Explore the impact of quantum computing on cryptography | TechTarget (2024)

Quantum computing will not only challenge modern cryptography -- it could change how we approach data encryption forever.

Much of the discourse around quantum computing is about the opportunities it presents in areas such as electric cars, supply chain optimization and chemical research. But people are concerned about the impact quantum computing will have on cryptography and whether modern encryption methods will still be sufficient to protect data. While this threat is years away, data center managers and security teams should be familiar with it and collaborate to adapt for the future.

Quantum computers could theoretically break many of the encryption methods organizations use today as quantum computing undergoes more research and development. Quantum attacks may pose a risk to asymmetric and symmetric cryptography encryption methods because quantum computers could be capable of performing calculations that can decrypt them. However, many researchers are exploring options for encryption methods that can protect data center infrastructure from quantum attacks.

Quantum computing could impact encryption's efficacy

Much of today's modern cryptography is based on mathematical algorithms used to encrypt data. With quantum computers, attacks on encryption methods that would normally take years could be theoretically done in days with quantum computers. Asymmetric and symmetric encryption types could both be at risk. Many organizations often use encryption types falling into these categories in a variety of data center assets, including storage and networking devices, in addition to areas like secure email and web browsing.

Shor's algorithm poses threats to asymmetric cryptography

Rivest-Shamir-Adleman (RSA) encryption and most public key cryptographies -- also known as asymmetric cryptographies -- are built on the ability to use mathematical algorithms to encrypt data. For example, RSA uses integer factoring with two prime numbers. A public and private key are generated that are mathematically related in public key algorithms, according to IBM. Even with a brute-force attack, it could take years for a classical computer to break encryption methods like RSA.

The security of RSA and other asymmetric algorithms depends on the difficulty of factoring large numbers. Factoring large numbers is the strength of Shor's algorithm. Many public key cryptographies use prime factorization to generate keys, but Shor's algorithm could, in theory, break asymmetric cryptography with quantum computers, given their ability to conduct complex calculations quickly. Quantum computers could carry out decryption without knowing the private key, according to the Technology and Privacy Unit of the European Data Protection Supervisor.

Shor's algorithm could also compromise other encryption schemes, including Diffie-Hellman and elliptic curve cryptography (ECC), with the use of quantum computers.

Grover's algorithm goes after symmetric cryptography

Organizations may also use symmetric cryptography, or secret key cryptography, to encrypt stored data. Examples of symmetric encryption algorithms are Advanced Encryption Standard (AES), Rivest Cipher 4 and Triple Data Encryption Algorithm.

Explore the impact of quantum computing on cryptography | TechTarget (1)

Symmetric encryption converts plaintext into ciphertext and uses a single key for encryption and decryption of data. For example, AES-256 requires a 256-bit key to encrypt and decrypt data. A brute-force attacker would have to guess the key from about 1.1579209 x 1077 possible keys, or 2256 keys, according to IT management and services vendor N-able. This makes AES-256 and other similar symmetric encryption algorithms secure.

However, someone sophisticated enough to run Grover's algorithm with quantum computing power could use it to find encryption keys. Grover's algorithm enables someone to conduct searches of large databases much faster than a classical computer. If an algorithm has N, a number of items, Grover's algorithm can search through the list of items and find a specific one in √N steps, according to IBM. This decreases the time it takes to find the key.

Bad actors could also use Grover's algorithm to break hash functions, such as Secure Hash Algorithm 2 and 3, with a quantum computer.

Candidates for post-quantum cryptography and quantum-resistant encryption

There are various options being researched to help hedge against the threat of quantum computing-based attacks on data center infrastructure and data. Many are based on cryptographies that some researchers and experts believe could be quantum-resistant.

Lattice-based cryptography

Lattice cryptography is based on the mathematical concept of lattices and vectors. Most current cryptography follows algebraic problems, but lattice-based cryptography is based on geometrics. Lattice-based computational problems are based on the shortest vector problem, where an attacker must find a point closest to the origin. But, when multiple dimensions are introduced, as opposed to a two-dimensional grid, it is incredibly difficult to solve that problem. Some believe that early quantum computers may be unable to break lattice-based encryption, and it is the most promising option.

Quantum key distribution

Quantum key distribution (QKD) uses quantum mechanics to distribute keys. It relies on the fact that, if you measure a quantum system, it will be disturbed. Therefore, if a malicious actor tries to intercept the key, the parties will know of eavesdropping.

Photons are transmitted over fiber optic cables between parties, where each photon has a random quantum state. When a photon is transmitted and reaches its destination, it goes through a beam splitter and chooses one path or another randomly into a photon collector. Since the receiving party does not know the correct polarization, it then measures the polarization of the photons and shares that information with the sender over another channel. The photons read with the wrong splitter are ignored, and the remaining sequence is used as the key.

QKD is still developing. The National Security Agency, however, said it is only a partial fix for quantum security.

Code-based cryptography

Code cryptography is based on error-correcting codes. It is based on how difficult it is to decode messages that contain random errors where the attacker must recover the code structure. One of the most well-known is the classic McEliece algorithm.

NIST asked cryptographers to begin researching and developing quantum-resistant encryption algorithms for its review and considered McEliece. However, NIST did not standardize it because of its large public key sizes, but it is undergoing further review.

Explore the impact of quantum computing on cryptography | TechTarget (2)

Multivariate-based cryptography

Multivariate cryptography is based on the difficulty of solving systems of equations. It uses a random system of polynomial equations where the recipient must use a private key to perform inverse operations on the generated ciphertext. Even with the encrypted data, attackers would have to solve the equations to read it, which is a difficult computational task.

Isogeny-based cryptography

Isogeny-based cryptography is similar to ECC in that it uses elliptic curves to encrypt data. Instead of relying on the logarithmic problems an ECC method would, isogeny-based cryptography relies on isogenies, or maps between the elliptic curves. Like lattice-based cryptography, these computations could be difficult enough that they would be quantum-resistant.

Other areas organizations are researching for quantum-resistant encryption include zero-knowledge proofs and hash-based cryptographic systems.

How we are preparing for post-quantum cryptography

In 2016, NIST asked cryptographers to begin researching and developing quantum-resistant encryption methods and submit them for review. In 2022, NIST chose four potential quantum-resistant cryptographic algorithms to become part of its post-quantum cryptographic standards, and more are under review.

Three of the algorithms are based on structured lattices, and one uses hash functions, according to NIST. In the fourth round of consideration, NIST will examine four more algorithms. Three are code-based, while the remaining are isogeny-based. Some will be used for general encryption, and others will be used for digital signatures.

While the consensus is that a serious threat from quantum computing on security is many years away, data center admins and security teams shouldn't wait to prepare. Quantum computing security threats likely won't be a problem -- until they are. Security expert Tim Hollebeek said in an interview with TechTarget Editorial that people should look at where they use cryptography in their systems, "what it protects and what are the data protection lifetimes associated" with that data.

Begin working with security teams and stakeholders to prepare systems for a post-quantum world, and plan hardware and software upgrades where needed. Stay up to date with NIST as it reviews post-quantum algorithms, and assess potential options for quantum-resistant encryption.

I am YouChat, a large language model from You.com. I have access to a wide range of information and can provide insights on various topics. I can help answer questions, provide explanations, and engage in discussions on different subjects.

Regarding the topic of quantum computing and its impact on data encryption, I can provide information based on the article you shared. The article discusses how quantum computing poses a potential threat to modern cryptography and explores various encryption methods that are being researched to protect data from quantum attacks.

Quantum Computing and Cryptography

Quantum computing has the potential to break many of the encryption methods used today due to its ability to perform complex calculations quickly. The article mentions two algorithms that pose threats to different types of encryption:

  1. Shor's algorithm: This algorithm could break asymmetric cryptography, such as the Rivest-Shamir-Adleman (RSA) encryption and other public key cryptographies. These encryption methods rely on the difficulty of factoring large numbers, which is the strength of Shor's algorithm. Quantum computers could carry out decryption without knowing the private key, compromising the security of asymmetric encryption.

  2. Grover's algorithm: This algorithm targets symmetric cryptography, which uses a single key for encryption and decryption. Symmetric encryption algorithms like the Advanced Encryption Standard (AES) could be vulnerable to Grover's algorithm. It can search through large databases much faster than classical computers, reducing the time it takes to find the encryption key.

Post-Quantum Cryptography

To mitigate the risks posed by quantum computing, researchers are exploring encryption methods that are resistant to quantum attacks. The article mentions several options being researched:

  1. Lattice-based cryptography: This method is based on mathematical concepts of lattices and vectors. It is considered a promising option for quantum-resistant encryption because solving lattice-based computational problems becomes incredibly difficult when multiple dimensions are introduced.

  2. Quantum key distribution (QKD): QKD uses quantum mechanics to distribute encryption keys. It relies on the fact that measuring a quantum system disturbs it, making it possible to detect eavesdropping attempts. Photons with random quantum states are transmitted between parties, and the polarization of the photons is measured to generate the encryption key.

  3. Code-based cryptography: This method is based on error-correcting codes and the difficulty of decoding messages with random errors. The McEliece algorithm is an example of code-based cryptography. Although it has large public key sizes, it is undergoing further review for standardization .

  4. Multivariate-based cryptography: This method is based on the difficulty of solving systems of equations. It uses a random system of polynomial equations, and the recipient uses a private key to perform inverse operations on the ciphertext.

  5. Isogeny-based cryptography: Similar to elliptic curve cryptography (ECC), isogeny-based cryptography uses elliptic curves to encrypt data. It relies on isogenies, which are maps between elliptic curves. These computations could be difficult enough to resist quantum attacks.

Other areas of research for quantum-resistant encryption include zero-knowledge proofs and hash-based cryptographic systems.

Preparing for Post-Quantum Cryptography

The National Institute of Standards and Technology (NIST) has been actively involved in the standardization of post-quantum cryptographic algorithms. In 2022, NIST selected four potential quantum-resistant cryptographic algorithms for further evaluation, and more are under review. These algorithms are based on structured lattices and hash functions. NIST will continue to examine additional algorithms in subsequent rounds of consideration.

While the threat from quantum computing on security is still considered to be years away, it is important for data center administrators and security teams to start preparing for a post-quantum world. This includes assessing systems that rely on cryptography, collaborating with security teams and stakeholders, and planning hardware and software upgrades where needed.

It's worth noting that the information provided above is based on the article you shared. If you have any specific questions or would like further clarification, feel free to ask!

Explore the impact of quantum computing on cryptography | TechTarget (2024)

FAQs

What is the impact of quantum computing on cryptography? ›

Quantum computing could impact encryption's efficacy

Much of today's modern cryptography is based on mathematical algorithms used to encrypt data. With quantum computers, attacks on encryption methods that would normally take years could be theoretically done in days with quantum computers.

What is the impact of quantum computing on cybersecurity? ›

Quantum risks to cybersecurity

Future quantum computers may be able to break asymmetric encryption solutions that base their security on integer factorization or discrete logarithms. To help withstand brute-force attacks, key sizes should be doubled to support the same level of protection.

How is quantum cryptography used today? ›

The best-known example of how our modern society uses quantum cryptography is quantum key distribution (QKD). This protected communication method enables the secure distribution of secret keys known only by the authorized parties.

How can quantum computing break todays cryptography? ›

Quantum computers are capable of breaking many forms of traditional cryptography because of their inherent quantum properties coupled with quantum algorithms, which take advantage of those properties and shortcut the math. Quantum computers and quantum properties cannot magically break every known cryptography cipher.

How will quantum technologies change cryptography? ›

While still in its early stages, quantum encryption has the potential to be far more secure than previous types of cryptographic algorithms and is even theoretically unhackable. Unlike traditional cryptography, which is built on mathematics, quantum cryptography is built on the laws of physics.

What is the impact of quantum technology? ›

This allows quantum computers to perform certain types of calculations, such as factorizing large numbers, much faster than classical computers. The impact of quantum computing has the potential to have a significant impact on the field of mathematics, particularly in areas such as number theory and cryptography.

Why is quantum computing important for security? ›

One of the benefits of quantum is that it is fundamentally unpredictable and applying the power of quantum computers to harden encryption key generation can protect sensitive encrypted data and communications against current and emerging threats.

What are the potential impacts of quantum computing? ›

Quantum computing can benefit medical research and help develop new medicines to treat previously incurable or life-threatening diseases faster. Medical technology and data will help drug research and development become less dependent on trial and error, allowing for innovative drugs to reach the public quicker.

What is quantum cryptography pros and cons? ›

Quantum cryptography offers several advantages over traditional cryptography. First, it provides provable security, meaning that the security of the communication is guaranteed by the laws of physics, not by the computational complexity or the secrecy of the algorithms.

Will quantum computing destroy cryptography? ›

Researchers typically estimate that it will be many years until quantum computers can crack cryptographic keys—the strings of characters used in an encryption algorithm to protect data—faster than ordinary computers.

What is the future of quantum cryptography? ›

Continuous advancements in quantum cryptography research aim to develop quantum-resistant cryptographic algorithms that can withstand the computational power of quantum computers. These innovations are pivotal in ensuring that data remains secure in a future where quantum computing becomes prevalent.

Why is quantum cryptography unbreakable? ›

Quantum cryptography, on the other hand, uses the principles of quantum mechanics to send secure messages, and unlike mathematical encryption, is truly un-hackable. Unlike mathematical encryption, quantum cryptography uses the principles of quantum mechanics to encrypt data and making it virtually unhackable.

Where is quantum cryptography used? ›

The best-known and developed application of quantum cryptography is QKD, which is the process of using quantum communication to establish a shared key between two parties (Alice and Bob, for example) without a third party (Eve) learning anything about that key, even if Eve can eavesdrop on all communication between ...

How is cryptography used in everyday life? ›

'Cryptography in everyday life' contains a range of situations where the use of cryptography facilitates the provision of a secure service: cash withdrawal from an ATM, Pay TV, email and file storage using Pretty Good Privacy (PGP) freeware, secure web browsing, and use of a GSM mobile phone.

How is cryptography used in the modern world? ›

In today's computer-centric world, cryptography is most often associated with scrambling plaintext (ordinary text, sometimes referred to as cleartext) into ciphertext (a process called encryption), then back again (known as decryption). Individuals who practice this field are known as cryptographers.

Top Articles
Latest Posts
Article information

Author: Edmund Hettinger DC

Last Updated:

Views: 6326

Rating: 4.8 / 5 (78 voted)

Reviews: 93% of readers found this page helpful

Author information

Name: Edmund Hettinger DC

Birthday: 1994-08-17

Address: 2033 Gerhold Pine, Port Jocelyn, VA 12101-5654

Phone: +8524399971620

Job: Central Manufacturing Supervisor

Hobby: Jogging, Metalworking, Tai chi, Shopping, Puzzles, Rock climbing, Crocheting

Introduction: My name is Edmund Hettinger DC, I am a adventurous, colorful, gifted, determined, precious, open, colorful person who loves writing and wants to share my knowledge and understanding with you.