Quantum Computing — a threat to encryption? (2024)

What impact do quantum computers and the use of quantum computing have on current encryption methods? What are the benefits of developing such computers? And how will the methods used today evolve? Fabian Hauser, who joined our tech team in March 2021, addressed these questions among others in his bachelor’s thesis. In the following, we present an excerpt from his work.

Quantum Computing: Its Potential Impact on Current Encryption Methods

Nowadays, there are many different encryption methods for a wide variety of applications. These methods often use their own procedures to disguise the message. For example, in public-key encryption, finding a key pair is based on mathematical problems (1) that are virtually unsolvable by even the most powerful supercomputers. What happens, however, if the problems on which these methods are based can suddenly be solved by another kind of computer?

As early as 1997, Peter Shor showed that it is possible in theory to solve two of these problems, prime factorization and finding discrete logarithms, with the use of quantum mechanics (2).

There are still several mathematical problems today that cannot be computed efficiently on general-purpose computers, including factoring integers and finding discrete logarithms. Due to this lack of efficient computation, these two problems have given rise to several encryption schemes, such as the elliptic curve method (ECC)(3) and RSA (4). For example, if an average computer were to attempt to crack an RSA algorithm with a by the National Institute of Standards and Technology (NIST) recommended key length of 2048 bits and thus solve its prime factorization, it would take a time of over 14 billion years (6).

In 1997, however, Peter Shor published a paper in which he presented methods that could theoretically solve these problems on a quantum computer (2). From that point on, it was clear that current encryption methods were in acute danger due to the completion of powerful quantum computers.

Encryption of Files: Using Boxcryptor as an Example

However, let us first look at encryption methods currently used in practice, using the encryption software Boxcryptor as an example. Boxcryptor proceeds the encryption of files as follows: First, a random and secure file key is generated for each file. This key is an AES key and in the next step, it is also responsible for encrypting and decrypting the plaintext of the file. In addition to these file keys, each user also has their own RSA key pair (user key) with a public and a private key which goes into action in the next step. This is then used to encrypt the previously generated file key with the RSA public key. Finally, this encrypted file key is stored together with the previously ciphered data in the encrypted file.

When decrypting the file later, this procedure is reversed. Initially, the file key is decrypted using the private user key, and then the encrypted contents of this file are decrypted again using this key. An AES algorithm “with a key length of 256 bits, CBC (Cipher Block Chaining) and PKCS7 padding” is used for the file key, while an RSA algorithm “with a key length of 4096 bits and OAEP padding” is used for the user key.

When looking at the previously described file encryption chain, however, it is noticeable that this sequence depends on the secrecy of the private RSA key. If attackers get hold of this, the file key can be decrypted with it, and thus, also the contents of the file. Therefore Secomba GmbH, as the company behind the software Boxcryptor, is interested in advances in encryption technology. Should quantum computers be powerful enough to crack a 4096-bit RSA encryption in a few years, the security of all customers’ data would no longer be guaranteed. To specifically secure users’ sensitive documents against attacks such as industrial espionage, the Boxcryptor encryption solution must be able to guarantee the security of data also in a post-quantum era.

Quantum Computing: Status Quo and Current Challenges

23 years after Peter Shor was able to show in theory that it is possible to solve prime factorization and finding discrete logarithms with the use of quantum mechanics, research is at a very advanced stage. The first quantum computers now manage to compute such mathematical problems faster than the best supercomputers in the world (7). However, current quantum computers require high computation time for smaller combinatorial problems. This is especially due to the high error-proneness, which is amplified by external influences such as vibration, temperature fluctuations, or electromagnetic waves (8).

Therefore, on this type of computer algorithms must run through a certain number of repetitions to get a realistic result. The disadvantage is that in most cases this repeated execution causes the previously gained computing time to be forfeited again since otherwise, the error rate would be too high.

Experts believe that a time of about 20 years is still needed for the development of universal quantum computers (9 & 10). Nevertheless, the development of the last 20 years must be considered. Few scientists would probably have imagined that nowadays the first 54-qubit quantum computers (Google’s Sycamore) are already available, and the algorithms designed in theory at that time, such as Shor, can already be practically applied to some cases. Accordingly, it is difficult to predict the extent to which this field of research will continue to develop, as even single breakthroughs can mean major advances.

But there are still some problems that need to be solved, such as effective cooling of the system so that the qubits are protected from external temperature effects. If any of these turn out to be particularly complex and take several years to solve, progress can also quickly stagnate. According to the current state of research, however, quantum computers of such high performance do not yet exist, which would put the methods currently in use, and probably those of the next decade, in danger.

Excursus: Quantum Computing and Simulation Platforms: IBM Quantum Composer and Microsoft Q#

So far, a few companies have managed to build quantum computers with a few qubits. For example, Paris 53-qubit from IBM (11) or Sycamore 54-qubit from Google (12). However, these are mainly for research. Private individuals do not have the opportunity to experiment with them. Due to the increasing interest of the public, it is only logical that more and more people turn to this topic to gain their first experience in this field. To meet this demand, several companies have already started attempts to develop so-called simulation platforms of quantum computers, which are freely accessible and allow dealing with quantum bits.

Since simulation platforms are run on classical computers, they obviously do not have access to qubits due to physical constraints. However, to simulate n qubits, the machine needs a storage capacity and computation time of 22N (13, p. 1073). If now numbers should be computed, for whose representation some bits are needed, the computational effort for the platforms increases thus enormously, which finally results in a very long computation time.

Two well-known platforms through which private persons interested in the development of quantum algorithms can already carry out small experiments today and thus set foot into the world of quantum computing are IBM Quantum Composer and Microsoft Q#.

IBM Quantum Composer

The Quantum Composer offers a very easy introduction to quantum computing, as it is a graphical user interface that can be used to click together entire quantum circuits using simple drag-and-drop. The advantage of this is that no programming language needs to be learned, and individual algorithms can be easily recreated to understand how quantum algorithms and qubits work. In addition, it is possible to execute the built circuits either on simulations or on real quantum computers without major detours.

Visit here the website of the IBM Quantum Composer.

Microsoft Q#

Microsoft announced its programming language specifically for quantum computing at the annual Ignite conference in 2017. This open-source programming language is part of Microsoft’s Quantum Development Kit (QDK), which includes Q# libraries, a simulator, and extensions for other programming environments. The syntax of Q# has strong influences from Python, C#, and F# and includes new quantum operations and data structures as well as common programming components such as loops or if-else branches. Here, all common quantum gates are implemented and syntactically quite similar executable.

Visit here the website of the Microsoft Q#.

Conclusion

Quantum computing is a very exciting topic and, compared to previous years, is no longer completely theoretical. With the help of simulation platforms, interested private persons can nowadays work with qubits and thus reproduce the first quantum algorithms. This is an important step, as it increases the general interest in the topic, and more and more the importance of this research area is recognized. Even if a universal quantum computer were to be developed soon, it will never replace the digital computer we are familiar with, but it will be used as a certain supplement for individual problems.

Especially regarding encryption methods, an interesting aspect is that with the development of such computers, previous methods can be considered insecure. At the same time, a rethinking takes place since new paths are also opened for other methods. “Quantum cryptography” deals with these new possible methods. Nonetheless, neither quantum computing nor post-quantum methods are at a level that can be practically applied in today’s world.

However, we will keep an eye on the subject area of quantum computing. Should the progress of science in this field be faster than expected so far, we, the team of Secomba GmbH, will react and take on the implementation of a post-quantum encryption method with our new colleague Fabian Hauser. Until then, however, you can be sure that your data worth protecting will remain your secret.

Sources:

I am YouChat, a large language model from You.com. I have access to a wide range of information and can provide insights on various topics. I can help answer questions and engage in discussions on quantum computing, encryption methods, and related concepts.

Regarding the impact of quantum computers on current encryption methods, it is important to note that quantum computers have the potential to significantly impact encryption. Quantum computers leverage the principles of quantum mechanics to perform computations that are exponentially faster than classical computers for certain problems. This includes the ability to solve mathematical problems that are the basis for many encryption methods used today.

In 1997, Peter Shor demonstrated that quantum computers could theoretically solve two important mathematical problems used in encryption: prime factorization and finding discrete logarithms. These problems are at the core of encryption schemes such as RSA and elliptic curve cryptography (ECC). While these problems are currently computationally difficult for classical computers, quantum computers could potentially solve them efficiently, rendering current encryption methods vulnerable.

The development of powerful quantum computers could have several benefits. Quantum computers could enable faster and more efficient computations for a wide range of applications, including optimization problems, machine learning, and drug discovery. They could also lead to advancements in fields such as materials science and cryptography.

However, the methods used today are expected to evolve in response to the potential threat posed by quantum computers. Researchers are actively working on developing post-quantum encryption methods that are resistant to attacks from quantum computers. These methods aim to provide secure encryption even in the presence of powerful quantum computers.

It is worth noting that the development of universal quantum computers is still ongoing, and it may take several more years before they reach a level of performance that poses a significant threat to current encryption methods. Quantum computers currently face challenges such as high error rates and the need for effective cooling to protect qubits from external influences. Additionally, the development of practical quantum algorithms and the implementation of large-scale quantum systems are complex tasks that require further research and technological advancements.

In conclusion, while quantum computers have the potential to impact current encryption methods, the field is still evolving, and the methods used today are expected to evolve in response. Researchers are actively working on developing post-quantum encryption methods to ensure secure communication in a post-quantum era. The development of powerful quantum computers could also bring several benefits in various fields beyond encryption.

Please note that the information provided above is based on general knowledge and may not cover all aspects of the topic. For more specific or detailed information, it is recommended to refer to academic papers, research articles, or consult experts in the field.

Quantum Computing — a threat to encryption? (2024)
Top Articles
Latest Posts
Article information

Author: Rueben Jacobs

Last Updated:

Views: 6324

Rating: 4.7 / 5 (77 voted)

Reviews: 92% of readers found this page helpful

Author information

Name: Rueben Jacobs

Birthday: 1999-03-14

Address: 951 Caterina Walk, Schambergerside, CA 67667-0896

Phone: +6881806848632

Job: Internal Education Planner

Hobby: Candle making, Cabaret, Poi, Gambling, Rock climbing, Wood carving, Computer programming

Introduction: My name is Rueben Jacobs, I am a cooperative, beautiful, kind, comfortable, glamorous, open, magnificent person who loves writing and wants to share my knowledge and understanding with you.