The Quantum Computing effect on Cryptography (2024)

Quantum computing is an emerging technology based on the laws of quantum physics and capable of solving problems that are too complex for classical computers.

Quantum computing holds immense potential for revolutionizing various industries, offering unprecedented computational power to tackle complex problems currently intractable for classical computers. Its potential impact is far-reaching, encompassing diverse fields such as healthcare, finance, materials science, artificial intelligence, and logistics.

Cryptography is a way of securing information through encryption which is further based on mathematical algorithms. Whether it is email usage, web browsing, networking devices or big data centers, it is cryptography that makes it secure for end users.

Cryptography forms the backbone of all digital world communication. It helps establish the digital trust needed across the online world.

While quantum computing remains nascent, its potential applications are vast and transformative. As technology matures and becomes more accessible, it is poised to reshape industries and create new opportunities for innovation and growth. Businesses that embrace quantum computing early on will have a significant advantage in navigating this transformative era.

Read this blog on the latest cryptography trends to know about the various widely adopted solutions and options. The solutions are promising and offer the highest level of security while adhering to compliance requirements.

With the ongoing research and development, the ever-increasing quantum computing capacity poses a grave threat to current cryptography algorithms. With quantum computers, compromising encryption methods that otherwise would take years could be done (theoretically) in days. Let’s try to understand the vulnerabilities, the action being taken, and the logical steps required to counter the threat.

How it all started

In 1981, Nobel laureate Richard Feynman, an American theoretical physicist, laid the foundation of Quantum computing. He proposed the idea of using Quantum mechanics and computer science to derive exponentially advanced hardware capable of performing operations that classical computers can’t.

Later, in 1994, Peter Shor, who was then at Bell Labs and is now an MIT professor, developed a quantum algorithm for factoring large numbers exponentially faster than classical computers. This confirmed the potential of quantum computing to break modern cryptographic protocols.

What is the threat quantum computing poses to our present encryption algorithms?

How do quantum computers pose a cybersecurity threat? Let’s look at two quantum algorithms:

· First one was published in 1994 by Peter Shor, who was then at Bell Labs and is now an MIT professor, helps quantum machines find the prime factors of integers incredibly fast.

· Second was published in 1996 by Lov Grover of AT&T's Bell Labs, for searching unsorted databases. This algorithm helps quantum computers search for possible permutations much faster.

A report on quantum computing published by the US National Academies of Sciences, Engineering, and Medicinepredictedthat a powerful quantum computer running Shor’s algorithm would require a 2000-qubit computer to crack a 1,024-bit implementation of RSA in less than a day.

Using Grover’s algorithm, quantum computers can break symmetric key algorithms of small sizes. Grover’s algorithm can exhaustively search for keys of symmetric-key algorithms—however, the number of operations needed to perform the search increases exponentially with an increase in key size.

To summarize, quantum computers can break most of the asymmetric key algorithms but cannot break symmetric key algorithms with larger key size.

Recommended by LinkedIn

Quantum Computing in Cybersecurity: A New Frontier Dr. Jason Edwards, DM, CISSP, CRISC 5 months ago
The Quantum Frontier: NTT's Quest for Unbreakable… NTT 9 months ago
Navigating the Risks of Quantum Computing: Challenges… Ajay Upadhyay 2 months ago

Cut to the present!

On 4th Dec 2023, in their Quantum Summit event, IBM attained another milestone by unveiling 'Condor’, a 1,121-qubit chip. Condor is the largest such quantum chipever released. Prior to this, in Nov 2022, IBM has launched Osprey, a 433-qubit machine with three times more qubits than its Eagle machine, announced in Nov 2021.

As per IBM quantum roadmap, they plan to keep pushing the limits as it strives to reach its 100,000-qubit goal by 2033.

The pace with which quantum computing has evolved is encouraging and quite promising. With further advancements, Quantum computing will make most currently used cryptographic solutions insecure and will radically change the existing threat models.

What is Post Quantum Cryptography?

Can a quantum computer crack the current cryptographic defense?

It seems highly unlikely with the current quantum computers, but everything seems possible with advancements in quantum computing space.

Post-Quantum cryptography (PQC) aims not just to develop new standards that can secure against unforeseen quantum threats but also provide a pathway for implementing PQC standards supporting the current digital setup.

With that in sight, the US National Institute of Standards and Technology initiated a program in 2016 to search for quantum resistant algorithms that can be part of their post-quantum cryptography standardization project. In 2022 the announcement was made, the algorithms that will make it into the standard so far are namedCRYSTALS-Kyber, CRYSTALS-Dilithium,FALCONandSPHINCS+.

NIST says the four algorithms “rely on math problems that both conventional and quantum computers should have difficulty solving”. NIST has another four algorithms under consolidation for the announcement at a future date**.

**Source - https://www.itnews.com.au/news/post-quantum-cryptography-algorithms-named-582291

Conclusion

Quantum computing has come a long way, from being theoretical concepts to working models with tremendous computing capabilities. It won’t be an exaggeration to say that quantum computing will attain the capacity required to break asymmetric key encryption in the next few years.

With increasing online presence, dependence on remote ways of working and ever-increasing volume of data, securing the way we exchange and transmit data becomes important and imminent.

The Quantum Computing effect on Cryptography (2024)

FAQs

The Quantum Computing effect on Cryptography? ›

Quantum computing could impact encryption's efficacy

How does quantum computing affect cryptography? ›

One domain where its impact looms large is cryptography – the art of secure communication. Quantum computers, with their unique parallelism capability, can execute tasks such as factoring large numbers, simulating quantum systems, and optimizing complex algorithms with unparalleled efficiency.

How does quantum computing affect Cryptocurrency? ›

Quantum Computing and Cryptocurrency

Moreover, quantum computers could potentially break the encryption standards that secure cryptocurrencies. For example, they could decrypt the private key from a public key, enabling bad actors to control, and ultimately access, others' cryptocurrencies.

How can quantum computing break todays cryptography? ›

Quantum computing poses a significant threat to current encryption methods because it can perform calculations that are infeasible for classical computers. This threat arises from quantum algorithms that can efficiently solve problems fundamental to cryptographic security. The foundation of encryption is mathematics.

What happens to encryption after quantum computing? ›

As such, quantum computers have the potential to render current encryption methods vulnerable to attack, compromising the security of sensitive data. Thus, the threat becomes real when more powerful quantum computers are developed in the future, which could defeat commonly used encryption systems.

What is the quantum threat to cryptography? ›

An attacker can intercept and store encrypted data today, and when quantum computers become feasible, the attacker could decrypt the stored data. If quantum computers are realised in fewer than the number of years the data must be confidential for, the security requirement has been broken.

What is the most major impact of quantum computing on cybersecurity? ›

The most pressing concern is the potential vulnerability of current encryption methods. Modern encryption, such as RSA and ECC, relies on the computational difficulty of problems like integer factorization and discrete logarithms.

Is Bitcoin hackable with quantum computing? ›

According to researchers at the University of Sussex, a quantum computer with 1.9 billion qubits of processing power would be needed to break into the Bitcoin network within 10 minutes. This would require hackers to deploy millions of quantum computers, a scenario that is highly unlikely for the foreseeable future.

How will quantum computing affect IT security? ›

Planning for quantum computing risk

Quantum computers will be able to break common encryption methods at an alarming speed. Encryption tools currently used to protect everything from banking and retail transactions to business data, documents and digital signatures can be rendered ineffective – fast.

Can quantum computers make cryptocurrency mining obsolete? ›

No. Contrary to some answers quantum computers are no better at solving sha256 then a traditional computer and thus would be no better at mining. Infact they would be much worse then current asic hardware since asics are hard encoded to do sha256 as fast as possible.

How does quantum break cryptography? ›

Specifically, a quantum computer could take a publicly available public key and derive the associated private key from it. This means that any data encrypted using that public key could now be decrypted without the consent of the party that sought to protect that data.

Why did NASA stop quantum computing? ›

The abrupt shutdown of NASA's quantum computing project was triggered by an unforeseen incident during a routine test. During the analysis of a complex simulation, the quantum computer demonstrated unprecedented computational power, solving a previously intractable problem.

How fast could a quantum computer break encryption? ›

Most implementations of RSA rely on at least 2048-bit keys, which is equivalent to a number 617 digits long. Fujitsu researchers recently calculated that it would take a completely fault-tolerant quantum computer with 10,000 qubits 104 days to crack a number that large.

How is quantum computing used in cryptography? ›

Quantum key distribution (QKD), the most widely studied and viable method of quantum cryptography, uses a series of photons to transmit a secret, random sequence, known as the key. By comparing measurements taken at either end of the transmission, users will know if the key has been compromised.

How will quantum technologies change cryptography? ›

One of the most notable advantages of quantum cryptography over traditional cryptography is that it makes complex computing problems easier and faster to solve. For example, quantum cryptography is capable of breaking encryption types in the public key infrastructure (PKI) pretty quickly.

Will quantum computing make encryption obsolete? ›

Yes, some current encryption methods will become obsolete (e.g. rsa). However there are plenty of “post quantum” or “quantum secure” encryption schemes that quantum computers cannot break.

How will quantum computing affect security? ›

Implementation of a practical quantum computer will render most current asymmetric encryption methods unsafe, such as RSA, Diffie-Hellman (DH), and Elliptic Curve Cryptography (ECC). Back in 1994, Peter Shor developed a theoretical quantum algorithm to find the prime factors of a large integer.

What would be the future of cryptography with the quantum computer? ›

Quantum cryptography is still considered in its early development phases, but after it's polished and ready, it'll make all other encryption methods obsolete. Once quantum cryptography becomes more accessible, many businesses will switch to it to provide more advanced protection for their data.

What cryptography protocols are vulnerable to a quantum computer? ›

As it turns out, quantum computers can theoretically be used to break all existing implementations of asymmetric cryptography — not only RSA, but Diffie-Hellman and elliptic curve cryptography as well. Interestingly, symmetric cryptography, the less mathy encryption scheme, is not as vulnerable.

Is quantum computing a threat to symmetric encryption? ›

The NCSC recognises that: “in contrast with PKC, the security of symmetric cryptography is not significantly impacted by quantum computers, and with suitable key sizes, existing symmetric algorithms - such as AES - can continue to be used.” AES refers to the Advanced Encryption Standard algorithm, a NIST approved ...

Top Articles
How Bank Loans Work: Advantages, Disadvantages and Things You Need To Know
Top 10 Doomsday Preppers Supplies
neither of the twins was arrested,传说中的800句记7000词
Part time Jobs in El Paso; Texas that pay $15, $25, $30, $40, $50, $60 an hour online
Pga Scores Cbs
Explore Tarot: Your Ultimate Tarot Cheat Sheet for Beginners
Eric Rohan Justin Obituary
Myhr North Memorial
Tx Rrc Drilling Permit Query
Ou Class Nav
Ogeechee Tech Blackboard
Housing Intranet Unt
Tiger Island Hunting Club
Culvers Tartar Sauce
Persona 4 Golden Taotie Fusion Calculator
Raleigh Craigs List
State HOF Adds 25 More Players
Dallas Cowboys On Sirius Xm Radio
Katherine Croan Ewald
Sonic Fan Games Hq
Walmart stores in 6 states no longer provide single-use bags at checkout: Which states are next?
How Much You Should Be Tipping For Beauty Services - American Beauty Institute
Prestige Home Designs By American Furniture Galleries
Huntersville Town Billboards
UPS Store #5038, The
Schedule An Oil Change At Walmart
yuba-sutter apartments / housing for rent - craigslist
Mybiglots Net Associates
Speedstepper
Dr Seuss Star Bellied Sneetches Pdf
Black Panther 2 Showtimes Near Epic Theatres Of Palm Coast
Jackass Golf Cart Gif
Askhistorians Book List
Little Einsteins Transcript
2487872771
Math Minor Umn
Tamilrockers Movies 2023 Download
How does paysafecard work? The only guide you need
Rise Meadville Reviews
Bimmerpost version for Porsche forum?
303-615-0055
Citibank Branch Locations In Orlando Florida
Karen Wilson Facebook
Best Restaurants West Bend
Po Box 101584 Nashville Tn
Europa Universalis 4: Army Composition Guide
Streameast Io Soccer
Unit 11 Homework 3 Area Of Composite Figures
Pronósticos Gulfstream Park Nicoletti
How to Choose Where to Study Abroad
Lux Nails & Spa
Supervisor-Managing Your Teams Risk – 3455 questions with correct answers
Latest Posts
Article information

Author: Rob Wisoky

Last Updated:

Views: 5951

Rating: 4.8 / 5 (68 voted)

Reviews: 91% of readers found this page helpful

Author information

Name: Rob Wisoky

Birthday: 1994-09-30

Address: 5789 Michel Vista, West Domenic, OR 80464-9452

Phone: +97313824072371

Job: Education Orchestrator

Hobby: Lockpicking, Crocheting, Baton twirling, Video gaming, Jogging, Whittling, Model building

Introduction: My name is Rob Wisoky, I am a smiling, helpful, encouraging, zealous, energetic, faithful, fantastic person who loves writing and wants to share my knowledge and understanding with you.