Now Playing
Ambient Radio

Keep Learning?

Sign in to continue practicing.

Quantum computers, with their ability to process vast amounts of data simultaneously, pose a significant existential threat to much of the public-key cryptography currently securing global digital communications. Algorithms like Shor's, theoretically capable of efficiently factoring large prime numbers, could render widely used encryption standards such as RSA and elliptic curve cryptography obsolete. Consequently, governments and research institutions worldwide are intensely focused on developing and standardizing new cryptographic primitives that are resistant to quantum attacks.

Which of the following sentences best completes this paragraph?

A. This imperative drives the urgent global development and standardization of post-quantum cryptography, critical for securing future digital infrastructures.
B. However, the practical realization of a fault-tolerant, large-scale quantum computer remains a significant engineering challenge.
C. The historical evolution of cryptography has always involved a race between code-makers and code-breakers.
D. Furthermore, quantum key distribution offers an entirely different, physically secure method for information exchange.

Correct Answer: A
Why A works: The paragraph establishes the threat of quantum computing to current encryption and describes the global effort to develop quantum-resistant cryptographic primitives. Option A provides a logical capstone by explicitly stating the critical imperative behind these efforts: securing future digital infrastructures. It summarizes the urgency and the overarching goal that the preceding sentences build towards.
Why B fails: While technically true that building large-scale quantum computers is challenging, this option introduces a caveat that could diminish the sense of urgency conveyed in the third sentence ("intensely focused"). A concluding sentence should reinforce the main thrust, not introduce a potential mitigating factor.
Why C fails: This option offers a broad historical observation about cryptography in general. It does not specifically address or conclude the discussion about the unique quantum threat and the specific, urgent global response detailed in the paragraph.
Why D fails: This option introduces a specific alternative technology (Quantum Key Distribution) which, while related to quantum security, is a distinct concept from the "post-quantum cryptography" (classical algorithms resistant to quantum attacks) that the paragraph primarily focuses on developing. It is too specific and does not serve as a broad conclusion to the global effort described.