
National Institute of Standards and Technology (NIST), that are believed to offer a more robust defense against quantum computers. These random numbers can be used in both existing encryption services, such as RSA and AES, as well as in new cryptographic schemes, such as those being considered by the U.S. There is no way to predict what the spin of the particle will be, for instance, before the instant at which the particle is observed. In contrast, random numbers produced using principles from quantum physics-such as observing the spin of a subatomic particle that is in a quantum state-guarantees true randomness. Many speculate that a lack of true randomness may be one way the National Security Agency has broken the encryption on a lot of digital communication, as was revealed by Edward Snowden’s leaks. This vulnerability can often be exploited today, even without the attacker needing to use a quantum computer. An attacker who knows which natural phenomenon is being used and understands some of the underlying patterns can more easily crack the encryption. But these processes aren’t actually random either. Some companies use natural phenomena from classic physics, such as fluid dynamics, that are difficult to predict to create random numbers. But most existing random number generators offer only an approximation of randomness-if an attacker knows the algorithm used to generate them, they can be easily reverse-engineered. Many encryption systems depend on the generation of random numbers. It’s calling its random number generation service Quantum Origin.
