SlideShare a Scribd company logo
Quantum Computing
vs
Encryption
A Battle to Watch Out For
Could Quantum Computers Put an End to Today’s Encryption Methods?
• However, the prevailing quantum computers
are still a long way off the mark.
• Some of the prototypes are as large as a
room. But so were our today’s computers.
We all know how that panned out, right?
2
• The thing about revolutions is that
nobody can predict when they’ll come
but they do. Quantum computing is
going to be one such revolution.
• The quantum computers are now
almost out of the science phase. It’s
the engineering part that needs to be
taken care of.
• Nobody knows how many years it’s going to take for quantum
computers to take over. Some say seven, some believe fifteen, and
some go as far as twenty-five.
• The truth? Nobody knows. It’s like weather forecast, albeit less-
accurate. But one day, they’re going to be a reality and we must be
prepared to embrace it.
3
• This takes us to the technology that protects our data and privacy
on the internet – Encryption.
• Encryption is where the repercussions of quantum computing are
going to be heard the most. We’ll get to that in a moment but let’s
understand the concept of quantum computing first.
4
WHAT IS QUANTUM
COMPUTING?
5
Quantum Computing
Let’s start with the first set of slides
6
Quantum Computing
• The binary system is the foundation of today’s computers. They’re
called ‘bits’. All the information that today’s classical computers take,
process and store is in the strings of 0’s and 1’s.
• Every piece of data has a combination of many 0’s and/or 1’s attached
to it.
7
Quantum Computing
• Keep in mind that it can only be 0 or 1 at a time, not both. This is exactly
where quantum computers differ from classical computers. Quantum
computers use Qubits instead of Bits. It means that they run 0 & 1 at the
same time.
• This is called ‘the principle of superposition’. This duality has its roots
in quantum mechanics.
8
• A quantum computer
with n qubits can be in
2n states at a time. A
quantum computer with
two qubits can be in four
states simultaneously,
three qubits in eight states
and so on.
• As a result, highly
complex problems
that cannot be solved
by classical
computers can be
solved by quantum
computers.
• With quantum computers by
our side, we’ll be able to do
accurate weather
forecasting, efficient drug
discovery, space exploration
and thousand other things
that are still bound by the
boundaries of classical
computers.
9
• Suppose we draw out four cards.
• Three of these cards are kings and one is a queen.
• Now, these cards are shuffled and put on the ground with their faces down.
• Now you have to guess which of these four is a queen. How will you do it?
Still confused? Let’s understand this with a small
game.
10
• You’ll pick one randomly and hope that it’s the right one.
• The probability here is only 25%.
• Now let’s feed this puzzle into a classical computer in form of code.
• Let’s assign a 0 to every king and 1 to the queen.
11
• The computer will apply the same method as you did – trial and error.
• It’s researched that a classical computer will need 2.5 attempts on an average to solve this
problem.
• Had this data been fed into a quantum computer, it could have solved it in a single attempt
(whoa!).
• This is because it can run more than one values simultaneously.
12
Bits vs Qubit
Lets understand the difference between Bits and Cubits
with the image illustrated on the next slide page.
13
Bits
Classical Computing
Qubits
Quantum Computing
14
15
Bits
• Here the number of possibilities are four only.
• What if the number of possible solutions is a million digit long? The classical computers run out
of steam for such problems.
• It might take them thousands of years to solve. For quantum computers, it’s just a matter of
minutes.
• Did you know that Google’s quantum computer is believed to be 100 million times faster than
your computer? Let that sink in for a moment!
16
THIS IS HOW ENCRYPTION WILL BE AFFECTED
17
• What are the prime factors of 21? Pretty easy, right?
• Now do the same for a number having thousands of digits.
• You’d say it’s impossible.
• Well, this is the concept behind the most widely accepted asymmetric encryption system, RSA.
18
Impact of Quantum Computing
19
• The RSA cryptosystem depends on this concept of prime-factorization.
• In RSA, the public key is obtained by multiplying prime-factors – the private keys.
• The public key is so large in length that it’s impossible to crack the private keys attached to it.
• There are 2112 possibilities to crack the private key.
20
• This is a certainly an enormous number – well and truly out of the reach of today’s computers.
• That’s the point behind every major encryption methods used today.
• They’re designed in such a way that no computer can crack them.
• But when it comes to quantum computers, the story is entirely different as they’re fundamentally
different from classical computers.
21
• If we apply a quantum computer to crack the private key from the public key, it might be over
before you even know it.
• Some say this could be done in 100 seconds. It’s because a quantum computer can try so many
combinations simultaneously.
• Thereby, posing an inescapable threat on today’s encryption methods. From protecting your
passwords to safeguarding your credit card details – such encryption methods are used pretty
much everywhere.
22
WHAT DOES THE FUTURE HOLD?
23
• First, there’s no need to panic.
• Quantum computers might be able to break some of the today’s encryption methods, but not all
of them.
• Compared to the vastly used asymmetric encryption, symmetric encryption algorithms are
somewhat safe from the threat of quantum computing.
24
• However, they might need a bit of sharpening. Dr. Michele Mosca, deputy director of the Institute for Quantum
Computing at the University of Waterloo suggested doubling the length of the symmetric encryption keys to
safeguard them.
• The ugly truth when it comes to quantum computing is that nobody knows when it becomes a reality.
• The cryptographers are fully aware of the danger and are looking to develop new techniques and algorithms.
• The research and development take time. How much? Again, nobody knows. Such uncertainty on both sides
makes this a fascinating and challenging contest.
25
Will quantum computers make encryption obsolete?
Will quantum encryption become a reality?
Can scientists develop an unconquerable encryption
system
26
27
THANKS!
 If you have any questions about this document please don’t hesitate to contact us
at:
 https://cheapsslsecurity.com/blog/
 https://twitter.com/sslsecurity
 https://www.facebook.com/CheapSSLSecurities
 https://plus.google.com/+Cheapsslsecurity

More Related Content

What's hot (19)

PDF
Inspired Magazine
Susan Middeleer Mleczko
 
PDF
Fontys Eric van Tol
TalentEvent
 
PDF
Centurylink Business Technology in 2020 ebook
Jake Weaver
 
DOCX
Coming Of Calm Technology
Chuka Okoye
 
PDF
Metaverse AI Innovation Platform Insights from Patents
Alex G. Lee, Ph.D. Esq. CLP
 
PDF
The most disruptive quantum technology companies to watch 2019
Insights success media and technology pvt ltd
 
PDF
Future trends presentation by bakr al tamimi (public)
Bakr Al-Tamimi
 
PDF
Investment Opportunities in the New Normal - AirTree Ventures
Melissa Ran
 
PDF
Iot opportunities-challenges
johnkbutcher
 
PDF
Augmented reality and virtual reality
Kamran Fartash Toloue
 
PPTX
Artificial intelligence - Digital Readiness.
Dr. Kim (Kyllesbech Larsen)
 
PPTX
Tech trends
Raoul Gomes
 
PPTX
weAR MARKOVERSE eng 2021
Emanuele Borasio
 
PPTX
AI for Telcos
Dr. Kim (Kyllesbech Larsen)
 
PDF
What is the metaverse by Dr Cynthia Calongne
Cynthia Calongne
 
PDF
Benefits of big data
Jean-Christophe HUC (Jay C)
 
PDF
The Future of Content
Michael Rosinski
 
PDF
p9-riliskis
Laurynas Riliskis
 
Inspired Magazine
Susan Middeleer Mleczko
 
Fontys Eric van Tol
TalentEvent
 
Centurylink Business Technology in 2020 ebook
Jake Weaver
 
Coming Of Calm Technology
Chuka Okoye
 
Metaverse AI Innovation Platform Insights from Patents
Alex G. Lee, Ph.D. Esq. CLP
 
The most disruptive quantum technology companies to watch 2019
Insights success media and technology pvt ltd
 
Future trends presentation by bakr al tamimi (public)
Bakr Al-Tamimi
 
Investment Opportunities in the New Normal - AirTree Ventures
Melissa Ran
 
Iot opportunities-challenges
johnkbutcher
 
Augmented reality and virtual reality
Kamran Fartash Toloue
 
Artificial intelligence - Digital Readiness.
Dr. Kim (Kyllesbech Larsen)
 
Tech trends
Raoul Gomes
 
weAR MARKOVERSE eng 2021
Emanuele Borasio
 
What is the metaverse by Dr Cynthia Calongne
Cynthia Calongne
 
Benefits of big data
Jean-Christophe HUC (Jay C)
 
The Future of Content
Michael Rosinski
 
p9-riliskis
Laurynas Riliskis
 

Similar to Quantum Computing vs Encryption: A Battle to Watch Out for (20)

PDF
How Secure is Quantum Computing_ Quantum Cryptography Explained.pdf
Dina G
 
PDF
Quantum Computing Explained.pdf
Get Up To Dated
 
PPTX
Quantum Computing and Blockchain: Facts and Myths
Ahmed Banafa
 
PPTX
Presentation on quantum computers
Nancy Mann
 
PPTX
Quantum Computing and its security implications
InnoTech
 
PPTX
Introduction to quantum computing
Iqra Naz
 
PPTX
A Technical Seminar on Quantum Computers By SAIKIRAN PANJALA
Saikiran Panjala
 
PPTX
quantum computing22.pptx
Abhijit181377
 
PPTX
Quantum computers
kavya1219
 
PPTX
bhanu.pptx
aswinichenemalla
 
PPTX
Quantum computing COMPLETE LECTURE
SMALAIAPPANSRIKANTH
 
PPTX
quantumcomputing-230309064424-9aa92847.pptx
chintapatlasudheerna
 
PPTX
quantum computing basics roll no 15.pptx
toget48099
 
PPTX
Cryptography & Quantum Computing.pptx
RohanTakke
 
PDF
What is Quantum Computing, and How,,, Does It Work.pdf
Binay Dubey
 
PDF
DEF CON 27 - ANDREAS BAUMHOF - are quantum computers really a threat to crypt...
Felipe Prado
 
PPTX
Quantum computers by Emran
Emran Hossain
 
PDF
DEF CON 23 - Phillip Aumasson - quantum computers vs computers security
Felipe Prado
 
How Secure is Quantum Computing_ Quantum Cryptography Explained.pdf
Dina G
 
Quantum Computing Explained.pdf
Get Up To Dated
 
Quantum Computing and Blockchain: Facts and Myths
Ahmed Banafa
 
Presentation on quantum computers
Nancy Mann
 
Quantum Computing and its security implications
InnoTech
 
Introduction to quantum computing
Iqra Naz
 
A Technical Seminar on Quantum Computers By SAIKIRAN PANJALA
Saikiran Panjala
 
quantum computing22.pptx
Abhijit181377
 
Quantum computers
kavya1219
 
bhanu.pptx
aswinichenemalla
 
Quantum computing COMPLETE LECTURE
SMALAIAPPANSRIKANTH
 
quantumcomputing-230309064424-9aa92847.pptx
chintapatlasudheerna
 
quantum computing basics roll no 15.pptx
toget48099
 
Cryptography & Quantum Computing.pptx
RohanTakke
 
What is Quantum Computing, and How,,, Does It Work.pdf
Binay Dubey
 
DEF CON 27 - ANDREAS BAUMHOF - are quantum computers really a threat to crypt...
Felipe Prado
 
Quantum computers by Emran
Emran Hossain
 
DEF CON 23 - Phillip Aumasson - quantum computers vs computers security
Felipe Prado
 
Ad

More from CheapSSLsecurity (20)

PPTX
What is Asymmetric Encryption? Understand with Simple Examples
CheapSSLsecurity
 
PPTX
TLS 1.3: Everything You Need to Know - CheapSSLsecurity
CheapSSLsecurity
 
PPTX
How to Fix ERR_SSL_VERSION_OR_CIPHER_MISMATCH Error
CheapSSLsecurity
 
PPTX
Apache Server: Common SSL Errors and Troubleshooting Guide
CheapSSLsecurity
 
PPTX
Multi Domain Wildcard Features explained by CheapSSLsecurity
CheapSSLsecurity
 
PPTX
Various Types of OpenSSL Commands and Keytool
CheapSSLsecurity
 
PPTX
What is Certificate Transparency (CT)? How does it work?
CheapSSLsecurity
 
PDF
Norton Cyber Security Insights Report 2017
CheapSSLsecurity
 
PPTX
The Top Five Cybersecurity Threats for 2018
CheapSSLsecurity
 
PPTX
Is your business PCI DSS compliant? You’re digging your own grave if not
CheapSSLsecurity
 
PPTX
Phishing Scams: 8 Helpful Tips to Keep You Safe
CheapSSLsecurity
 
PPTX
How Hashing Algorithms Work
CheapSSLsecurity
 
PDF
Symantec (ISTR) Internet Security Threat Report Volume 22
CheapSSLsecurity
 
PPTX
Hashing vs Encryption vs Encoding
CheapSSLsecurity
 
PDF
Understanding SSL Certificate for Apps by Symantec
CheapSSLsecurity
 
PPTX
Thawte Wildcard SSL Certificates – Enable Sub-Domains Security
CheapSSLsecurity
 
PPTX
Shift to HTTPS and Save Your Website from the Wrath of Blacklisting
CheapSSLsecurity
 
PPTX
Microsoft Exchange Server & SSL Certificates: Everything you need to know
CheapSSLsecurity
 
PDF
Comodo Multi Domain SSL Certificate: Key Features by CheapSSLsecurity
CheapSSLsecurity
 
PPTX
Why Green Address Bar EV SSL Certificates are Critical to E-commerce
CheapSSLsecurity
 
What is Asymmetric Encryption? Understand with Simple Examples
CheapSSLsecurity
 
TLS 1.3: Everything You Need to Know - CheapSSLsecurity
CheapSSLsecurity
 
How to Fix ERR_SSL_VERSION_OR_CIPHER_MISMATCH Error
CheapSSLsecurity
 
Apache Server: Common SSL Errors and Troubleshooting Guide
CheapSSLsecurity
 
Multi Domain Wildcard Features explained by CheapSSLsecurity
CheapSSLsecurity
 
Various Types of OpenSSL Commands and Keytool
CheapSSLsecurity
 
What is Certificate Transparency (CT)? How does it work?
CheapSSLsecurity
 
Norton Cyber Security Insights Report 2017
CheapSSLsecurity
 
The Top Five Cybersecurity Threats for 2018
CheapSSLsecurity
 
Is your business PCI DSS compliant? You’re digging your own grave if not
CheapSSLsecurity
 
Phishing Scams: 8 Helpful Tips to Keep You Safe
CheapSSLsecurity
 
How Hashing Algorithms Work
CheapSSLsecurity
 
Symantec (ISTR) Internet Security Threat Report Volume 22
CheapSSLsecurity
 
Hashing vs Encryption vs Encoding
CheapSSLsecurity
 
Understanding SSL Certificate for Apps by Symantec
CheapSSLsecurity
 
Thawte Wildcard SSL Certificates – Enable Sub-Domains Security
CheapSSLsecurity
 
Shift to HTTPS and Save Your Website from the Wrath of Blacklisting
CheapSSLsecurity
 
Microsoft Exchange Server & SSL Certificates: Everything you need to know
CheapSSLsecurity
 
Comodo Multi Domain SSL Certificate: Key Features by CheapSSLsecurity
CheapSSLsecurity
 
Why Green Address Bar EV SSL Certificates are Critical to E-commerce
CheapSSLsecurity
 
Ad

Recently uploaded (20)

PDF
The Builder’s Playbook - 2025 State of AI Report.pdf
jeroen339954
 
PDF
SWEBOK Guide and Software Services Engineering Education
Hironori Washizaki
 
PPTX
WooCommerce Workshop: Bring Your Laptop
Laura Hartwig
 
PDF
CIFDAQ Token Spotlight for 9th July 2025
CIFDAQ
 
PPTX
UiPath Academic Alliance Educator Panels: Session 2 - Business Analyst Content
DianaGray10
 
PDF
Agentic AI lifecycle for Enterprise Hyper-Automation
Debmalya Biswas
 
PPTX
AI Penetration Testing Essentials: A Cybersecurity Guide for 2025
defencerabbit Team
 
PDF
Complete JavaScript Notes: From Basics to Advanced Concepts.pdf
haydendavispro
 
PPTX
"Autonomy of LLM Agents: Current State and Future Prospects", Oles` Petriv
Fwdays
 
PPTX
OpenID AuthZEN - Analyst Briefing July 2025
David Brossard
 
PDF
From Code to Challenge: Crafting Skill-Based Games That Engage and Reward
aiyshauae
 
PDF
NewMind AI - Journal 100 Insights After The 100th Issue
NewMind AI
 
PPTX
COMPARISON OF RASTER ANALYSIS TOOLS OF QGIS AND ARCGIS
Sharanya Sarkar
 
PDF
Newgen 2022-Forrester Newgen TEI_13 05 2022-The-Total-Economic-Impact-Newgen-...
darshakparmar
 
PDF
Fl Studio 24.2.2 Build 4597 Crack for Windows Free Download 2025
faizk77g
 
PDF
Blockchain Transactions Explained For Everyone
CIFDAQ
 
PDF
DevBcn - Building 10x Organizations Using Modern Productivity Metrics
Justin Reock
 
PDF
Transcript: New from BookNet Canada for 2025: BNC BiblioShare - Tech Forum 2025
BookNet Canada
 
PDF
Newgen Beyond Frankenstein_Build vs Buy_Digital_version.pdf
darshakparmar
 
PDF
How Startups Are Growing Faster with App Developers in Australia.pdf
India App Developer
 
The Builder’s Playbook - 2025 State of AI Report.pdf
jeroen339954
 
SWEBOK Guide and Software Services Engineering Education
Hironori Washizaki
 
WooCommerce Workshop: Bring Your Laptop
Laura Hartwig
 
CIFDAQ Token Spotlight for 9th July 2025
CIFDAQ
 
UiPath Academic Alliance Educator Panels: Session 2 - Business Analyst Content
DianaGray10
 
Agentic AI lifecycle for Enterprise Hyper-Automation
Debmalya Biswas
 
AI Penetration Testing Essentials: A Cybersecurity Guide for 2025
defencerabbit Team
 
Complete JavaScript Notes: From Basics to Advanced Concepts.pdf
haydendavispro
 
"Autonomy of LLM Agents: Current State and Future Prospects", Oles` Petriv
Fwdays
 
OpenID AuthZEN - Analyst Briefing July 2025
David Brossard
 
From Code to Challenge: Crafting Skill-Based Games That Engage and Reward
aiyshauae
 
NewMind AI - Journal 100 Insights After The 100th Issue
NewMind AI
 
COMPARISON OF RASTER ANALYSIS TOOLS OF QGIS AND ARCGIS
Sharanya Sarkar
 
Newgen 2022-Forrester Newgen TEI_13 05 2022-The-Total-Economic-Impact-Newgen-...
darshakparmar
 
Fl Studio 24.2.2 Build 4597 Crack for Windows Free Download 2025
faizk77g
 
Blockchain Transactions Explained For Everyone
CIFDAQ
 
DevBcn - Building 10x Organizations Using Modern Productivity Metrics
Justin Reock
 
Transcript: New from BookNet Canada for 2025: BNC BiblioShare - Tech Forum 2025
BookNet Canada
 
Newgen Beyond Frankenstein_Build vs Buy_Digital_version.pdf
darshakparmar
 
How Startups Are Growing Faster with App Developers in Australia.pdf
India App Developer
 

Quantum Computing vs Encryption: A Battle to Watch Out for

  • 2. Could Quantum Computers Put an End to Today’s Encryption Methods? • However, the prevailing quantum computers are still a long way off the mark. • Some of the prototypes are as large as a room. But so were our today’s computers. We all know how that panned out, right? 2 • The thing about revolutions is that nobody can predict when they’ll come but they do. Quantum computing is going to be one such revolution. • The quantum computers are now almost out of the science phase. It’s the engineering part that needs to be taken care of.
  • 3. • Nobody knows how many years it’s going to take for quantum computers to take over. Some say seven, some believe fifteen, and some go as far as twenty-five. • The truth? Nobody knows. It’s like weather forecast, albeit less- accurate. But one day, they’re going to be a reality and we must be prepared to embrace it. 3
  • 4. • This takes us to the technology that protects our data and privacy on the internet – Encryption. • Encryption is where the repercussions of quantum computing are going to be heard the most. We’ll get to that in a moment but let’s understand the concept of quantum computing first. 4
  • 6. Quantum Computing Let’s start with the first set of slides 6
  • 7. Quantum Computing • The binary system is the foundation of today’s computers. They’re called ‘bits’. All the information that today’s classical computers take, process and store is in the strings of 0’s and 1’s. • Every piece of data has a combination of many 0’s and/or 1’s attached to it. 7
  • 8. Quantum Computing • Keep in mind that it can only be 0 or 1 at a time, not both. This is exactly where quantum computers differ from classical computers. Quantum computers use Qubits instead of Bits. It means that they run 0 & 1 at the same time. • This is called ‘the principle of superposition’. This duality has its roots in quantum mechanics. 8
  • 9. • A quantum computer with n qubits can be in 2n states at a time. A quantum computer with two qubits can be in four states simultaneously, three qubits in eight states and so on. • As a result, highly complex problems that cannot be solved by classical computers can be solved by quantum computers. • With quantum computers by our side, we’ll be able to do accurate weather forecasting, efficient drug discovery, space exploration and thousand other things that are still bound by the boundaries of classical computers. 9
  • 10. • Suppose we draw out four cards. • Three of these cards are kings and one is a queen. • Now, these cards are shuffled and put on the ground with their faces down. • Now you have to guess which of these four is a queen. How will you do it? Still confused? Let’s understand this with a small game. 10
  • 11. • You’ll pick one randomly and hope that it’s the right one. • The probability here is only 25%. • Now let’s feed this puzzle into a classical computer in form of code. • Let’s assign a 0 to every king and 1 to the queen. 11
  • 12. • The computer will apply the same method as you did – trial and error. • It’s researched that a classical computer will need 2.5 attempts on an average to solve this problem. • Had this data been fed into a quantum computer, it could have solved it in a single attempt (whoa!). • This is because it can run more than one values simultaneously. 12
  • 13. Bits vs Qubit Lets understand the difference between Bits and Cubits with the image illustrated on the next slide page. 13
  • 16. • Here the number of possibilities are four only. • What if the number of possible solutions is a million digit long? The classical computers run out of steam for such problems. • It might take them thousands of years to solve. For quantum computers, it’s just a matter of minutes. • Did you know that Google’s quantum computer is believed to be 100 million times faster than your computer? Let that sink in for a moment! 16
  • 17. THIS IS HOW ENCRYPTION WILL BE AFFECTED 17
  • 18. • What are the prime factors of 21? Pretty easy, right? • Now do the same for a number having thousands of digits. • You’d say it’s impossible. • Well, this is the concept behind the most widely accepted asymmetric encryption system, RSA. 18
  • 19. Impact of Quantum Computing 19
  • 20. • The RSA cryptosystem depends on this concept of prime-factorization. • In RSA, the public key is obtained by multiplying prime-factors – the private keys. • The public key is so large in length that it’s impossible to crack the private keys attached to it. • There are 2112 possibilities to crack the private key. 20
  • 21. • This is a certainly an enormous number – well and truly out of the reach of today’s computers. • That’s the point behind every major encryption methods used today. • They’re designed in such a way that no computer can crack them. • But when it comes to quantum computers, the story is entirely different as they’re fundamentally different from classical computers. 21
  • 22. • If we apply a quantum computer to crack the private key from the public key, it might be over before you even know it. • Some say this could be done in 100 seconds. It’s because a quantum computer can try so many combinations simultaneously. • Thereby, posing an inescapable threat on today’s encryption methods. From protecting your passwords to safeguarding your credit card details – such encryption methods are used pretty much everywhere. 22
  • 23. WHAT DOES THE FUTURE HOLD? 23
  • 24. • First, there’s no need to panic. • Quantum computers might be able to break some of the today’s encryption methods, but not all of them. • Compared to the vastly used asymmetric encryption, symmetric encryption algorithms are somewhat safe from the threat of quantum computing. 24
  • 25. • However, they might need a bit of sharpening. Dr. Michele Mosca, deputy director of the Institute for Quantum Computing at the University of Waterloo suggested doubling the length of the symmetric encryption keys to safeguard them. • The ugly truth when it comes to quantum computing is that nobody knows when it becomes a reality. • The cryptographers are fully aware of the danger and are looking to develop new techniques and algorithms. • The research and development take time. How much? Again, nobody knows. Such uncertainty on both sides makes this a fascinating and challenging contest. 25
  • 26. Will quantum computers make encryption obsolete? Will quantum encryption become a reality? Can scientists develop an unconquerable encryption system 26
  • 27. 27 THANKS!  If you have any questions about this document please don’t hesitate to contact us at:  https://cheapsslsecurity.com/blog/  https://twitter.com/sslsecurity  https://www.facebook.com/CheapSSLSecurities  https://plus.google.com/+Cheapsslsecurity