How Quantum Computing Could Defeat Today's Encryption and What We Should Do to Protect Ourselves

Attomus / Blog

In the ever-evolving landscape of technology, quantum computing stands out as one of the most revolutionary advancements of the 21st century. While it promises to solve complex problems in fields like medicine, materials science, and artificial intelligence, it also poses a significant threat to the cryptographic systems that underpin modern cybersecurity. In this blog post, we’ll explore how quantum computing could defeat today’s encryption methods and what steps we should take today to safeguard our digital future.

The Basics of Modern Encryption

Before diving into quantum computing, it’s essential to understand how modern encryption works. Most of today’s encryption systems rely on mathematical problems that are computationally difficult for classical computers to solve. These include:

  1. RSA Encryption: Based on the difficulty of factoring large prime numbers.
  2. Elliptic Curve Cryptography (ECC): Relies on the difficulty of solving the elliptic curve discrete logarithm problem.
  3. AES (Advanced Encryption Standard): A symmetric encryption algorithm that uses key lengths of (usually) 128, 192, or 256 bits.

These methods are considered secure because classical computers would take an impractical amount of time— often billions of years —to break them using brute force or known algorithms.

The Quantum Threat

Quantum computers operate on principles fundamentally different from classical computers. Instead of using bits (0s and 1s), they use quantum bits, or qubits, which can exist in a superposition of states. This allows quantum computers to perform many calculations simultaneously, unlocking unprecedented computational power.

quantum security

Two quantum algorithms, in particular, threaten modern encryption:

  1. Shor’s Algorithm: Developed by mathematician Peter Shor in 1994, this algorithm can efficiently factor large integers and solve discrete logarithms. If run on a sufficiently powerful quantum computer, Shor’s algorithm could break RSA and ECC encryption in a matter of seconds or minutes.
  2. Grover’s Algorithm: This algorithm can search unsorted databases quadratically faster than classical algorithms. While it doesn’t break symmetric encryption like AES entirely, it effectively halves the security of a key. For example, a 128-bit AES key would offer only 64 bits of security against a quantum attack.

The Timeline for Quantum Supremacy

While quantum computers capable of running Shor’s or Grover’s algorithms at scale don’t yet exist, significant progress is being made. Companies like IBM, Google, and Rigetti are racing to build quantum computers with hundreds or thousands of qubits. Estimates vary, but many experts believe that a quantum computer capable of breaking RSA-2048 encryption could be available within the next 10 to 20 years.

However, the threat isn’t just about the future. Harvest Now, Decrypt Later (HNDL) attacks are already a concern. In these attacks, adversaries collect encrypted data today with the intention of decrypting it once quantum computers become available. This means that sensitive information transmitted today could be at risk in the future.

What We Should Do Today to Protect Ourselves

The potential for quantum computing to break current encryption methods is a wake-up call for governments, businesses, and individuals. Here are some steps we can take today to prepare for a post-quantum world:

1. Adopt Post-Quantum Cryptography (PQC)

Post-quantum cryptography refers to cryptographic algorithms that are believed to be secure against quantum attacks. These algorithms are based on mathematical problems that are hard for both classical and quantum computers to solve, such as lattice-based cryptography, hash-based cryptography, and code-based cryptography.

The National Institute of Standards and Technology (NIST) is currently in the [process of standardising post-quantum cryptographic algorithms](<1. https://csrc.nist.gov/projects/post-quantum-cryptography>). Organisations should start planning to integrate these algorithms into their systems once they are finalised.

2. Implement Hybrid Cryptographic Systems

In the transition period, hybrid systems that combine classical and post-quantum algorithms can provide an additional layer of security. This approach ensures that even if one algorithm is broken, the other remains secure.

3. Increase Key Sizes for Symmetric Encryption

For symmetric encryption algorithms like AES, increasing key sizes can mitigate the threat posed by Grover’s algorithm. For example, using AES-256 instead of AES-128 effectively doubles the security against quantum attacks.

4. Stay Informed and Educate Your Team

Quantum computing is a rapidly evolving field. Staying informed about the latest developments and educating your team about the risks and solutions is crucial. This includes understanding the implications of quantum computing for your specific industry and applications.

5. Audit and Update Legacy Systems

Many organisations still rely on legacy systems that use outdated cryptographic protocols. Conducting a thorough audit of your systems and updating them to use modern, quantum-resistant algorithms is essential.

6. Collaborate with Industry and Government

Cybersecurity is a collective effort. Collaborating with industry peers, government agencies, and standards organisations can help ensure a coordinated and effective response to the quantum threat.

The Role of Quantum-Safe Technologies

In addition to post-quantum cryptography, quantum-safe technologies like Quantum Key Distribution (QKD) offer promising solutions. QKD uses the principles of quantum mechanics to securely distribute encryption keys, making it theoretically immune to quantum attacks. While QKD is still in its early stages and has limitations (such as distance constraints), it represents an exciting area of research and development.

Conclusion

Quantum computing has the potential to revolutionise many aspects of our lives, but it also poses a significant threat to the cryptographic systems that protect our digital world. While large-scale quantum computers capable of breaking today’s encryption are not yet a reality, the time to prepare is now.

By adopting post-quantum cryptography, implementing hybrid systems, increasing key sizes, and staying informed, we can protect ourselves against the quantum threat. The transition to quantum-safe encryption won’t happen overnight, but with proactive planning and collaboration, we can ensure a secure digital future.


Register if you want to learn about cybersecurity and advanced tech.

You can unsubscribe with one click, and we'll never share your email address.

Fancy reading something else - what takes your fancy?