"quantum-resistant" meaning in English

See quantum-resistant in All languages combined, or Wiktionary

Adjective

Forms: more quantum-resistant [comparative], most quantum-resistant [superlative]
Head templates: {{en-adj}} quantum-resistant (comparative more quantum-resistant, superlative most quantum-resistant)
  1. Of a cryptographic algorithm: unable to be easily deciphered by a quantum computer. Synonyms: quantum-proof, quantum-safe Related terms: quantum-proof, post-quantum
    Sense id: en-quantum-resistant-en-adj-MWg0fOb5 Categories (other): English entries with incorrect language header

Download JSON data for quantum-resistant meaning in English (3.6kB)

{
  "forms": [
    {
      "form": "more quantum-resistant",
      "tags": [
        "comparative"
      ]
    },
    {
      "form": "most quantum-resistant",
      "tags": [
        "superlative"
      ]
    }
  ],
  "head_templates": [
    {
      "args": {},
      "expansion": "quantum-resistant (comparative more quantum-resistant, superlative most quantum-resistant)",
      "name": "en-adj"
    }
  ],
  "lang": "English",
  "lang_code": "en",
  "pos": "adj",
  "senses": [
    {
      "categories": [
        {
          "kind": "other",
          "name": "English entries with incorrect language header",
          "parents": [
            "Entries with incorrect language header",
            "Entry maintenance"
          ],
          "source": "w"
        }
      ],
      "examples": [
        {
          "ref": "1997 August 6, Gilles Brassard, “Quantum information processing: The good, the bad and the ugly”, in Lecture Notes in Computer Science, Volume 1294: Advances in Cryptology — CRYPTO '97, Berlin, Heidelberg: Springer, →DOI, →ISSN, →OCLC, page 338",
          "text": "Even though most public-key cryptosystems currently in use are based on the presumed difficulty of either factoring large numbers or extracting discrete logarithms, which would not survive widespread use of laptop quantum computers, alternative quantum-resistant public-key systems are not ruled out to the best of our current knowledge.",
          "type": "quotation"
        },
        {
          "ref": "2009 July, Alan Mink, Sheila Frankel, Ray Perlner, “Quantum Key Distribution (QKD) and Commodity Security Protocols: Introduction and Integration”, in International Journal of Network Security & Its Applications, volume 1, number 2, Madras, India: Academy and Industry Research Collaboration Center, →DOI, →ISSN, →OCLC",
          "text": "With the advent of quantum computers, several of the cryptographic constructs underlying the security model of IPsec and TLS will be broken. Breakthroughs in cryptanalysis continue to present a possible threat as well. Quantum-resistant replacements will have to be found for public-key cryptography and for Diffie-Hellman key agreement.",
          "type": "quotation"
        },
        {
          "ref": "2015 August 29, Michael Byrne, “The NSA Has Quantum Fever”, in VICE, archived from the original on 2022-08-23",
          "text": "Earlier this week, the NSA announced plans to make plans to transition to quantum-resistant algorithms—so much as they currently exist—while advising everyone else to starting planning to plan for the same.",
          "type": "quotation"
        },
        {
          "ref": "2019 September 10, Glenn S. Gerstell, “I Work for N.S.A. We Cannot Afford to Lose the Digital Revolution.”, in The New York Times, New York, N.Y.: The New York Times Company, →ISSN, →OCLC, archived from the original on 2023-03-08",
          "text": "Moreover, shifting to quantum-resistant algorithms and encryption is theoretical and thus uncertain, but will surely be expensive and a decades-long endeavor.",
          "type": "quotation"
        },
        {
          "ref": "2022 November 16, Scott Bledsoe, “Is Your Organization Quantum-Proof?”, in Forbes, New York, N.Y.: Forbes Media, →ISSN, →OCLC, archived from the original on 2022-11-21",
          "text": "Business leaders must plan ahead. In order to stay one step ahead of cybercriminals, they must integrate an extra layer of protection by applying quantum-resistant approaches to transform their security environments to avoid a potential breach either today or in the future.",
          "type": "quotation"
        }
      ],
      "glosses": [
        "Of a cryptographic algorithm: unable to be easily deciphered by a quantum computer."
      ],
      "id": "en-quantum-resistant-en-adj-MWg0fOb5",
      "links": [
        [
          "cryptographic",
          "cryptographic#Adjective"
        ],
        [
          "algorithm",
          "algorithm#Noun"
        ],
        [
          "deciphered",
          "decipher#Verb"
        ],
        [
          "quantum computer",
          "quantum computer#Noun"
        ]
      ],
      "related": [
        {
          "word": "quantum-proof"
        },
        {
          "word": "post-quantum"
        }
      ],
      "synonyms": [
        {
          "word": "quantum-proof"
        },
        {
          "word": "quantum-safe"
        }
      ]
    }
  ],
  "word": "quantum-resistant"
}
{
  "forms": [
    {
      "form": "more quantum-resistant",
      "tags": [
        "comparative"
      ]
    },
    {
      "form": "most quantum-resistant",
      "tags": [
        "superlative"
      ]
    }
  ],
  "head_templates": [
    {
      "args": {},
      "expansion": "quantum-resistant (comparative more quantum-resistant, superlative most quantum-resistant)",
      "name": "en-adj"
    }
  ],
  "lang": "English",
  "lang_code": "en",
  "pos": "adj",
  "related": [
    {
      "word": "quantum-proof"
    },
    {
      "word": "post-quantum"
    }
  ],
  "senses": [
    {
      "categories": [
        "English adjectives",
        "English entries with incorrect language header",
        "English lemmas",
        "English multiword terms",
        "English terms with quotations"
      ],
      "examples": [
        {
          "ref": "1997 August 6, Gilles Brassard, “Quantum information processing: The good, the bad and the ugly”, in Lecture Notes in Computer Science, Volume 1294: Advances in Cryptology — CRYPTO '97, Berlin, Heidelberg: Springer, →DOI, →ISSN, →OCLC, page 338",
          "text": "Even though most public-key cryptosystems currently in use are based on the presumed difficulty of either factoring large numbers or extracting discrete logarithms, which would not survive widespread use of laptop quantum computers, alternative quantum-resistant public-key systems are not ruled out to the best of our current knowledge.",
          "type": "quotation"
        },
        {
          "ref": "2009 July, Alan Mink, Sheila Frankel, Ray Perlner, “Quantum Key Distribution (QKD) and Commodity Security Protocols: Introduction and Integration”, in International Journal of Network Security & Its Applications, volume 1, number 2, Madras, India: Academy and Industry Research Collaboration Center, →DOI, →ISSN, →OCLC",
          "text": "With the advent of quantum computers, several of the cryptographic constructs underlying the security model of IPsec and TLS will be broken. Breakthroughs in cryptanalysis continue to present a possible threat as well. Quantum-resistant replacements will have to be found for public-key cryptography and for Diffie-Hellman key agreement.",
          "type": "quotation"
        },
        {
          "ref": "2015 August 29, Michael Byrne, “The NSA Has Quantum Fever”, in VICE, archived from the original on 2022-08-23",
          "text": "Earlier this week, the NSA announced plans to make plans to transition to quantum-resistant algorithms—so much as they currently exist—while advising everyone else to starting planning to plan for the same.",
          "type": "quotation"
        },
        {
          "ref": "2019 September 10, Glenn S. Gerstell, “I Work for N.S.A. We Cannot Afford to Lose the Digital Revolution.”, in The New York Times, New York, N.Y.: The New York Times Company, →ISSN, →OCLC, archived from the original on 2023-03-08",
          "text": "Moreover, shifting to quantum-resistant algorithms and encryption is theoretical and thus uncertain, but will surely be expensive and a decades-long endeavor.",
          "type": "quotation"
        },
        {
          "ref": "2022 November 16, Scott Bledsoe, “Is Your Organization Quantum-Proof?”, in Forbes, New York, N.Y.: Forbes Media, →ISSN, →OCLC, archived from the original on 2022-11-21",
          "text": "Business leaders must plan ahead. In order to stay one step ahead of cybercriminals, they must integrate an extra layer of protection by applying quantum-resistant approaches to transform their security environments to avoid a potential breach either today or in the future.",
          "type": "quotation"
        }
      ],
      "glosses": [
        "Of a cryptographic algorithm: unable to be easily deciphered by a quantum computer."
      ],
      "links": [
        [
          "cryptographic",
          "cryptographic#Adjective"
        ],
        [
          "algorithm",
          "algorithm#Noun"
        ],
        [
          "deciphered",
          "decipher#Verb"
        ],
        [
          "quantum computer",
          "quantum computer#Noun"
        ]
      ],
      "synonyms": [
        {
          "word": "quantum-proof"
        },
        {
          "word": "quantum-safe"
        }
      ]
    }
  ],
  "word": "quantum-resistant"
}

This page is a part of the kaikki.org machine-readable English dictionary. This dictionary is based on structured data extracted on 2024-04-30 from the enwiktionary dump dated 2024-04-21 using wiktextract (210104c and c9440ce). The data shown on this site has been post-processed and various details (e.g., extra categories) removed, some information disambiguated, and additional data merged from other sources. See the raw data download page for the unprocessed wiktextract data.

If you use this data in academic research, please cite Tatu Ylonen: Wiktextract: Wiktionary as Machine-Readable Structured Data, Proceedings of the 13th Conference on Language Resources and Evaluation (LREC), pp. 1317-1325, Marseille, 20-25 June 2022. Linking to the relevant page(s) under https://kaikki.org would also be greatly appreciated.