Researchers are in a race against time to prepare new cryptographic techniques before the arrival of quantum computers, as cryptographers Tanja Lange (Eindhoven University of Technology) and Daniel J. Bernstein (University of Illinois at Chicago, USA) describe today in the journal Nature. In their publication they analyze the options available for this so-called post-quantum cryptography.
The expectation is that quantum computers will be built some time after 2025. Such computers make use of quantum-mechanical properties and can therefore solve some particular problems much faster than our current computers. This will be useful for calculating models for weather forecasts or developing new medicine. However, these operations also affect protection of data using RSA and ECC. With today’s technologies these systems will not be broken in a hundred years but a quantum computer will break these within days if not hours.
Sensitive data in the open
Without protection a lot of sensitive information will be out in the open, even data from years back. “An attacker can record our secure communication today and break it with a quantum computer years later. All of today’s secrets will be lost,” warns Tanja Lange, professor of Cryptology at Eindhoven University of Technology. This concerns private data, bank and health records, but also state secrets. Lange saw the importance of alternative systems already back in 2006 and is busy with creating awareness and developing new systems. “Fairly recently we’re seeing an uptake of post-quantum cryptography in the security agencies, e.g., the NSA, and companies start demanding solutions.”
Lange leads the research consortium PQCRYPTO consisting of eleven universities and companies. PQCRYPTO started in 2015 with 3.9 million euro funding from the European Commission to develop new cryptographic techniques. “This might seem like a lot of money, but is a factor of 100 less than what goes into building quantum computers.” says Lange. She cautions that it is important to strengthen research in cryptography. “Bringing cryptographic techniques to the end user takes often another 15 to 20 years, after development and standardization.”
In their Nature publication Lange and Bernstein explain that a certain quantum algorithm, namely Shor’s algorithm, breaks all cryptographic techniques that are currently used to establish secure connections on the Internet. Candidates for post-quantum cryptography can roughly be categorized into two types: they are either very well understood and confidence-inspiring but require a lot of bandwidth or they are more convenient to use but provide more questionable security.
The publication appears in an issue of Nature with special attention to topics related to quantum computers: from different candidates of elementary building blocks of quantum computers till, e.g., the development of new algorithms. The journal invited Lange to write the article on post-quantum cryptography.
Learn more: ‘The dark side’ of quantum computers
The Latest on: Quantum computers
- Xanadu Raises $32M Series A to Bring Photonic Quantum Computing to the Cloudon June 25, 2019 at 5:39 pm
The funding accelerates Xanadu's progress toward the release of its photonic-based quantum cloud computing platform, which will include next generation consumer applications and products not ... […]
- What to Make of the ‘Quantum Advantage’ at SEMICON West?on June 25, 2019 at 4:33 pm
Among next-generation technologies highlighted at the conference, the impact and timing of quantum advantage on applications for sensing, communication and computing, as well as the opportunities and ... […]
- Physicists develop new method to prove quantum entanglementon June 25, 2019 at 5:36 am
One of the essential features required for the realization of a quantum computer is quantum entanglement. A team of physicists from the University of Vienna and the Austrian Academy of Sciences ... […]
- New theory for trapping light particles aims to advance development of quantum computerson June 24, 2019 at 1:24 pm
Quantum computers, which use light particles (photons) instead of electrons to transmit and process data, hold the promise of a new era of research in which the time needed to realize lifesaving ... […]
- Quantum computing startup Xanadu nabs $32 mln in OV-led Series Aon June 24, 2019 at 4:00 am
Xanadu, a Toronto-based photonic quantum computing and AI startup, has raised $32 million in a Series A financing. The round brings the company’s total funding to date to $41 million, according to a ... […]
- Quantum Computers Could Be True Randomness Generatorson June 23, 2019 at 5:00 am
Say the words “quantum supremacy” at a gathering of computer scientists, and eyes will likely roll. The phrase refers to the idea that quantum computers will soon cross a threshold where they’ll ... […]
- British quantum computing experts leave for Silicon Valleyon June 22, 2019 at 8:00 pm
A group of Britain’s best-known quantum computing scientists have quietly moved to Silicon Valley to found a start-up called PsiQ that believes it can produce a commercial quantum computer within five ... […]
- Cloudflare wants to protect the internet from quantum computingon June 21, 2019 at 3:50 pm
It’s sharing its open-source library of post-quantum cryptography software. Quantum computing has the potential to revolutionize health care, AI, financial modeling, weather simulation and more. It's ... […]
- Forget Moore's Law — Quantum Computers Are Improving According to a Spooky 'Doubly Exponential Rate'on June 21, 2019 at 11:22 am
The era of quantum supremacy is nigh. Quantum computers, which make calculations with entangled particles, or qubits, are poised to overtake their conventional counterparts very, very fast. And it's ... […]
- Quantum Computing for English Majorson June 20, 2019 at 12:48 pm
Peter Shor is a poet. Here is a limerick he wrote with his wife, Jennifer: If computers that you build are quantum, Then spies of all factions will want 'em. Our codes will all fail, And they'll ... […]
via Google News and Bing News