How future quantum computers will threaten today's encrypted data

September 14, 2017
Credit: CC0 Public Domain

The era of full-fledged quantum computers threatens to destroy internet security as we know it. Researchers are in a race against time to prepare new cryptographic techniques before the arrival of quantum computers, as cryptographers Tanja Lange (Eindhoven University of Technology, the Netherlands) and Daniel J. Bernstein (University of Illinois at Chicago) describe today in the journal Nature. In their publication, they analyze the options available for a post-quantum cryptography future.

The expectation is that quantum computers will be built some time after 2025. Such computers make use of quantum-mechanical properties and can therefore solve certain problems more quickly than current computers. This will be useful for calculating weather forecast models or developing new medicine. However, these operations also affect RSA and ECC cryptographic protocols. With today's technologies, these systems are secure, but a quantum computer would break these within days or hours.

This even jeopardizes encrypted data today: "An attacker can record our secure communications today, and break it with a quantum years later. All of today's secrets will be lost," says Tanja Lange, professor of cryptology at Eindhoven University of Technology. This concerns private data, bank and health records, and state secrets. Lange saw the importance of alternative systems back in 2006, and is now building awareness and developing new systems. "Fairly recently, we're seeing an uptake of post-quantum cryptography in the security agencies, e.g., the NSA, and companies are now demanding solutions."

Lange leads the research consortium PQCRYPTO, which is backed with 3.9 million euro funding from the European Commission to develop new cryptographic techniques. "This might seem like a lot of money, but is a factor of 100 less than what goes into building quantum computers," she says. She cautions that it is important to strengthen research in cryptography. "Bringing cryptographic techniques to the end user takes often another 15 to 20 years, after development and standardization."

In their Nature publication Lange and Bernstein explain that a certain quantum algorithm, namely Shor's algorithm, breaks all cryptographic techniques that are currently used to establish secure connections on the internet. Candidates for post- cryptography can roughly be categorized into two types—they are either very well understood but require a lot of bandwidth, or they are more convenient to use but provide more questionable security.

Explore further: Multi-million EU project to protect data against quantum computers

More information: Daniel J. Bernstein et al, Post-quantum cryptography, Nature (2017). DOI: 10.1038/nature23461

Related Stories

NIST asks public to help future-proof electronic information

December 21, 2016

The National Institute of Standards and Technology (NIST) is officially asking the public for help heading off a looming threat to information security: quantum computers, which could potentially break the encryption codes ...

Dutch researchers crack Internet security of the future

October 31, 2008

Researchers at Eindhoven University of Technology (TU/e) in The Netherlands have managed to crack the so-called McEliece encryption system. This system is a candidate for the security of Internet traffic in the age of the ...

Developing quantum algorithms for optimization problems

July 26, 2017

Quantum computers of the future hold promise for solving complex problems more quickly than ordinary computers. For example, they can factor large numbers exponentially faster than classical computers, which would allow them ...

How quantum mechanics can change computing

August 24, 2017

In early July, Google announced that it will expand its commercially available cloud computing services to include quantum computing. A similar service has been available from IBM since May. These aren't services most regular ...

Recommended for you

Using optical chaos to control the momentum of light

October 19, 2017

Integrated photonic circuits, which rely on light rather than electrons to move information, promise to revolutionize communications, sensing and data processing. But controlling and moving light poses serious challenges. ...

Black butterfly wings offer a model for better solar cells

October 19, 2017

(Phys.org)—A team of researchers with California Institute of Technology and the Karlsruh Institute of Technology has improved the efficiency of thin film solar cells by mimicking the architecture of rose butterfly wings. ...

Terahertz spectroscopy goes nano

October 19, 2017

Brown University researchers have demonstrated a way to bring a powerful form of spectroscopy—a technique used to study a wide variety of materials—into the nano-world.

2 comments

Adjust slider to filter visible comments by rank

Display comments: newest first

FM79
not rated yet Sep 14, 2017
It's a sort of Y2K problem, more or less.

We just need to create internet security protocols to make it hard even for quantum computers to crack a certain encryption.

Easier said than done, but before Quantum Computer become common it will take at least 10 years (if not much longer), hence better start early.

Frankly I am sure already a lot of people, both in academia and the private sector are working on this already
CubicAdjunct747
not rated yet Sep 14, 2017
BYE BYE BLOCKCHAIN and SHITCOIN!

Please sign in to add a comment. Registration is free, and takes less than a minute. Read more

Click here to reset your password.
Sign in to get notified via email when new comments are made.