Skip to main content

Will Quantum Computers Threaten Modern Cryptography?

Modern cryptography, including elliptic curve cryptography, is being used extensively for securing our internet payments, banking transactions, emails and even phone conversations. The majority of today’s cryptographic algorithms are based on public-key encryption, which is considered to be secure against attacks from modern computers. Quantum computing can simply break this security by reverse computing private keys faster than a conventional computer.

RISK OF QUANTUM COMPUTING

Although quantum computers are still in their infancy and non-operational, with publicly known experimental quantum computers too small to attack conventional cryptographic algorithms, many national governments and organizations have begun to understand the risk involved when this technology becomes a practical reality.
Military agencies and leading technology companies have already increased fundings and accelerated processes in developing quantum computers because of the fact that it can process massive amounts of data in a relatively short amount of time. With the amount of practical and theoretical research being carried out, the birth date of a practical quantum computer is not far away.
Conventional cryptographic systems offer computational security but does not ensure absolute or unbreakable security. The strength of the current cryptographic algorithms rely on complex mathematical problems, such as integer factorization and elliptic curve discrete logarithm problem.
These problems can be solved using large-scale quantum computers and therefore can easily crack conventional algorithms. As a result, security experts have begun designing new encryption algorithms that are considered quantum-resistant that can’t be cracked as quickly as conventional algorithms.

THREAT TO CRYPTOGRAPHY

Recently, The National Security Agency (NSA) acknowledged the quantum computing threat by publicly announcing their plans for transitioning to quantum resistant algorithms. Public recognition of the quantum computing threat has raised concerns over Public Key Infrastructure (PKI) that is used extensively in securing the world wide web.
Quantum computers will be a threat to both symmetric key algorithms (Block ciphers), and asymmetric public key algorithms (RSA, DSA and ECC). These computers can break every single popular public key algorithm in a trivial amounts of time. Quantum algorithms, such as Shor’s algorithm, could be used to recover an RSA key in polynomial time, but quantum computers with sufficient strength currently do not exist.
Post-quantum cryptography is being used for designing cryptographic algorithms that are considered to be secure against attack by quantum computers. It is estimated that 2048-bit RSA keys could be broken on a quantum computer comprising 4000 qubits and 100 million gates. Although there are few public-key algorithms that are considered unbreakable, they are not well-studied or used in the present day.
Quantum cryptography is based on hard and complex mathematical problems to provide security that is stronger than traditional cryptography. If quantum computing becomes a reality, it will result in re-engineering and enhancements in current cryptographic systems.
It will definitely take a while before the large-scale quantum computers become a reality. Experts are trying to figure out cryptographic mechanisms to transition to new schemes that resist quantum attacks. This transition should take place well before our systems become vulnerable to attacks. One should also note that this transition or migration would be a tough problem to solve.
Originally posted on TripWire at https://www.tripwire.com/state-of-security/featured/will-quantum-computers-threaten-modern-cryptography/
Image source: https://iotpractitioner.com/quantum-computing-series-part-9-cryptography/

Comments

Popular posts from this blog

Difference Between Information Security and Cyber Security

I have been working the cybersecurity field for many years. I have come across people with different levels of technical knowledge, but very few possess the ability to explain a complex technical concept in simple terms. The funny part is, I have also seen people explaining simple concepts in the most complicated form. Understanding and correlating is the mother of all knowledge No technology remains fixed. Technology starts, develops, persists, mutates, stagnates, and declines. With the ever-growing advancement in technology, the amount of time a person spends in understanding the technology is comparatively lower. Gone are the days when children and teenagers would play around with breaking and reassembling toys. Today's children and teenagers spend most of their playtime on gadgets and social media platforms. The ability to break and reassemble things is slowly fading away from the younger generation. The education pattern in schools and colleges must be upgraded to compl...

What is the relationship between Software Lines of Code and Security Bugs ?

Our world today is more connected than ever. We have our pacemakers, 3D printers, Insulin pumps and even cars connected to the internet. Moore's law states that the number of transistors on integrated circuits would double every two years. Or in simple terms, the processing speed will double every two years or 18 months or 12 months. With the drastic growth in processing powers, we saw a steep increase in the internet connected systems and software. The millennials are too dependent on internet and apps for personal data storage, banking, studies and even employment. The source code of Apollo 11 Guidance system that took the US to the moon and back was published on GitHub. It contains 145,000 Lines of Code (LOC). Now compare that with a space shuttle that uses a 400,000 LOC, curiosity (rover) 2.5 Million LOC, Android 12 Million LOC and Google services which is at a whopping 2 Billion LOC. Many researches state that, on average, there are around 30 to 50 bugs in 1000 LOC. No...

Security Nightmare of Driverless Cars

Security Nightmare of Driverless Cars The fear of malicious actors taking control of glaring flaws in smart cars is on the rise. This threat is therefore considered to be one of the major technical challenges confronting the automotive industry today. CAR MANUFACTURERS Initially, car manufacturers were not very familiar with the cyber security community. From a hacker’s perspective, as more and more cars are connecting to the internet, the attack surface area increases drastically.  Remote access to vehicles could be gained through vulnerabilities in the connected ecosystem. With the series of controlled hacking demonstrations on autonomous vehicles leading to discovery of fundamental flaws, companies are starting to notice the potential security threats.  “Such incidents could demolish public confidence in autonomous vehicles overnight and undo years of costly research and development,” says Jan Mohr, who co-authored a research report on driverless cars. For complete articl...