Now Playing
Ambient Radio

Keep Learning?

Sign in to continue practicing.

Quantum computing, leveraging principles like superposition and entanglement, promises to revolutionize computation, offering processing capabilities far beyond classical limits. This advancement presents a profound challenge to contemporary cybersecurity, as algorithms like Shor's could theoretically compromise widely used public-key cryptographic systems, such as RSA and elliptic curve cryptography, which secure global communications and financial transactions. Therefore, the imperative to develop and standardize 'post-quantum cryptography' (PQC) has initiated a global race to secure digital infrastructure against the advent of fault-tolerant quantum computers.

Which of the following sentences best completes this paragraph?

A. The transition to these new cryptographic standards, however, presents unprecedented engineering and logistical challenges for governments and industries worldwide.
B. Moreover, quantum entanglement is already being explored for secure communication channels, like quantum key distribution, separate from PQC.
C. Many nations are now investing heavily in quantum computer development themselves, hoping to gain a strategic advantage in this technological arms race.
D. This technological shift also necessitates a re-evaluation of classical computer security paradigms to ensure backward compatibility.

Correct Answer: A
Why A works: The paragraph establishes the imminent threat of quantum computers to current cryptography and the subsequent global effort to develop and standardize PQC. Option A logically extends this by highlighting the practical, systemic consequences and significant challenges of implementing these new standards, directly following the "global race" to secure infrastructure. It maintains the focus on the practical implications of the PQC endeavor.
Why B fails: Option B introduces Quantum Key Distribution (QKD), which, while related to quantum security, is a distinct concept from PQC. PQC focuses on new mathematical algorithms for classical computers resistant to quantum attacks, whereas QKD uses quantum mechanics for key exchange, often requiring specialized quantum hardware. This shifts the topic slightly from the broad PQC imperative.
Why C fails: Option C focuses on the development of quantum computers for strategic advantage, shifting the paragraph's primary focus from the defensive measures (PQC) to the competitive development of quantum technology itself. While related to the broader context, it does not directly complete the discussion about the imperative and challenges of securing infrastructure via PQC.
Why D fails: Option D narrows the focus to "backward compatibility" within classical computer security. While backward compatibility is a factor in any major technological transition, it does not encapsulate the full scope of "unprecedented engineering and logistical challenges" for securing global digital infrastructure, which is a more fitting continuation of the paragraph's broader implications.