The Quantum Threat to Cybersecurity
Quantum computers will be able to solve problems that are far too complex for classical computers to figure out. This includes solving the algorithms behind encryption keys that protect our data and the Internet’s infrastructure.
Much of today’s encryption is based on mathematical formulas that would take today’s computers an impractically long time to decode. To simplify this, think of two large numbers, for example, and multiply them together. It’s easy to come up with the product, but much harder to start with the large number and factor it into its two prime numbers. A quantum computer, however, can easily factor those numbers and break the code. Peter Shor developed a quantum algorithm (aptly named Shor’s algorithm) that easily factors large numbers far more quickly than a classical computer. Since then, scientists have been working on developing quantum computers that can factor increasingly larger numbers.
Today’s RSA encryption, a widely used form of encryption, particularly for sending sensitive data over the internet, is based on 2048-bit numbers. Experts estimate that a quantum computer would need to be as large as 70 million qubits to break that encryption. Considering the largest quantum computer today is IBM’s 53-qubit quantum computer, it could be a long time before we’re breaking that encryption.
As the pace of quantum research continues to accelerate, though, the development of such a computer within the next 3-5 years cannot be discounted. As an example, earlier this year, Google and the KTH Royal Institute of Technology in Sweden reportedly found “a more efficient way for quantum computers to perform the code-breaking calculations, reducing the resources they require by orders of magnitude.” Their work, highlighted in the MIT Technology Review, demonstrated that a 20 million-qubit computer could break a 2048-bit number – in a mere 8 hours. What that demonstration means is that continued breakthroughs like this will keep pushing the timeline up.
It’s worth noting that perishable sensitive data is not the main concern when it comes to the quantum encryption threat. The greater risk is the vulnerability of information that needs to retain its secrecy well into the future, such as national security-level data, banking data, privacy act data, etc. Those are the secrets that really need to be protected with quantum-proof encryption now, particularly in the face of bad actors who are stealing it while they wait for a quantum computer that can break the encryption.
The Impact of Quantum Computing on Cryptography
Many of the cryptographic techniques currently used to encrypt data could be rendered obsolete by quantum computing. Quantum computers can solve complex mathematical problems much more quickly than classical computers, making sensitive data vulnerable to attacks. For instance, a quantum computer could crack the popular RSA encryption scheme by factoring large numbers in polynomial tim
Opportunities for Cybersecurity with Quantum Computing
Despite the threats posed by quantum computing, it also offers opportunities for cybersecurity. New encryption techniques that can withstand quantum attacks can be developed through quantum computing. Quantum key distribution (QKD), based on the principles of quantum physics, is one such technique that offers a high level of security against quantum attacks.
Challenges for Cybersecurity with Quantum Computing
However, there are significant challenges that must be overcome. Developing cryptographic techniques resistant to quantum attacks requires a fundamental change in how we approach cryptography. Additionally, the high cost and limited accessibility of quantum computing resources pose challenges for smaller firms and organizations.
Comments
Post a Comment