2014 Kaspersky (@kaspersky) <a href=\"https:\/\/twitter.com\/kaspersky\/status\/666685666202427392?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">November 17, 2015<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>This math trick presupposes that while the public key is known, the private key cannot be calculated in an adequate period of time. Here is where the upcoming quantum computers become a serious problem. Where today\u2019s average computer would spend thousands of years to calculate a particularly long succession of numbers the private key essentially is, a quantum computer would process this heavy load in a matter of minutes.<\/p>\n<p>Is it a realistic threat to us? Well, the potential game change is massive. All online correspondence would lose their privacy, so an adversary would have no problem posing as a major bank or even the almighty Apple, as there would be no adequate means of confirming identity online. \u2018The end is nigh,\u2019 a pessimist would say. I \u2013 being an utter optimist \u2013 would respond: \u2018Well, this threat is so superficial. There have to be much more of them!\u2019<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">David Cameron against <a href=\"https:\/\/twitter.com\/hashtag\/Encryption?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#Encryption<\/a>: <a href=\"https:\/\/t.co\/fJFAsdGb9v\" target=\"_blank\" rel=\"noopener nofollow\">https:\/\/t.co\/fJFAsdGb9v<\/a><\/p>\n<p>\u2014 Kaspersky (@kaspersky) <a href=\"https:\/\/twitter.com\/kaspersky\/status\/556126249362653184?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">January 16, 2015<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<h3>The Scientific Monitor<\/h3>\n<p>Until recently, folks who would get worried about the above mentioned possibility, could enjoy untroubled sleep. Researchers working on quantum computing faced two fundamental problems. First, the state of the quantum system (meaning, the solution of the math problem) was hard to calculate.<\/p>\n<p>Second, the so-called \u2018qubits\u2019 (or \u2018quantum bits\u2019) are very unstable and hard to keep in a stable state: with more qubits, the system becomes more unstable. That means, the existing quantum computers are based on two to four qubits, whereas the task of cracking today\u2019s crypto systems requires hundreds or even thousands of qubits!<\/p>\n<div id=\"attachment_10754\" style=\"width: 1290px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2015\/12\/06023536\/post-quantum-qubit.jpg\"><img decoding=\"async\" aria-describedby=\"caption-attachment-10754\" class=\"size-full wp-image-10754\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2015\/12\/06023536\/post-quantum-qubit.jpg\" alt=\"Quantum computers: what does it mean for you today?\" width=\"1280\" height=\"853\"><\/a><p id=\"caption-attachment-10754\" class=\"wp-caption-text\">Four qubit chip. Photo by Eric Lucero, <a href=\"http:\/\/web.physics.ucsb.edu\/~martinisgroup\/index.shtml\" target=\"_blank\" rel=\"noopener nofollow\">Martinis Group, University of California, Santa Barbara<\/a><\/p><\/div>\n<p>A couple of years ago, it was widely acknowledged that the process of creating a practical quantum computer (which would pose a real threat to encryption algorithms) would take another two or even four decades. However, the evolution sped up unexpectedly. Recently a successful project by researchers from the University of New South Wales in Australia made some headlines. The scientists <a href=\"http:\/\/www.smh.com.au\/technology\/sci-tech\/australian-researchers-make-quantum-computing-breakthrough-paving-way-for-worldfirst-chip-20151005-gk1bov.html\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">managed<\/a> to create a quantum logic gate.<\/p>\n<p>The solutions proposed by the group is even more fascinating due to the fact the researchers based their approach on the upgrade of usual silicon chips, making the would-be quantum computer a relatively affordable, scalable and backward-compatible with the ordinary PCs. The only drawback is that it requires ultra-low operational temperatures, yet the scientists are optimistic to increase the number of qubits to hundreds or even thousands without a particular effort.<\/p>\n<p>The best-case scenario presupposes that the fist production quantum computer is to arrive in just 5 years, leveraging a modest number of qubits. To pose a threat to current cryptography methods, a quantum computer would need to evolve for another decade. Pessimists prefer to stick to their previous forecast, which is several decades.<\/p>\n<p>Realists state that quantum algorithms are still a murky business and have to be thoroughly studied and analyzed, which might imply quantum computers are not capable of cracking ciphers at all. Only the course of the history is capable of proving them wrong, but if the \u2018optimists\u2019 are right, it\u2019s time to get ready.<\/p>\n<p>\u2018Getting ready\u2019 could be easy and hard at the same time. The thing that needs to be changed in order to initiate the quantum era is the migration of current encryption protocols onto post-quantum algorithms (those not cracked by quantum computers). Fortunately, these are real.<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">Advantech ICS Gear Still Vulnerable to Shellshock, Heartbleed: <a href=\"https:\/\/t.co\/q9fuyWjMFP\" target=\"_blank\" rel=\"noopener nofollow\">https:\/\/t.co\/q9fuyWjMFP<\/a> via <a href=\"https:\/\/twitter.com\/threatpost?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">@threatpost<\/a> <a href=\"https:\/\/t.co\/ZsObYrDk3f\" target=\"_blank\" rel=\"noopener nofollow\">pic.twitter.com\/ZsObYrDk3f<\/a><\/p>\n<p>\u2014 Kaspersky (@kaspersky) <a href=\"https:\/\/twitter.com\/kaspersky\/status\/672162696243081216?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">December 2, 2015<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>However, we should bear in mind the experience we obtained during the last two years: outdated and\/or flawed deployments of encryption systems which are largely vulnerable to <a href=\"http:\/\/www.smh.com.au\/technology\/sci-tech\/australian-researchers-make-quantum-computing-breakthrough-paving-way-for-worldfirst-chip-20151005-gk1bov.html\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">Heartbleed<\/a> or <a href=\"https:\/\/threatpost.ru\/novyj-poodle-ekspluatiruet-problemu-otkata-protokola-do-ssl-3-0\/4195\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">POODLE<\/a> attacks, are still being used by even major companies. That means even successful security solutions cannot be applied at scale fast enough. And this is the reason why we should bother about \u2018post-quantum\u2019 encryption today.<\/p>\n<p>\u201cGiven the poor rate of adoption or proper implementation of high-quality cryptography as it is, we do not foresee a smooth transition to counterbalance cryptographic failures at scale,\u201d said Juan-Andreas Guererro-Saade, a researcher at GReAT, in his entry for Kaspersky Lab 2016 <a href=\"https:\/\/securelist.com\/analysis\/kaspersky-security-bulletin\/72771\/kaspersky-security-bulletin-2016-predictions\/\" target=\"_blank\" rel=\"noopener noreferrer\">cybersecurity forecast<\/a>.<\/p>\n<p>Luckily, some serious industry organizations like <a href=\"http:\/\/www.nist.gov\/itl\/csd\/ct\/post-quantum-crypto-workshop-2015.cfm\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">NIST<\/a> have already initiated the standardization process. At the moment experts discuss the viability of various new-generation algorithms to replace RSA and ECDH, which might grow unreliable in the post-quantum world.<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">GReAT's Predictions for 2016: The End of APT's is Upon Us <a href=\"https:\/\/twitter.com\/hashtag\/KL2016Prediction?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#KL2016Prediction<\/a> <a href=\"https:\/\/t.co\/pIaETRXtl2\" target=\"_blank\" rel=\"noopener nofollow\">https:\/\/t.co\/pIaETRXtl2<\/a><\/p>\n<p>\u2014 J. A. Guerrero-Saade (@juanandres_gs) <a href=\"https:\/\/twitter.com\/juanandres_gs\/status\/666654217013223425?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">November 17, 2015<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<h3>A practical guide<\/h3>\n<p>So, what would an average concerned user entertain themselves with, while we are waiting for quantum crypto doom to happen? First, one should critically assess REAL threats and the value of the potentially vulnerable data.<\/p>\n<p>Digital certificates for web banking and apps are terminable, so by the time quantum computers are around current certificates would be void, and there is a hope the upcoming certificated would be signed by algorithms cryptically resilient to quantum-based methods.<\/p>\n<p>Companies watching out for threats (including Kaspersky Lab), would probably enable some \u2018quantium\u2019-grade security checks for websites, say, a red indicator in the browser\u2019s address bar would alert a user if a web pages uses outdated encryption algorithms.<\/p>\n<p>The same approach would apply to digital signatures for apps or encryption for traffic exchanged between IM users. They are likely to be adequately protected by the time quantum computers become everyday reality.<\/p>\n<p>What is the threat is after all? The threat is the ability of organizations like NSA to collect <strong>an awful lot<\/strong> of encrypted traffic today. By now, it\u2019s just a huge useless chunk of information stored in the data centers, waiting for next-generation quantum technologies which might finally decrypt the data.<\/p>\n<blockquote class=\"twitter-pullquote\"><p>What world with #quantum computers would be like and what it means for you today. #encryption #security<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2F8C5u&amp;text=What+world+with+%23quantum+computers+would+be+like+and+what+it+means+for+you+today.+%23encryption+%23security\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n<p>It would all go down to one factor: the value of your traffic for them and whether it is worth storing and decrypting. Would it be equally valuable in the next 10-20 years? The answer might be \u2018yes\u2019 for certain user groups: contractors having access to top-secret information, reporters, doctors and lawyers working with confidential sources, or civil activists acting against repressive governments.<\/p>\n<p>Should one belong to this high-risk group, they must assess the levels of risks they are running, and apply post-quantum methods to protect sensitive data <strong>today<\/strong>, to be spared some nasty consequences tomorrow.<\/p>\n<p>There are certain approaches which might be used in this respect:<\/p>\n<ol>\n<li><strong>Avoid asymmetric keys.<\/strong> \u2018Quantum algorithms are capable of solving NP-complete problems which serve the basis of today\u2019s asymmetric cryptography; thus compromising elyptic curve encryption and RSA, El Gamal signatures and encryption, as well as Diffy-Hellman algorithm, comments Victor Alyushin, an expert at Kaspersky Lab.\u2028\u2028The solution might be either to use alternative key exchange protocols, or enable physical exchange of keys. For instance, the Threema mobile messenger presupposes that both interlocutors exchange QR codes on their phones, making further communication quite resistant to compromise.<\/li>\n<li><strong>Use higher grade encryption.<\/strong> While production quantum computers might be a decade away, hackers do not sit idle and will continue to develop new and sophisticated crypto attacks, so the use of a RSA-8192 or a P-256 keys is totally justified for sensitive documents.<\/li>\n<li><strong>Leverage stronger symmetric encryption algorithms.<\/strong> \u2018Quantum computers are able to efficiently crack passwords and discover symmetric encryption keys: for example, a quantum computer cracks a 2N-byte long key in the same time it takes an ordinary computer to crack a N-byte long key. Consequently, it makes sense to double the length of symmetric keys to preserve the same grade of cryptographic resilience,\u2019 says Alyushin.\u2028\u2028It should be taken into account that practical attacks on AES are growing in number and level of sophistication, so, regardless of the fact they are still mostly unsuccessful, the migration onto 256-bit encryption would not hurt, even if the emerging quantum threat is not taken into consideration yet.<\/li>\n<\/ol>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\"><a href=\"https:\/\/twitter.com\/hashtag\/ICYMI?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#ICYMI<\/a> Prime Diffie-Hellman Weakness May Be Key to Breaking Crypto: <a href=\"https:\/\/t.co\/uI1hDBqsvz\" target=\"_blank\" rel=\"noopener nofollow\">https:\/\/t.co\/uI1hDBqsvz<\/a> via <a href=\"https:\/\/twitter.com\/threatpost?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">@threatpost<\/a> <a href=\"http:\/\/t.co\/sLynrjtcu7\" target=\"_blank\" rel=\"noopener nofollow\">pic.twitter.com\/sLynrjtcu7<\/a><\/p>\n<p>\u2014 Kaspersky (@kaspersky) <a href=\"https:\/\/twitter.com\/kaspersky\/status\/656143168929439748?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">October 19, 2015<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<ol start=\"4\">\n<li><strong>Approach experimental \u2018post-quantum\u2019 solutions.<\/strong> They vary in terms of practical value and convenience, and their cryptographic resilience is, in some cases, highly debatable. However, if you are an early adopter, we recommend you check out the <a href=\"https:\/\/en.wikipedia.org\/wiki\/Lattice-based_cryptography#Lattice-based_cryptosystems\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">short review<\/a> of existing utilities based on one of the most promising \u2018post-quantum\u2019 lattice-based cryptography systems.<\/li>\n<\/ol>\n<h3>The unexpected epilogue<\/h3>\n<p>While quantum computing would be a breaking point for Internet security and might result in some scandalous breaches, we still have to acknowledge this reality is years ahead.<\/p>\n<p>That said, most of breaches and hacks throughout all these years have been caused by mundane reasons: deployment flaws, vulnerable software, weak passwords and other instances of irresponsible security practices.<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">For <a href=\"https:\/\/twitter.com\/hashtag\/DPD15?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#DPD15<\/a>, we look at 2014\u2019s top data leaks on Kaspersky Daily. <a href=\"https:\/\/t.co\/lEpy81gdBl\" target=\"_blank\" rel=\"noopener nofollow\">https:\/\/t.co\/lEpy81gdBl<\/a> <a href=\"https:\/\/twitter.com\/hashtag\/databreach?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#databreach<\/a> <a href=\"https:\/\/twitter.com\/hashtag\/cybercrime?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#cybercrime<\/a> <a href=\"http:\/\/t.co\/XITXMW9NLe\" target=\"_blank\" rel=\"noopener nofollow\">pic.twitter.com\/XITXMW9NLe<\/a><\/p>\n<p>\u2014 Kaspersky (@kaspersky) <a href=\"https:\/\/twitter.com\/kaspersky\/status\/560468735753199616?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">January 28, 2015<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>So those worried about the security of their data in the advent of quantum computing should primarily concentrate on choosing right means of storing the valuable information, securing communication channels, as well as using robust encryption technologies and reliable counter agents. This would help to keep your secrets intact before quantum computers become the part of the everyday reality.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Quantum computers are said to be coming soon. They will definitely change the information security paradigm. How you can prepare to this shift?<\/p>\n","protected":false},"author":32,"featured_media":10755,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[5,1789,2683,9],"tags":[1128,597,261,880,465,97,131],"class_list":{"0":"post-10750","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-news","8":"category-technology","9":"category-threats","10":"category-tips","11":"tag-ciphers","12":"tag-cryptography","13":"tag-encryption","14":"tag-future","15":"tag-quantum-computers","16":"tag-security-2","17":"tag-tips"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/prepare-to-quantim-computers-reality\/10750\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/prepare-to-quantim-computers-reality\/5195\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/prepare-to-quantim-computers-reality\/6383\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/prepare-to-quantim-computers-reality\/6446\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/prepare-to-quantim-computers-reality\/7339\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/prepare-to-quantim-computers-reality\/7042\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/prepare-to-quantim-computers-reality\/10014\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/prepare-to-quantim-computers-reality\/5980\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/prepare-to-quantim-computers-reality\/6566\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/prepare-to-quantim-computers-reality\/9821\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/prepare-to-quantim-computers-reality\/10014\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/prepare-to-quantim-computers-reality\/10750\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/prepare-to-quantim-computers-reality\/10750\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com\/blog\/tag\/tips\/","name":"tips"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/10750","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/32"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=10750"}],"version-history":[{"count":2,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/10750\/revisions"}],"predecessor-version":[{"id":30360,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/10750\/revisions\/30360"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/10755"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=10750"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=10750"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=10750"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}