The goal here is to create a comparative analysis research piece which can give the reader a concrete understanding of both forms of current encryption methods before moving on to quantum computing. This will provide vital analysis which will be utilized later on when I discuss quantum computation's ability to decrypt current methods of encryption. This will also include a brief discussion of what conglomerates and national agencies utilize for encryption.
The goal here is to create a comparative analysis research piece which can give the reader a concrete understanding of both forms of current encryption methods before moving on to quantum computing. This will provide vital analysis which will be utilized later on when I discuss quantum computation's ability to decrypt current methods of encryption. This will also include a brief discussion of what conglomerates and national agencies utilize for encryption.