Researchers are in a race against time to prepare new cryptographic techniques before the arrival of quantum computers, as cryptographers Tanja Lange (Eindhoven University of Technology) and Daniel J. Bernstein (University of Illinois at Chicago, USA) describe today in the journal Nature. In their publication they analyze the options available for this so-called post-quantum cryptography.
The expectation is that quantum computers will be built some time after 2025. Such computers make use of quantum-mechanical properties and can therefore solve some particular problems much faster than our current computers. This will be useful for calculating models for weather forecasts or developing new medicine. However, these operations also affect protection of data using RSA and ECC. With today’s technologies these systems will not be broken in a hundred years but a quantum computer will break these within days if not hours.
Sensitive data in the open
Without protection a lot of sensitive information will be out in the open, even data from years back. “An attacker can record our secure communication today and break it with a quantum computer years later. All of today’s secrets will be lost,” warns Tanja Lange, professor of Cryptology at Eindhoven University of Technology. This concerns private data, bank and health records, but also state secrets. Lange saw the importance of alternative systems already back in 2006 and is busy with creating awareness and developing new systems. “Fairly recently we’re seeing an uptake of post-quantum cryptography in the security agencies, e.g., the NSA, and companies start demanding solutions.”
Lange leads the research consortium PQCRYPTO consisting of eleven universities and companies. PQCRYPTO started in 2015 with 3.9 million euro funding from the European Commission to develop new cryptographic techniques. “This might seem like a lot of money, but is a factor of 100 less than what goes into building quantum computers.” says Lange. She cautions that it is important to strengthen research in cryptography. “Bringing cryptographic techniques to the end user takes often another 15 to 20 years, after development and standardization.”
In their Nature publication Lange and Bernstein explain that a certain quantum algorithm, namely Shor’s algorithm, breaks all cryptographic techniques that are currently used to establish secure connections on the Internet. Candidates for post-quantum cryptography can roughly be categorized into two types: they are either very well understood and confidence-inspiring but require a lot of bandwidth or they are more convenient to use but provide more questionable security.
The publication appears in an issue of Nature with special attention to topics related to quantum computers: from different candidates of elementary building blocks of quantum computers till, e.g., the development of new algorithms. The journal invited Lange to write the article on post-quantum cryptography.
Learn more: ‘The dark side’ of quantum computers
The Latest on: Quantum computers
- Apple's Fourth Invention Covering Next-Gen Quantum Dot Displays surfaced today at the U.S. Patent Office on September 21, 2017 at 9:15 am
... application on this subject matter titled "Quantum Dot Spacing for High Efficiency Quantum Dot LED Displays." State of the art displays for phones, tablets, computers and televisions utilize glass substrates with thin-film transistors (TFTs) to ... […]
- Global Quantum Computing Markets 2017-2022: Technologies, Companies, Solutions, Outlook and Forecasts - Research and Markets on September 21, 2017 at 7:40 am
DUBLIN--(BUSINESS WIRE)--The "Quantum Computing: Technologies, Companies, Solutions, Market Outlook and Forecasts 2017 - 2022" report has been added to Research and Markets' offering. The Global Quantum Computing As a Service Market is Anticipated to Reach ... […]
- The Quantum Age Is Almost Upon Us We And Need To Start Taking It Seriously on September 20, 2017 at 5:15 am
A recent Forbes article, for example, warns of the ability of quantum computers to crack even the most secure encryption. That sounds like a scary problem, and it is, but it’s also a very solvable problem. What the quantum era needs now is not fear ... […]
- "It's the Space Race of the 21st century" --The Major Roadblock to a Quantum Computer May Just Have Been Solved (WATCH Today's 'Galaxy' Stream) on September 19, 2017 at 11:11 am
The quantum computer has the potential to revolutionize the 21st century, solving problems so massively complex th today’s computers would take a century to solve. But a single quantum computer is still no match for the more than billion classical ... […]
- Scientists Just Set a World Record for Quantum Simulation on September 16, 2017 at 3:20 pm
Moreover, even though, quantum computing is now already available, it’s limited to a very few quantum bits or qubits that could be linked together. The most recent quantum experiment was able to use only 3. The qubits’ quantum states could easily be ... […]
- Nascent Quantum Computing Poses Threat to Cybersecurity on September 15, 2017 at 11:10 am
LONDON – The threat of a cyber attack by hackers or rogue nation states with access to quantum computers is becoming real enough that scientists and public officials are convening here this week in part to urge companies to develop a plan for defense. […]
- Quantum Computer Cross a New Threshold on September 15, 2017 at 7:18 am
There’s been a lot of bluster surrounding quantum computers. Some say that they’re the next major step in computing, while others are more reserved about their practical applications. Either way, fans of the emerging technology have plenty cause to be ... […]
- Quantum computers reach deeper, find ground state of simple hydrides on September 15, 2017 at 12:11 am
Every time we discuss quantum computers, the headline tends to be that someone, somewhere is going to use the quantum to break your encryption and steal your student loan. If only that were true. But it is probably more realistic to think about quantum ... […]
via Google News and Bing News