Quantum Resistant Cryptography: Why Should You Be Concerned Now? (2024)

Quick Glance:

  • Could sensitive information harvested and stored today could potentially be decrypted in the future by large-scale quantum computers? Basically, if you are transmitting encrypted information today with an algorithm that could be broken by a quantum computer, it would be possible for malicious actors to intercept that information.

  • The good news is that it is absolutely possible to avoid the risks of quantum machines with today’s technology. Quantum-resistant cryptography, which is available now, can protect personal data from threats down the road.

Quantum computing is a relatively new endeavor in the field of computing. Research into it began back in the early 1980s, and it has been progressively gaining momentum in recent years.

One of the major concerns around quantum computing is its ability to break existing (asymmetric) public key cryptographic systems using Shor's cryptographic algorithm, which enables computers to find prime factors quickly. This is something that normal computers have not been able to do and is an assumption that underpins algorithms like RSA, Diffie Hellman, and ECC.

While there is plenty of research and development being invested into quantum computing, by my estimate we are realistically at least 30 years away from seeing quantum computers in use for breaking cryptographic algorithms.

So why are so many concerned about it right now? And why should you be concerned about what that future holds?

Harvesting data today to decrypt tomorrow

When it comes to quantum computing, one of the biggest concerns amongst organizations like the Department of Defense, financial institutions, and healthcare providers is the fact that information harvested and stored today could potentially be decrypted down the road.

If you are transmitting encrypted information today with an algorithm that could be broken by a quantum computer, it would be possible for malicious actors to intercept that information, store it in its encrypted form, and save it for a later date.

Once a quantum computer is built that has the speed and processing power capable of breaking that algorithm, it can be used to decrypt and access any information that was previously stored.

So, essentially, you should be concerned about using quantum-resistant cryptography if you have sensitive information that would still be a problem if it was discovered and released in 20 to 30 years.

This is why the government, specifically the Department of Defense, is concerned about employing quantum-resistant cryptography today. Much of the classified information that needs to be protected today will still be classified in 30 years, and could potentially still do a lot of harm if released 30 years down the line.

Another prime example is related to healthcare. Intercepting encrypted medical records today could mean the wide release of personal health information protected by HIPAA later on.

While 30 years may feel like it is far away, the release of nearly all the information you are working to protect today is a big concern, even when the threat is that far into the future.

Using quantum-resistant cryptography

The good news is that it is absolutely possible to avoid the risks I mentioned above with today’s technology. Quantum-resistant cryptography, which is available now, can protect data from threats later on.

Internet Protocol Security (IPSec) encryption has been the standard used to secure data any time it moves between two or more classical computers and/or networks over the internet. It includes existing communications protocols for establishing mutual authentication between agents at the beginning of a session, and negotiation of cryptographic keys to use during the session.

Internet Key Exchange (IKE) is the protocol used to set up a security association in the IPSec protocol suite, and it comes in two flavors, IKEv1 and IKEv2.

IKEv2 is based on the Diffie-Hellman (DH) exchange, created to allow two parties to jointly establish a shared secret cryptographic key over an insecure public channel. Today, all of the authentication methods that make IKEv2 possible can be broken by a large scale quantum computer.

Common methods for establishing authentication over IKEv2 include RSA and Elliptic Curve Digital Signature Algorithms (ECDSA).

By contrast, IKEv1 does not rely just on a DH exchange to establish authentication. Initially, IKEv1 was meant for more general-purpose key exchange, and thus had many extraneous features that were removed with the switch to IKEv2.

Using IKEv1 with a pre-shared secret key (PSK) for authentication is considered "quantum safe".

In this case, each endpoint for communication knows the identity of the endpoint at the other end and has pre-shared its secret key. This approach is usually found in gateway-to-gateway VPN deployments.

Secure communication methods using IKEv1 combined with pre-shared keys and using the AES-256 (symmetric) encryption algorithm are the best bet for quantum-safe applications. Although other quantum safe algorithms exist, they have not gone through the rigor and years of proven reliability that IKEv1 and AES have.

Additional requirements

There are a few additional requirements that must be met to make the use of IKEv1 with pre-shared keys work from a tactical perspective.

First, a pre-shared key of at least 22 characters should be used when employing IKEv1 with pre-shared keys.

One of the struggles with establishing a quantum-safe key is the size of the keys needed to establish authentication. When sending messages that carry the key establishment information using IKE, those messages will have to be fragmented if they are too long.

Many fragmented IP packets will be filtered out by firewalls, proxies and network address translators at the receiver, meaning that the recipient will not get the key establishment information.

Thus solutions using IKEv1 with a pre-shared secret key will need to support the fragmentation of key shares to support those quantum-safe algorithms which require large keys.

Final thoughts

While the threats of quantum computing may not be immediate, the effects of ignoring it (even now) could be significant. Because there are clear and relatively simple, steps you can take today to avoid the problem, why wait?

All you need to do is ensure you have communication methods in place to transmit information using cryptography that is quantum-resistant, particularly if you are transmitting that information across the open internet or publicly accessible networks where it could be easily intercepted and saved.

Table Of Contents

Topics

Secure Communications Podcast

Quantum Resistant Cryptography: Why Should You Be Concerned Now? (2024)

FAQs

Quantum Resistant Cryptography: Why Should You Be Concerned Now? ›

So, essentially, you should be concerned about using quantum-resistant cryptography if you have sensitive information that would still be a problem if it was discovered and released in 20 to 30 years.

Should we be worried about quantum computing? ›

In short, quantum computers can threaten our data and privacy to the extent that this will force the largest technology upgrade cycle in computer history.

Why is quantum computing bad for cryptography? ›

Much of today's modern cryptography is based on mathematical algorithms used to encrypt data. With quantum computers, attacks on encryption methods that would normally take years could be theoretically done in days with quantum computers. Asymmetric and symmetric encryption types could both be at risk.

What is the threat to quantum cryptography? ›

An attacker can intercept and store encrypted data today, and when quantum computers become feasible, the attacker could decrypt the stored data. If quantum computers are realised in fewer than the number of years the data must be confidential for, the security requirement has been broken.

What is the drawback of quantum cryptography? ›

Limitations of Quantum Cryptography

Can only be used in short distances. Very expensive to implement on a scale. The technology is practically still not here yet. Photon polarization might be impacted in the traveling medium.

What is the dark side of quantum computing? ›

The most obvious, and most often discussed, doom scenario is based on the possibility of a quantum computer breaking existing cryptographic codes, enabling unauthorized access to protected information.

What is the biggest problem with quantum computing? ›

Cost and Accessibility. Currently, quantum computers are expensive and require very specialized environments to operate. Therefore, one of the big challenges for this technology is to make it accessible for widespread use.

What is the danger of quantum computing? ›

Planning for quantum computing risk

Quantum computers will be able to break common encryption methods at an alarming speed. Encryption tools currently used to protect everything from banking and retail transactions to business data, documents and digital signatures can be rendered ineffective – fast.

Will quantum break encryption? ›

It turns out that all current asymmetric cryptography implementations, including RSA, Diffie-Hellman, and elliptic curve cryptography, are theoretically breakable by quantum computers. Interestingly, the less mathematical encryption approach, symmetric cryptography, is less susceptible.

What is the impact of quantum cryptography? ›

With the ongoing research and development, the ever-increasing quantum computing capacity poses a grave threat to current cryptography algorithms. With quantum computers, compromising encryption methods that otherwise would take years could be done (theoretically) in days.

Is quantum cryptography necessary? ›

Quantum cryptography enables users to communicate more securely compared to traditional cryptography. After keys are exchanged between the involved parties, there is little concern that a malicious actor could decode the data without the key.

Can quantum cryptography be broken? ›

The hope is that quantum computers will not break these four algorithms, he says, although there is always that possibility. According to Moody, no one can guarantee that no one will ever develop a smart new attack that could break a post-quantum cryptographic algorithm.

What is the future scope of quantum cryptography? ›

The future of quantum cryptography is rife with potential applications. Securing communications, protecting sensitive information in various industries, enhancing data privacy, and fortifying critical infrastructure are among the numerous areas where quantum cryptography could play a pivotal role.

Is quantum computing a risk? ›

Planning for quantum computing risk

Quantum computers will be able to break common encryption methods at an alarming speed. Encryption tools currently used to protect everything from banking and retail transactions to business data, documents and digital signatures can be rendered ineffective – fast.

What is the concern regarding quantum computing? ›

Quantum computing has disadvantages from both an engineering and a societal perspective. These are three most significant: Quantum error correction and environmental sensitivity are major challenges. Post-quantum cryptography is a national security concern.

What does Elon Musk think about quantum computing? ›

Elon Musk's proposed Quantum AI represents a significant leap forward in the realms of artificial intelligence (AI) and quantum computing. According to Smith and Johnson (2021), Musk envisions Quantum AI as a convergence of quantum computing's immense processing power with AI's problem-solving capabilities.

Why did NASA shut down the quantum computer? ›

The abrupt shutdown of NASA's quantum computing project was triggered by an unforeseen incident during a routine test. During the analysis of a complex simulation, the quantum computer demonstrated unprecedented computational power, solving a previously intractable problem.

Top Articles
NAIC Releases 2020–2021 Auto Insurance Database Report
Gen Z is ditching dating apps to meet people in real life. Here are 4 top tips.
Blorg Body Pillow
Bj 사슴이 분수
Boggle Brain Busters Bonus Answers
Wausau Marketplace
Craigslist Mexico Cancun
THE 10 BEST River Retreats for 2024/2025
Ecers-3 Cheat Sheet Free
The Many Faces of the Craigslist Killer
Bill Devane Obituary
Becky Hudson Free
Pollen Count Central Islip
Gt Transfer Equivalency
Craigslist Edmond Oklahoma
Price Of Gas At Sam's
Slope Tyrones Unblocked Games
Define Percosivism
Illinois VIN Check and Lookup
3S Bivy Cover 2D Gen
Daylight Matt And Kim Lyrics
/Www.usps.com/International/Passports.htm
Crawlers List Chicago
Pokemon Unbound Shiny Stone Location
Tu Pulga Online Utah
Tips on How to Make Dutch Friends & Cultural Norms
College Basketball Picks: NCAAB Picks Against The Spread | Pickswise
Mythical Escapee Of Crete
Sherburne Refuge Bulldogs
Sienna
Impact-Messung für bessere Ergebnisse « impact investing magazin
1773x / >
Craigslist Rentals Coquille Oregon
Miles City Montana Craigslist
Tokioof
Life Insurance Policies | New York Life
Beth Moore 2023
Log in or sign up to view
Ket2 Schedule
Domino's Delivery Pizza
Baywatch 2017 123Movies
Robeson County Mugshots 2022
Raising Canes Franchise Cost
Coroner Photos Timothy Treadwell
The power of the NFL, its data, and the shift to CTV
Advance Auto.parts Near Me
Southwest Airlines Departures Atlanta
Mother Cabrini, the First American Saint of the Catholic Church
Shiftselect Carolinas
O'reilly's On Marbach
Scholar Dollar Nmsu
Latest Posts
Article information

Author: Cheryll Lueilwitz

Last Updated:

Views: 6287

Rating: 4.3 / 5 (74 voted)

Reviews: 81% of readers found this page helpful

Author information

Name: Cheryll Lueilwitz

Birthday: 1997-12-23

Address: 4653 O'Kon Hill, Lake Juanstad, AR 65469

Phone: +494124489301

Job: Marketing Representative

Hobby: Reading, Ice skating, Foraging, BASE jumping, Hiking, Skateboarding, Kayaking

Introduction: My name is Cheryll Lueilwitz, I am a sparkling, clean, super, lucky, joyous, outstanding, lucky person who loves writing and wants to share my knowledge and understanding with you.