Post-Quantum Cryptography Pt. 1: Are You Prepared for “Y2Q”?

essidsolutions

In science fiction, the annihilation of modern society is used as a trope. But in reality, we’re in the early stages of moving from an old paradigm popularized by classical computers to a new one, made possible by quantum computing. This is part one of a two-part explainer where John Kilhefner, security researcher at Vicarius, discusses how today’s encryption protocols are at risk unless we take steps to mitigate the potential for de-encryption today. 

As I type this, a quantum arms race is brewing behind the scenes. Companies and governments are working diligently to create the world’s first error-corrected quantum computers. And it’s progressing at an exponential pace. This past year alone saw some big developments in quantum computing. One of which includes Microsoft’s claim that, in medical diagnosis, its quantum machine learning algorithm can process larger sample sizes efficientlyOpens a new window while still being able to correctly handle more complex queries compared to other existing solutions available. 

The Potential of Quantum Computing

In many ways, quantum computing is a gift. Humanity is on the precipice of greatness in just about any industry imaginable. Take the following:

  • CRISPR/Gene-editing: Jennifer Doudna put gene-editing on the mapOpens a new window , but it still has severe limitations under today’s tech. A quantum computer could assemble and sort through variants in DNA to give gene-editing a shot in the arm. I’m talking about faster genetic sequencing, and higher-accuracy discovery of disease-related mutation, among other potential applications. 
  • Digital media: Search engines today are alarmingly precise, seeming to know what you’re searching for before you finish typing your query. With infinite computing power, search engines could compile every word in every text in the blink of an eye, which could mean the end of link-building, as Google would be able to better glean intent and influence from the context of your words and previous articles. Moreover, search predictions would happen instantaneously, allowing search predictions to influence consumers and, thus, consumer spending. 
  • Finance: Financial services like portfolio management require an ability to predict outcomes accurately. The more powerful the computer, the more accurate the predictions. With quantum computing’s infinite computing power, it could more effectively analyze unthinkable amounts of data to improve decision-making and customer service.
  • Space: NASA has hooked up with MIT’s Lincoln Laboratory to produce a “quantum laser” using entangled photons to more reliably transmit a communication from the ISS to Earth. Recently, NASA proposed employing “quantum-limited sensitivities and quantum-enhanced strategies for measurements, metrology, and sensing.” According to Dr. Mauro Paternostro, it will be a “game-changerOpens a new window ” for enabling experiments currently impossible or impractical on the ground.
  • Electric vehicles: Today’s batteries pretty much suck. But one company, in particular, is developing a quantum solution to simulate the structure and energy of lithium oxide, which will increase li-on battery performance, cost, and safety.

These industries (and more) will see exponential increases in output due to quantum computing’s infinite power. And today, many businesses are already using quantum computing to explore future optimization. This includes Mercedes-Benz, which is imagining how quantum computing can create longer-lasting, faster-charging batteries for electric vehicles. Then there’s ExxonMobil, applying its quantum algorithms to logistics in order to create more efficient shipping routes. And CERN is using quantum computing to decipher data patterns from the Large Hadron Collider, unraveling the secrets of the universe. 

The applications are theoretically limitless…but what about the downsides?

The Quantum Threat

You’ve surely heard of “The Quantum Threat”? Even if you haven’t read a previous blog I’ve written on it, let’s really dig in, shall we? 

The flipside to the logistical, operational, and creative renaissance that quantum computing will usher in is the weaponization of quantum computing by rogue actors and nation-states. Firmly in the crosshairs are today’s current encryption standards. Today’s secure networks are tomorrow’s massive vulnerabilities. If these norms are allowed to erode, our critical national functions (and public confidence in them) will collapse. It would be nothing short of digital annihilation. 

You may think I’m being hyperbolic, and in a sense, sure, I am. Annihilation? Come on. We’re better prepared than that, aren’t we?  

We’re five to 10 years away from the first error-corrected quantum computers coming online, yet post-quantum cryptography (PQC) standardsOpens a new window are being worked on behind the scenes even right now. 

See More: The Future of Encrypted Data in the Cloud: 3 Things to Understand

What Is Post-Quantum Cryptography? 

In general, post-quantum cryptography is an emerging field devoted to the development of cryptographic algorithms that would secure you against an attacker armed with a quantum computer. Unlike traditional cryptography, which relies on mathematical problems that a quantum computer can easily solve, PQC uses mathematical problems that are very difficult or impossible for a quantum computer to solve. As a result, PQC is much more resistant to quantum attacks than traditional cryptography. 

Much of today’s data – stored and in use – won’t be affected when the first error-corrected quantum computer comes online. But the security of reams of data today is in question.  

As a security leader – to prevent the quantum threat – you must ask two critical questions: 

  1. When should I begin post-quantum cryptography mitigation efforts?
  2. What steps can I take to protect my data and systems? 

The answers to these questions vary depending on your industry.  

With quantum computers becoming a reality, it’s only a matter of time before they are powerful enough to break today’s encryption methods. As we move closer to a full-scale quantum computing era, the need for post-quantum cryptography is becoming more and more apparent.  

Preparing for the Age of Post-quantum Computing

Of course, the security of post-quantum cryptography schemes is still an open question since we don’t have any large-scale quantum computers to test them against. There is, however, a lot of active research in this area, and we will likely have secure post-quantum cryptography schemes before large-scale quantum computers are built.

So what can you do to prepare for the age of quantum computing? If you work in an industry that relies on network security, you should start looking into post-quantum cryptography now. Even though large-scale quantum computers are still a few years away, it’s better to be prepared than to wait until it’s too late.

A few post-quantum cryptography schemes are already available, and more are being developed all the time. So take a look around and see what’s out there. And if you find a scheme you like, start getting acquainted with it now. Because when quantum computers come online, you will want to be ready.

Are you reviewing any post-quantum cryptography schemes and strategies? Let us know your thoughts on FacebookOpens a new window , TwitterOpens a new window , and LinkedInOpens a new window .

MORE ON CRYPTOGRAPHY: 

Image Source: Shutterstock