What Is Post-Quantum Cryptography?  (2024)

Share

What Is Post-Quantum Cryptography? (1)

Researchers worldwide are racing to develop new devices called quantum computers, which could do many things conventional computers cannot — including breaking the defenses that secure confidential electronic information. NIST is leading a global effort to create electronic defenses against such attacks through its Post-Quantum Cryptography (PQC) project. Read on for some answers to common questions about this developing technology and NIST’s efforts.

What are post-quantum encryption algorithms?

Encryption algorithms protect confidential electronic information, from email messages to medical records and financial statements, from unauthorized viewers. For decades, these algorithms have proved strong enough to defend against attacks using conventional computers that attempt to defeat the encryption. However, a new type of device under development called a quantum computer could break these algorithms, rendering our electronic secrets vulnerable to discovery.

To counter this looming threat, we need encryption methods that can stave off cyberattacks by both the conventional computers we know today and the quantum computers of tomorrow. These new methods are called post-quantum encryption algorithms.

What is quantum computing?

A quantum computer draws upon different scientific concepts than a conventional computer does. It takes advantage of the quantum world’s counterintuitive properties— which enable a bit of data to act as both a 0 and 1 at the same time— to make calculations that would be difficult or impossible on a conventional computer.

If they can be built, sufficiently powerful quantum processors would be able to sift through many potential solutions to a problem simultaneously, zeroing in on the correct answer very quickly. This sort of sifting is a task that conventional computers cannot do very quickly or efficiently.

Why are quantum computers being developed if they can potentially cause so much harm?

There are many helpful things quantum computers will likely be able to do. Quantum computers have the potential to accomplish tasks that involve the interplay of complex variables. These tasks include drug design, simulations of complex molecules, and solutions to the classic “traveling salesman” problem — finding the most efficient route through a number of destinations.

The quantum computing field remains in its infancy. Researchers must overcome major technical hurdles before they can build powerful quantum computers, and it is an open question as to how formidable quantum computers can become. However, advanced quantum computers remain a strong possibility, and they would have such a major impact on present-day encryption that the world must prepare for them.

How does current cryptography work, and how would a quantum computer crack it?

Currently, many encryption algorithms rely on the difficulty conventional computers have with factoring large numbers. Sufficiently powerful quantum computers would not have this difficulty.

Conventional cryptographic algorithms select two very large prime numbers — which are only divisible by 1 and themselves — and multiply them to obtain an even larger number. While multiplying the prime numbers is easy and fast, it’s far more difficult and time-consuming to reverse the process and figure out which two prime numbers were multiplied together, and that’s what a conventional computer would have to do to break this encryption. These two numbers are known as the “prime factors.” For large enough numbers, a conventional computer has been estimated to need billions of years to figure out these prime factors.

A sufficiently capable quantum computer, though, would be able to sift through all of the potential prime factors simultaneously, rather than one by one, arriving at the answer exponentially more quickly. Experts have begun referring to such a mature device as a “cryptographically relevant” quantum computer.Instead of billions of years, it’s possible a quantum computer could solve this puzzle in days or even hours, putting everything from state secrets to bank account information at risk.

What Is Post-Quantum Cryptography? (2)

Credit: J. Wang/NIST and Shutterstock

Why do we need post-quantum encryption, and how will PQC algorithms work?

To stave off attacks by a quantum computer — if and when a cryptographically relevant one is built — the worldwide community must retire current encryption algorithms. Post-quantum encryption algorithms must be based on math problems that would be difficult for both conventional and quantum computers to solve.

The algorithms are designed for two main tasks for which encryption is typically used: general encryption, used to protect information such as passwords exchanged across a public network, and digital signatures, used for identity authentication.

Of the four algorithms NIST has selected as the initial ones to be standardized, three are based on a family of math problems called structured lattices, while the fourth uses mathematical relationships known as hash functions. Instead of requiring a computer to factor large numbers, lattice and hash problemsuse other types of math that experts believe will be hard to solve for quantum computers and conventional computers alike.

Additional algorithms still under consideration are designed for general encryption and do not use structured lattices or hash functions in their approaches.

To put these algorithms into practice, NIST has led efforts to develop technical standards for post-quantum encryption. These standards aim to provide solutions for different situations, employ varied approaches for encryption, and offer more than one algorithm for each kind of application in the event one proves vulnerable.

If cryptographically relevant quantum computers don’t exist yet, why is developing post-quantum encryption algorithms important now?

The world must plan ahead. Historically, it has taken a long time from the moment that a new algorithm is standardized until it is fully integrated into information systems. The process can take 10 to 20 years, partly because companies have to respond to the changes by building the algorithms into products and services we use every day.

No one knows how long it will take to build a cryptographically relevant quantum computer. Predictions vary widely, but some people think it may be possible in less than 10 years.

Even if computer security experts implement post-quantum encryption algorithms before sufficiently powerful quantum computers are built, a lot of encrypted data remains under threat because of a type of attack called “harvest now, decrypt later.”

What is “harvest now, decrypt later”?

Some secrets remain valuable for many years. Even if an adversary can’t crack the encryption that protects our secrets at the moment, it could still be beneficial to capture encrypted data and hold onto it, in the hopes that a quantum computer will break the encryption down the road. This idea is sometimes expressed as “harvest now, decrypt later” — and it’s one of the reasons computers need to start encrypting data with post-quantum techniques as soon as possible.

How did NIST design and select the algorithms it is standardizing?

What Is Post-Quantum Cryptography? (3)

The Journey Toward Quantum Resistant Algorithms: NIST's Initiative

NIST kicked off the Post-Quantum Cryptography projectin 2016 and late that yearformally asked the world’s cryptography experts to submit algorithms that would prove intractable to both classical and quantum computers. By the deadline about a year later, experts from dozens of countries had submitted 69 candidate algorithms that cleared the bar NIST had set.

NIST then released the 69 candidate algorithms for experts to analyze and crack if they could. This process was open and transparent.Over the next several years many of the world’s best cryptographers participated inmultiple rounds of evaluation, which reduced the number of candidates.

NIST has encouraged the world’s cryptographers to look at how the candidate algorithms work not only in big computers and smartphones, but also in devices that have limited processor power. Smart cards, tiny devices such as smart kitchen appliances for use in the Internet of Things, and individual microchips all need quantum-resistant algorithms too.

Why is NIST leading the effort to develop PQC standards?

NIST has extensive experience developing encryption algorithms. NIST has fostered the development of cryptographic techniques and technology for 50 years through an open process that brings together industry, government and academia to develop workable approaches to cryptographic protection that enable practical security.

NIST develops guidance by involving the public to work with NIST’s own accomplished experts. All development steps happen in the public eye, generally with numerous opportunities for interested parties to comment on the proceedings.

Part of the agency’s mission is to develop standards that will prove broadly useful to everyone, not just a particular company or group. When the post-quantum encryption standards are complete, they will be adopted by federal agencies and released for free public use.

What can we be doing now to get ready for cryptographically relevant quantum computers?

Technology managers can inventory their systems for applications that use encryption, which will need to be replaced before cryptographically relevant quantum computers appear. They can also alert their tech departments and vendors about the upcoming change.

To learn more about migrating to post-quantum cryptography, and to get involved in developing guidance, seeNIST’s National Cybersecurity Center of Excellence project page.

How does post-quantum cryptography differ from quantum cryptography?

Though their names sound the same, they are very different. Post-quantum cryptography is a defense against potential cyberattacks from quantum computers. PQC algorithms are based on mathematical techniques that can be very old, such as elliptic curves, which trace their history back toancient Greek times.

Quantum cryptography, on the other hand, is based fundamentally on quantum physics, which originated in the 20th century. Quantum cryptography uses the counterintuitive properties of quantum mechanics to create new forms of secure encryption. Like PQC, it is also expected to be resistant to attacks from quantum computers, but in a different way.

Information technology, Cybersecurity, Cryptography and Standards

What Is Post-Quantum Cryptography?  (2024)
Top Articles
Costs of Visiting India: Budget to Luxury
Shares Below 5 Rs - Top 10 Share Under 5 Rs 2024
How To Start a Consignment Shop in 12 Steps (2024) - Shopify
No Hard Feelings Showtimes Near Metropolitan Fiesta 5 Theatre
Victory Road Radical Red
Breaded Mushrooms
Valley Fair Tickets Costco
Affidea ExpressCare - Affidea Ireland
9192464227
Seething Storm 5E
Nesb Routing Number
Www.megaredrewards.com
7543460065
What is international trade and explain its types?
Pwc Transparency Report
Phillies Espn Schedule
Brenna Percy Reddit
How Many Cc's Is A 96 Cubic Inch Engine
Slushy Beer Strain
My.doculivery.com/Crowncork
The Murdoch succession drama kicks off this week. Here's everything you need to know
Painting Jobs Craigslist
Idaho Harvest Statistics
Puretalkusa.com/Amac
Cyndaquil Gen 4 Learnset
X-Chromosom: Aufbau und Funktion
Hdmovie 2
Food Universe Near Me Circular
Trivago Myrtle Beach Hotels
Il Speedtest Rcn Net
Www Pointclickcare Cna Login
Discord Nuker Bot Invite
Harbor Freight Tax Exempt Portal
Angel Haynes Dropbox
Otis Inmate Locator
Experity Installer
Here’s how you can get a foot detox at home!
Netherforged Lavaproof Boots
Chattanooga Booking Report
Federal Student Aid
2023 Nickstory
Emulating Web Browser in a Dedicated Intermediary Box
Fairbanks Auto Repair - University Chevron
Arcanis Secret Santa
Petfinder Quiz
San Diego Padres Box Scores
Runescape Death Guard
Autozone Battery Hold Down
Grace Charis Shagmag
When Is The First Cold Front In Florida 2022
Law Students
Texas 4A Baseball
Latest Posts
Article information

Author: Tuan Roob DDS

Last Updated:

Views: 6206

Rating: 4.1 / 5 (42 voted)

Reviews: 89% of readers found this page helpful

Author information

Name: Tuan Roob DDS

Birthday: 1999-11-20

Address: Suite 592 642 Pfannerstill Island, South Keila, LA 74970-3076

Phone: +9617721773649

Job: Marketing Producer

Hobby: Skydiving, Flag Football, Knitting, Running, Lego building, Hunting, Juggling

Introduction: My name is Tuan Roob DDS, I am a friendly, good, energetic, faithful, fantastic, gentle, enchanting person who loves writing and wants to share my knowledge and understanding with you.