Now Playing
Ambient Radio

Keep Learning?

Sign in to continue practicing.

The advent of practical quantum computers poses a profound and imminent threat to the foundational cryptographic algorithms, such as RSA and ECC, that secure virtually all modern digital communications and transactions. Shor's algorithm, in particular, demonstrates the potential for quantum machines to efficiently factor large numbers and solve discrete logarithm problems, rendering current public-key infrastructure vulnerable to widespread compromise. Consequently, a global effort is underway to develop and standardize new cryptographic primitives, known as post-quantum cryptography (PQC), which are designed to withstand attacks from both classical and quantum adversaries while maintaining computational feasibility for classical systems.

Which of the following sentences best completes this paragraph?

A. Quantum key distribution (QKD), a distinct but related field, offers an alternative method for secure communication against quantum threats.
B. The imperative, therefore, lies in the rapid and widespread adoption of these PQC standards to safeguard global data integrity and privacy against the looming quantum threat.
C. Many of the proposed PQC schemes are based on complex mathematical problems like lattice problems or error-correcting codes, offering diverse security foundations.
D. Historically, cryptographic transitions have been lengthy processes, often taking decades to achieve widespread implementation and deprecation of older standards.

Correct Answer: B
Why B works: The paragraph outlines the quantum threat to current cryptography and the global effort to develop post-quantum cryptography (PQC). Option B logically completes this by emphasizing the crucial next step: the urgent and broad implementation of these new standards to protect against the described threat, thereby bringing the narrative to its strategic conclusion. It directly addresses the overarching concern established in the opening sentences.
Why A fails: Option A introduces Quantum Key Distribution (QKD), which, while related to quantum security, is a separate technology distinct from the PQC development and standardization effort that is the central focus of the paragraph. It shifts the topic rather than providing a capstone conclusion to the existing narrative.
Why C fails: Option C delves into specific technical details about the mathematical foundations of PQC schemes. While these details are relevant to PQC, they are too narrow and specific to function as a capstone sentence that provides a broader strategic conclusion to the paragraph's overarching theme of the quantum threat and the global response.
Why D fails: Option D provides a general historical observation about cryptographic transitions. While it hints at a challenge for PQC implementation, it does not directly conclude the paragraph's argument about the imperative for PQC implementation, nor does it fully capture the specific urgency implied by the "imminent threat" mentioned early in the paragraph. It's a related point but not the logical culmination.