Researchers are in a race against time to prepare new cryptographic techniques before the arrival of quantum computers, as cryptographers Tanja Lange (Eindhoven University of Technology) and Daniel J. Bernstein (University of Illinois at Chicago, USA) describe today in the journal Nature. In their publication they analyze the options available for this so-called post-quantum cryptography.
The expectation is that quantum computers will be built some time after 2025. Such computers make use of quantum-mechanical properties and can therefore solve some particular problems much faster than our current computers. This will be useful for calculating models for weather forecasts or developing new medicine. However, these operations also affect protection of data using RSA and ECC. With today’s technologies these systems will not be broken in a hundred years but a quantum computer will break these within days if not hours.
Sensitive data in the open
Without protection a lot of sensitive information will be out in the open, even data from years back. “An attacker can record our secure communication today and break it with a quantum computer years later. All of today’s secrets will be lost,” warns Tanja Lange, professor of Cryptology at Eindhoven University of Technology. This concerns private data, bank and health records, but also state secrets. Lange saw the importance of alternative systems already back in 2006 and is busy with creating awareness and developing new systems. “Fairly recently we’re seeing an uptake of post-quantum cryptography in the security agencies, e.g., the NSA, and companies start demanding solutions.”
Lange leads the research consortium PQCRYPTO consisting of eleven universities and companies. PQCRYPTO started in 2015 with 3.9 million euro funding from the European Commission to develop new cryptographic techniques. “This might seem like a lot of money, but is a factor of 100 less than what goes into building quantum computers.” says Lange. She cautions that it is important to strengthen research in cryptography. “Bringing cryptographic techniques to the end user takes often another 15 to 20 years, after development and standardization.”
In their Nature publication Lange and Bernstein explain that a certain quantum algorithm, namely Shor’s algorithm, breaks all cryptographic techniques that are currently used to establish secure connections on the Internet. Candidates for post-quantum cryptography can roughly be categorized into two types: they are either very well understood and confidence-inspiring but require a lot of bandwidth or they are more convenient to use but provide more questionable security.
The publication appears in an issue of Nature with special attention to topics related to quantum computers: from different candidates of elementary building blocks of quantum computers till, e.g., the development of new algorithms. The journal invited Lange to write the article on post-quantum cryptography.
Learn more: ‘The dark side’ of quantum computers
The Latest on: Quantum computers
- Quantum computers learn to mark their own workon November 18, 2019 at 6:05 am
A new test to check if a quantum computer is giving correct answers to questions beyond the scope of traditional computing could help the first quantum computer that can outperform a classical ...
- Cambridge Quantum Computing Announces New Release of Updated Software Stack t|ket ™on November 17, 2019 at 3:31 pm
t|ket provides essential tools that allow users to maximise the performance of quantum computers in the NISQ era CAMBRIDGE, England, Nov. 18, 2019 /PRNewswire/ -- Cambridge Quantum Computing ("CQC") ...
- Here’s How Quantum Computer Supremacy Will Impact Self-Driving Carson November 16, 2019 at 10:01 am
That’s not to say that the use of their 54-qubit Sycamore processor wasn’t notable, and in fact, does provide another handy stride toward achieving viable quantum computing, but whether it was the ...
- D-Wave sticks with its approach to quantum computingon November 15, 2019 at 1:04 pm
While D-Wave’s 2000Q only played a small part in this process, it’s nevertheless a sign that quantum computing is slowly getting ready for production use and that D-Wave’s approach, somewhat ...
- Quantum Leap for Computing Is a Small Step for Computerson November 15, 2019 at 7:00 am
Ariel Procaccia is an associate professor in the computer science department at Carnegie Mellon University. His areas of expertise include artificial intelligence, theoretical computer science and ...
- Dell Technologies on democratising 5G and the future of quantum computingon November 14, 2019 at 2:27 pm
"And this next cycle, trust me, we have no other goal, than broad adoption of these technologies." Quantum computing, it could go either way When asked during a media session what Dell Technologies ...
- Can Google's New Quantum Computer Hack Bitcoin?on November 14, 2019 at 9:15 am
Nearly everyone agreed that was an extremely remote possibility. But now, some folks fear that day may be closer than expected. The reason: Google claims to have built a quantum computer. It’s a ...
- Quantum Computing Holds Promise for Banks, Executives Sayon November 8, 2019 at 1:36 pm
BROOKLYN, N.Y.—When quantum computing hits the market, the financial-services industry could be the first to benefit, a Goldman Sachs Group Inc. executive said at a quantum-computing panel event. “In ...
- Hewlett Packard Enterprise explains why it gave up on quantum computing right as it was splitting off from HP Incon November 8, 2019 at 6:06 am
Hewlett Packard Enterprise explains why it stopped its quantum computing efforts five years ago while IBM, Google, Microsoft, and Intel continue.
- For faster quantum computing, Microsoft builds a better qubiton November 7, 2019 at 1:02 pm
Google just announced quantum supremacy, a milestone in which the radically different nature of a quantum computer lets it vastly outpace a traditional machine. But Microsoft expects progress of its ...
via Google News and Bing News