Researchers are in a race against time to prepare new cryptographic techniques before the arrival of quantum computers, as cryptographers Tanja Lange (Eindhoven University of Technology) and Daniel J. Bernstein (University of Illinois at Chicago, USA) describe today in the journal Nature. In their publication they analyze the options available for this so-called post-quantum cryptography.
The expectation is that quantum computers will be built some time after 2025. Such computers make use of quantum-mechanical properties and can therefore solve some particular problems much faster than our current computers. This will be useful for calculating models for weather forecasts or developing new medicine. However, these operations also affect protection of data using RSA and ECC. With today’s technologies these systems will not be broken in a hundred years but a quantum computer will break these within days if not hours.
Sensitive data in the open
Without protection a lot of sensitive information will be out in the open, even data from years back. “An attacker can record our secure communication today and break it with a quantum computer years later. All of today’s secrets will be lost,” warns Tanja Lange, professor of Cryptology at Eindhoven University of Technology. This concerns private data, bank and health records, but also state secrets. Lange saw the importance of alternative systems already back in 2006 and is busy with creating awareness and developing new systems. “Fairly recently we’re seeing an uptake of post-quantum cryptography in the security agencies, e.g., the NSA, and companies start demanding solutions.”
Lange leads the research consortium PQCRYPTO consisting of eleven universities and companies. PQCRYPTO started in 2015 with 3.9 million euro funding from the European Commission to develop new cryptographic techniques. “This might seem like a lot of money, but is a factor of 100 less than what goes into building quantum computers.” says Lange. She cautions that it is important to strengthen research in cryptography. “Bringing cryptographic techniques to the end user takes often another 15 to 20 years, after development and standardization.”
In their Nature publication Lange and Bernstein explain that a certain quantum algorithm, namely Shor’s algorithm, breaks all cryptographic techniques that are currently used to establish secure connections on the Internet. Candidates for post-quantum cryptography can roughly be categorized into two types: they are either very well understood and confidence-inspiring but require a lot of bandwidth or they are more convenient to use but provide more questionable security.
The publication appears in an issue of Nature with special attention to topics related to quantum computers: from different candidates of elementary building blocks of quantum computers till, e.g., the development of new algorithms. The journal invited Lange to write the article on post-quantum cryptography.
Learn more: ‘The dark side’ of quantum computers
The Latest on: Quantum computers
- Quantum Leaps In Technology Further Evolve Accessories For Pre Fall 2020on August 9, 2020 at 5:06 pm
Made from highly responsive material that performs amazingly well in the real world, the luxury women’s accessories line-up for late summer-pre-fall is built from advanced high-performance materials ...
- Quantum Computing Market Size Analysis, Competitive Landscape, Revenue Status, Future Opportunities and Demand By Top Key Playerson August 9, 2020 at 8:10 am
Kenneth Research has published a detailed report on Quantum Computing Market which has been categorized by market ...
- 7 Quantum Computing Stocks to Buy for the Next 10 Yearson August 8, 2020 at 6:18 pm
Quantum computing -- or the use of quantum mechanics to create a genre of next-generation quantum computers with nearly unlimited compute power -- has long been a concept stuck in the theory phase.But ...
- Scientists could use "quantum data" to accelerate some quantum computerson August 8, 2020 at 9:49 am
Researchers at the Skolkovo Institute of Science and Technology (Skoltech) in Moscow have developed a new method to accelerate the computation of quantum interactions. It’s straightforward enough: ...
- NSF finds networking a major barrier to further advances in quantum computingon August 7, 2020 at 6:18 am
Networking between quantum information systems is perhaps the largest barrier to further advances in computing and a major reason the National Science Foundation helped create the Quantum Leap ...
- Eight trends accelerating the age of commercial-ready quantum computingon August 6, 2020 at 9:01 am
Quantum computing will represent the most fundamental acceleration in computing power that we have ever encountered, leaving Moore's law in the dust.
- Rigetti Computing Raises $79M to Advance Practical Quantum Computingon August 4, 2020 at 10:05 am
Rigetti Computing, a quantum computing startup and developer of hybrid quantum-classical computing systems, has announced ...
- Rigetti raises $79M Series C for its quantum computing platformon August 4, 2020 at 9:18 am
Rigetti Computing, the quantum computing startup that is challenging industry heavyweights like IBM, Microsoft and D-Wave, today announced that it has closed a $79 million Series C funding round. The ...
- Calculating the benefits of exascale and quantum computerson August 3, 2020 at 4:43 am
A quintillion calculations a second. That's one with 18 zeros after it. It's the speed at which an exascale supercomputer will process information. The Department of Energy (DOE) is preparing for the ...
- IBM partners with Japanese business, academia in quantum computingon July 29, 2020 at 9:47 pm
U.S. tech firm International Business Machines Corp on Thursday launched a research partnership with Japanese industry to accelerate advances in quantum computing, deepening ties between the two ...
via Google News and Bing News