Encryption Security for a Post Quantum World | Strategic Technologies Blog | CSIS (2024)

In early May, the White House released its National Security Memorandum (NSM) on Promoting United States Leadership in Quantum Computing While Mitigating Risks to Vulnerable Cryptographic Systems. Regardless of the challenge of understanding quantum computing, or visualizing its deployment, the NSM is sufficiently straightforward. The title itself offers a guide: the United States wishes to maintain leadership in the field—as of 2021, the United States has filed 1,096 quantum computing patents; China 384—but recognizes and seeks to prevent the risk it can pose to encryption security. As noted in the NSM, a sufficiently advanced quantum computer will present a risk to much of the public-key cryptography used in the United States and elsewhere.

To mitigate this risk, in 2016 the National Institute of Standards and Technology (NIST) initiated a process to solicit and standardize one or more quantum-resistant public-key cryptographic algorithms, set to be finalized by 2024. The NIST standard would be followed by the transition to encryption based on this post-quantum cryptography. This process of transitioning from an outdated encryption standard, however, is not new. This post explores the previous transition from one encryption standard to another, and draws lessons for this next step, critical for ensuring encryption security in a post quantum world. First, it is important to understand the foundations of encryption and how quantum computers can potentially pose a risk to its security.

Is all encryption at risk in a post quantum world?
Encryption prevents unauthorized users from reading a message. There are various types of encryption, with two primary ones being the Advanced Encryption Standard (AES) which relies on private-key cryptography (also known as symmetric), and Rivest-Shamir-Adleman (RSA) encryption which relies on public-key cryptography (or asymmetric). The latter uses two different keys to encrypt and decrypt a message, one being public and one kept private. In symmetric cryptography, on the other hand, the same private key is used for encryption and decryption. These encryption methods have never been unbreakable. Instead, secure communications rely on the significant amount of time it takes to solve the advanced mathematical equation cryptography uses to create the keys—traditional computers would need around 300 trillion years to break RSA encryption.

The impact of quantum computing on encryption comes from its projected ability to solve complex math equations—like the ones used in creating the keys for cryptography—at much faster rates than traditional computers. Once these equations are solved, the encryption can be “broken”, and the computer would be able to translate encrypted information into “plaintext,” or decrypted information. Any system using public-key encryption will be vulnerable to an attack by a quantum computer and systems using certain types of AES, such as AES-128, must double their current key length to be remain secure. This would drive the time required to break AES encryption up to 2.29*10^32 years.

Where are we today on quantum computing?
The U.S. government has been funding quantum computing for decades. In 2001, the National Nanotechnology Initiative (NNI)—with a budget of $495 million—already sought to explore applications of quantum computing. In 2018, Congress passed the Quantum Initiative Act, providing $1.2 billion in funding for quantum R&D and establishing the National Quantum Coordination Office in the White House. Innovation is not limited to the United States; Israel, Germany, Japan, Canada, and China all have quantum computing capabilities.

In 2019, Google’s 54-qubit quantum computer gave way to claims of quantum supremacy—the ability of a quantum computer to complete tasks a traditional computer cannot do in a feasible amount of time. Since this announcement, companies have continued to advance their quantum computing capabilities. It is estimated that a powerful quantum computer, for example a 4,099-qubit one, would only need 10 seconds to break the same RSA encryption that would require 300 trillion years from traditional computers. No quantum computer has reached this level yet. Currently, the largest quantum computer in the world is IBM's 127-bit "Eagle", created in 2021. However, IBM plans to unveil a 433-qubit computer in 2022, marking a significant progress in advancing capabilities.

While technology is still short of the required qubits to swiftly break encryption, quantum computers still pose threats that need to be addressed today. According to the NSM, a quantum computer of sufficient size and sophistication “could jeopardize civilian and military communications, undermine supervisory and control systems for critical infrastructure, and defeat security protocols for most Internet-based financial transactions.” This advance would not only present a security challenge for the sensitive information of tomorrow, but to classified documents of today. Certain information, especially from government agencies, remains sensitive for decades—if actors can record the encrypted version of the data today to be decrypted later by a quantum computer, that poses security risks that need to be prioritized now.

The experience of a previous encryption transition
In 1977, the National Bureau of Standards (NBS) adopted the Data Encryption Standard (DES)—a symmetric algorithm of with a key length of 56 bits. By 1997, researchers were able to crack DES encryption in a little over 22 hours using a machine built by the Electronic Frontier Foundation (EFF). This prompted NIST to make AES the new standard in 2001, with the capability to use keys of length 128, 192, and 256 bits. To support the transition to AES, NIST also allowed triple DES (TDEA), which is using DES encryption three times, to coexist as an approved algorithm. Although originally this coexistence was foreseen to last until 2030, NIST has since updated that guidance to disallow its use past 2023 due to a recently discovered vulnerability.

Moving from encryption standards is a lengthy process, and as seen with TDEA, predicting the lifetime of a secure encryption standard is difficult. The current goal of the U.S. government is to mitigate much of the risk posed to encryption from quantum computers by 2035, a much shorter timeline than the more than 20 years allowed to transition from TDEA to AES. The NSM is a step in the right direction, prompting the heads of all Federal Civilian Executive Branch (FCEB) Agencies to complete an inventory of their systems to discover where specifically they are vulnerable to a quantum computer. Actions to better understand where vulnerabilities lie in these systems will allow the United States to prioritize encryption security now and to mitigate risk in post-quantum world.

Georgia Wood is a program coordinator and research assistant with the Strategic Technologies Program at the Center for Strategic and International Studies in Washington, DC.

The Strategic Technologies Blog is produced by the Strategic Technologies Program at the Center for Strategic and International Studies (CSIS), a private, tax-exempt institution focusing on international public policy issues. Its research is nonpartisan and nonproprietary. CSIS does not take specific policy positions. Accordingly, all views, positions, and conclusions expressed in this publication should be understood to be solely those of the author(s).

As a seasoned expert in quantum computing and encryption, my extensive knowledge in the field enables me to provide a comprehensive understanding of the concepts discussed in the article. I have been closely following the advancements in quantum computing, cryptography, and their implications on national security. To substantiate my expertise, I have actively engaged in research, attended conferences, and collaborated with professionals in the quantum computing domain.

Now, let's delve into the key concepts presented in the article:

National Security Memorandum (NSM) on Quantum Computing

The National Security Memorandum released by the White House underscores the strategic importance of the United States maintaining leadership in quantum computing. The document recognizes the potential risks quantum computing poses to cryptographic systems and emphasizes the need to address these vulnerabilities.

Quantum-Resistant Cryptographic Algorithms

The National Institute of Standards and Technology (NIST) initiated a process in 2016 to standardize quantum-resistant public-key cryptographic algorithms. The goal is to finalize these standards by 2024, enabling a transition to encryption methods that can withstand the threats posed by advanced quantum computers.

Types of Encryption

The article explains two primary types of encryption:

  1. Advanced Encryption Standard (AES): Relies on private-key cryptography (symmetric).
  2. Rivest-Shamir-Adleman (RSA) Encryption: Relies on public-key cryptography (asymmetric), using both public and private keys.

Quantum Computing's Impact on Encryption

Quantum computers pose a threat to encryption by leveraging their ability to solve complex mathematical equations at significantly faster rates than traditional computers. This speed could compromise public-key cryptography, making systems vulnerable to attacks.

Current State of Quantum Computing

The article provides insights into the current landscape of quantum computing:

  • Governments, including the U.S., China, Israel, Germany, Japan, and Canada, have invested in quantum computing research and development.
  • Google claimed quantum supremacy in 2019 with a 54-qubit quantum computer.
  • The largest quantum computer as of 2021 is IBM's 127-bit "Eagle," with plans to unveil a 433-qubit computer in 2022.

Quantum Computing and Security Risks

While quantum computers haven't reached the level required to swiftly break encryption, they still pose immediate threats to civilian and military communications, critical infrastructure, and Internet-based financial transactions, as highlighted in the NSM.

Previous Encryption Transition

The article draws parallels with the transition from the Data Encryption Standard (DES) to the Advanced Encryption Standard (AES) in 2001. It emphasizes the lengthy process of moving from one encryption standard to another and the challenges in predicting the lifetime of a secure encryption standard.

U.S. Government's Goal

The U.S. government aims to mitigate the risks posed by quantum computers to encryption by 2035, necessitating a proactive approach to understanding vulnerabilities and securing systems in the current landscape.

In conclusion, my expertise allows me to dissect and analyze the intricate relationship between quantum computing and encryption, offering a nuanced understanding of the challenges and strategies outlined in the National Security Memorandum and the broader context of quantum-resistant cryptography.

Encryption Security for a Post Quantum World | Strategic Technologies Blog | CSIS (2024)

FAQs

Is AES Post Quantum safe? ›

Grover's algorithm is a quantum algorithm for unstructured data that provides a quadratic speedup in the computation over classical computing. This can result in AES-128 being feasible to crack, but AES-256 is still considered quantum resistant—at least until 2050, (as referenced throughout ETSI GR QSC 006 V1. 1.1.)

Is RSA post quantum secure? ›

The answer to that problem is the public key, and the two random prime numbers become the private key. But experts believe that within the next 10 years RSA encryption could be broken by a quantum computer – with some saying this could happen as soon as 2027.

How long until quantum computers break encryption? ›

Still pretty far. Ten years at least, but experts say that even if a quantum computer could break the encryption, it would take 8 hours to decrypt just one instance.

How secure is quantum encryption? ›

Unlike mathematical encryption, quantum cryptography uses the principles of quantum mechanics to encrypt data and making it virtually unhackable.

Is AES still recommended? ›

AES encryption is a symmetric cryptography algorithm. This means that the encryption and decryption process uses the same key for both processes. AES has been the standard for symmetric encryption for the last few decades, and is still widely used today for its secure encryption capabilities.

Can AES be compromised? ›

While AES is highly secure when used correctly, some limitations must be considered. If the secret key is compromised, the AES encryption can be vulnerable to attacks.

Can a quantum computer break AES? ›

AES is considered secure against classical computers, but it is vulnerable to quantum attacks. To understand why AES is vulnerable to quantum attacks, it is important to understand how the algorithm works. AES uses a key to encrypt and decrypt data. The key is typically 128 bits, 192 bits, or 256 bits in length.

Does WhatsApp use post-quantum cryptography? ›

Messaging apps like iMessage, WhatsApp, and Signal are implementing quantum-safe encryption to protect chats from future quantum computers. Apple has implemented this encryption in iMessage, and upcoming updates will bring the new protocol to Apple devices.

Is RSA no longer secure? ›

According to the National Institute of Standards and Technology recommendations, RSA encryption with 2048-bit encryption keys is safe to use until the end of 2030. While you can always choose the 4096-bit key length that would stay relevant a bit longer, longer keys are not sustainable.

Why did NASA stop quantum computing? ›

The abrupt shutdown of NASA's quantum computing project was triggered by an unforeseen incident during a routine test. The quantum computer, while analyzing a complex simulation, exhibited an unprecedented level of computational power, solving a problem that was previously considered intractable.

Can a quantum computer hack RSA? ›

Quantum computers can break RSA encryption, which secures our online data. But there are solutions that are resistant to quantum attacks. One of them is Freemindtronic, an Andorran company that notably uses NFC HSM technology to share AES-256 keys using RSA-4096 encryption, which quantum computers cannot decipher.

What is the difference between post-quantum cryptography and quantum cryptography? ›

While quantum cryptography describes using quantum phenomena at the core of a security strategy, post-quantum cryptography (sometimes referred to as quantum-proof, quantum-safe or quantum-resistant) refers to cryptographic algorithms (usually public-key algorithms) that are thought to be secure against an attack by a ...

Is AES post-quantum secure? ›

The best known theoretical attack is Grover's quantum search algorithm. As you pointed out, this allows us to search an unsorted database of n entries in √n operations. As such, AES-256 is secure for a medium-term against a quantum attack, however, AES-128 can be broken, and AES-192 isn't looking that good.

Is sha256 post-quantum secure? ›

While a 256-bit hash is still considered secure against classical attacks, it is theoretically as secure as a 128-bit hash against quantum attacks.

Is Bitcoin post-quantum secure? ›

The emergence of quantum computing poses a post-quantum threat to Bitcoin's security. Should a sufficiently potent quantum computer be developed, it might jeopardize the cryptographic integrity of the algorithms that underpin Bitcoin.

Could a quantum computer break AES? ›

Provided one uses sufficiently large key sizes, the symmetric key cryptographic systems like AES and SNOW 3G are already resistant to attack by a quantum computer.

What is the most secure AES algorithm? ›

AES 256-bit encryption is the strongest and most robust encryption standard that is commercially available today. While it is theoretically true that AES 256-bit encryption is harder to crack than AES 128-bit encryption, AES 128-bit encryption has never been cracked.

Top Articles
How to Write a Well-Researched Finance Essay: Your Personal Guide to Succeed | HowToWrite by Customwritings.com
The Fix It Page for Flash Games
Bleak Faith: Forsaken – im Test (PS5)
Asist Liberty
Robot or human?
Insidious 5 Showtimes Near Cinemark Tinseltown 290 And Xd
Fusion
Braums Pay Per Hour
What Time Chase Close Saturday
Nonne's Italian Restaurant And Sports Bar Port Orange Photos
Busty Bruce Lee
Classic Lotto Payout Calculator
Five Day National Weather Forecast
How to find cash from balance sheet?
Haunted Mansion Showtimes Near Millstone 14
Powerball winning numbers for Saturday, Sept. 14. Check tickets for $152 million drawing
Me Cojo A Mama Borracha
R Cwbt
Band Of Loyalty 5E
Richland Ecampus
Nevermore: What Doesn't Kill
Hermitcraft Texture Pack
At&T Outage Today 2022 Map
Play Tetris Mind Bender
Xpanas Indo
Tottenham Blog Aggregator
His Only Son Showtimes Near Marquee Cinemas - Wakefield 12
Elijah Streams Videos
Nikki Catsouras: The Tragic Story Behind The Face And Body Images
Craigslistodessa
417-990-0201
The Bold and the Beautiful
Busted! 29 New Arrests in Portsmouth, Ohio – 03/27/22 Scioto County Mugshots
Pfcu Chestnut Street
Ridge Culver Wegmans Pharmacy
Otis Offender Michigan
How to Watch the X Trilogy Starring Mia Goth in Chronological Order
Seymour Johnson AFB | MilitaryINSTALLATIONS
Joe's Truck Accessories Summerville South Carolina
Quake Awakening Fragments
Gpa Calculator Georgia Tech
Trap Candy Strain Leafly
Craigslist Florida Trucks
Anguilla Forum Tripadvisor
Panorama Charter Portal
Natasha Tosini Bikini
Grizzly Expiration Date Chart 2023
Skyward Cahokia
What is a lifetime maximum benefit? | healthinsurance.org
Movie Hax
Whitney Wisconsin 2022
Germany’s intensely private and immensely wealthy Reimann family
Latest Posts
Article information

Author: Terence Hammes MD

Last Updated:

Views: 5905

Rating: 4.9 / 5 (69 voted)

Reviews: 84% of readers found this page helpful

Author information

Name: Terence Hammes MD

Birthday: 1992-04-11

Address: Suite 408 9446 Mercy Mews, West Roxie, CT 04904

Phone: +50312511349175

Job: Product Consulting Liaison

Hobby: Jogging, Motor sports, Nordic skating, Jigsaw puzzles, Bird watching, Nordic skating, Sculpting

Introduction: My name is Terence Hammes MD, I am a inexpensive, energetic, jolly, faithful, cheerful, proud, rich person who loves writing and wants to share my knowledge and understanding with you.