The Quantum Computing Threat (2024)

The Quantum Computing Threat

Updated on

Dec 8, 2023

Focus

Download PDF

Updated on

Dec 8, 2023

Focus

  1. Home
  2. Network Security
  3. Quantum Security Concepts
  4. The Quantum Computing Threat

Download PDF

Network Security

Table of Contents

Previous Quantum Security Concepts
Next How RFC 8784 Resists Quantum Computing Threats

Quantum computers will break classical cryptography with threats including harvest now, decrypt later attacks.

Where Can I Use This?

What Do I Need?

  • PAN-OS

  • PAN-OS 11.1 or later.

Public Key Infrastructure (PKI) encryption and IKE key exchange mechanisms use classical cryptographies such as Diffie-Hellman (DH), Elliptic Curve Cryptography (ECC), and Elliptic Curve Diffie-Hellman (ECDH) extensively. Quantum computers (QCs) are likely to break these technologies within 5-15 years of NIST's standardization of the first post-quantum cryptographies (PQCs).

Post-quantum IKEv2 VPNs based on the RFC 8784, RFC 9242, and RFC 9370 open standards resist attacks based on quantum computing and PQCs. With RFC 8784, instead of sending the key material to the IKE peer in the peering handshake, the administrators configure and share the key material separately, out-of-band. If attackers steal the data, they can't decrypt it because they don't have the key material. RFC 9370 adds an additional seven optional KEM rounds to IKEv2 to enable the creation of hybrid encryption keys that are formulated with different types of KEM technologies. To break the hybrid key, all the KEMs used to create the key would need to be compromised. Palo Alto Networks' solutions to resist quantum attacks are based on open standards to enable and ensure interoperability with other equipment that meets the standards.

The most immediate danger is Harvest Now, Decrypt Later attacks, where attackers steal data (at rest or in transit) that they can't decrypt now and store it until a cryptographically relevant quantum computer (CRQC) can decrypt it. A CRQC is a QC optimized for using quantum algorithms to break encryption in seconds instead of in the millions of years that a classical supercomputer would take. The data at highest risk is long-lived data that will still be relevant when CRQCs become available.

  • What Is A Quantum Computer?

  • How Does the Quantum Threat Affect My Network?

  • What to Do Now to Mitigate Harvesting Attacks

What Is A Quantum Computer?

Quantum computers (QCs) are essentially the next generation of supercomputing platforms. QCs use the laws of quantum mechanics to vastly decrease the amount of time it takes to process data and run algorithms, including algorithms that can break classical decryption. Operations that would take a classical computer hundreds or thousands of years to process take seconds or even microseconds for a QC. Instead of being based on classical bits (zeros and ones) that increase a supercomputer's power linearly, QCs use qubits, which are based on polarized photons (light) and increase a QC's processing power exponentially.

There are several ways to create qubits and the method affects qubit quality—the efficiency of the qubits. The higher the quality of the qubits, the faster and more effective the QC. Because of their quantum nature, a qubit represents two states at one time and those states can be replicated across great distances. This is due to the quantum effects of superpositioning and entanglement:

  • Superpositioning

    —A qubit can represent both a one and a zero at the same time. Combining qubits results in escalating the number of states the qubits can represent because the number of states increases at a rate of 2**n, where “n” is the number of qubits. So two qubits can represent four states (2**2), three qubits can represent eight states (2**3), four qubits can represent 16 states (2**4), etc.

    As qubit density (the number of qubits that fit on a chip) increases, the number of states that the combined qubits can represent increases exponentially. The better the quality of the qubits, the closer the combined number of qubits come to a true exponential scale. Low-quality (noisy) qubits, when combined, don’t increase the number of states exponentially, but they still increase the number of states significantly compared to a classical computer. As the quality of qubits improves, QCs come closer and closer to a true exponential escalation of the number of states represented.

  • Entanglement

    —Entanglement is a quantum bond between qubits. Entangled qubits generate the same results from running the same quantum algorithm on them, no matter where they are, even if the qubits are halfway around the world from each other. So if you run a particular algorithm on entangled qubits that are located in Bangalore (India) and Los Angeles (United States), the entangled qubits in those locations yield the same result. The exact mechanism by which quantum entanglement works is unknown.

There are three types of QCs:

  • Quantum Annealers

    —These are available today. They are the least-powerful QCs with the narrowest use cases. However, attackers can use them to factor large numbers using quantum algorithms, which is how to break asymmetric encryption.
  • Analog Quantum Simulators

    —These solve physics problems that are beyond the ability of classical computers, such as quantum chemistry, materials sciences, optimization problems, factoring large numbers, sampling, and quantum dynamics.
  • Universal Quantum Computer

    —These are the hardest QCs to build because they require many physical qubits. They solve the broadest range of use cases and several companies are targeting the end of this decade for commercializing them. When they are developed, these are the computers that will be CRQCs.

QCs create a multi-dimensional space comprised of many entangled qubits in which to solve complex problems. For example, classical computers take each element of a database, process it, and then combine it with other elements after processing all the elements. QCs create an algorithm that solves for every state and outcome you're looking for. They pass the entire database through the algorithm simultaneously, analyzing the data for every outcome simultaneously. This makes QCs potentially millions of times faster than classical computers and is one reason they are excellent at solving complex mathematical problems such as breaking encryption.

How Does the Quantum Threat Affect My Network?

The vastly increased processing power and speed of QCs threaten to break classical methods for encrypting data, which could compromise your public key infrastructure (PKI).

The most immediate threat is Harvest Now, Decrypt Later attacks that steal your encrypted data with the intention of using a CRQC to decrypt it in the future. Once attackers steal your data and classical key material, there's no way to stop them from decrypting the data in the future using a CRQC. If the stolen data is still valid at that time, it is compromised.

Classical asymmetric encryption is based on prime numbers and relies on the difficulty of factoring complex numbers to derive those prime numbers. A quantum algorithm called Shor's algorithm can factor complex numbers and solve discrete logarithm problems. Shor's algorithm threatens PKI security, which is based on two very large prime numbers to produce the key. However, Shor's algorithm can't break PKI security in less than millions of years using a classical computer. Without CRQCs, Shor's algorithm wasn't a threat. However, given the processing power of a CRQC, Shor's algorithm can factor complex numbers and crack classical asymmetrical encryption (such as the key exchange material needed to decrypt data) in seconds or less. This is why Harvest Now, Decrypt Later attacks are an immediate threat.

The consequences of breaking classical encryption include compromising the security of classical PKI cryptographies that were thought to be secure, such as Diffie-Hellman (DH), Elliptic Curve Cryptography (ECC), and Elliptic Curve Diffie-Hellman (ECDH). The key exchange is at greatest risk and is why you need to configure post-quantum IKEv2 VPNs to secure the key exchange.

Certificates have been the foundation of how two endpoints establish trust. However, CRQCs can also compromise RSA, which is used to create and secure digital certificates. This means that attackers can steal or impersonate digital signatures with a CRQC, so the server you think you're connecting to might actually be an attacker's server. The ability to do this might come as soon as the next decade.

In addition, the sheer brute force processing power of QCs means that symmetric encryption isn't safe either. Grover's algorithm is a quantum, quadratically accelerated unstructured search algorithm that finds the unique input that produces a particular output value. Grover's algorithm targets symmetric cryptography and hash functions. It essentially halves the crypto strength of AES algorithms, so if you use AES-128 bit encryption, Grover's algorithm drops it to the crypto strength of 64-bit encryption. Because classical computers don't have anywhere near enough processing power, they can't use Grover's algorithm to break symmetric encryption. However, using a QC, Grover's algorithm can break AES-128 bit encryption.

Because of AES-128 bit encryption's vulnerability to Grover's algorithm, use AES-256 bit encryption, which Grover's algorithm will not be able to break in the near or mid-term future.

To help safeguard hash functions, use SHA-384 at a minimum.

Post-quantum cryptographies (PQCs) are available today and most security-savvy people can download and set up PQCs, which can't be decrypted. If you allow unauthorized PQCs on your network, an internal bad actor could introduce PQCs into your network. If that happens, you have no visibility into traffic that uses a PQC and no visibility into threats in that traffic. Use Decryption features to detect unauthorized PQCs on your network and automatically block traffic that uses PQCs.

What to Do Now to Mitigate Harvesting Attacks

Take these actions now to resist post-quantum Harvest Now, Decrypt Later attacks. Review your VPN connections and harden them:

  • Follow RFC 6379 for

    Suite B Cryptographic Suites for IPsec

    to upgrade your VPN connections to tough cipher suites. Use Suite-B-GCM-256 and avoid weaker 128-bit AES algorithms, which are vulnerable to Grover's algorithm.

  • Upgrade your CA to 4K RSA key sizes to mitigate brute force attacks that can break smaller key sizes and migrate your VPN certificate authentication to new certificates.

  • Upgrade to higher-bit SHA hash sizes such as SHA-384 and SHA-512. Stop using weak hashes such as MD5 and SHA-1.

  • Implement RFC 8784 and/or RFC 9242 and RFC 9370 to create post-quantum VPNs that resist quantum attacks.

In addition, review your SSL/TLS connections and harden them:

  • Upgrade SSL/TLS connections to tough cipher suites; use TLSv1.3 with Perfect Forward Secrecy (PFS) ciphers.

  • Tunnel SSL/TLS sessions in hardened, client-to-server VPN sessions. Use a post-quantum desktop application to support Reverse Proxy.

"); adBlockNotification.append($( "Thanks for visiting https://docs.paloaltonetworks.com. To improve your experience when accessing content across our site, please add the domain to the allow list on your ad blocker application." )); let adBlockNotificationClose = $("x"); adBlockNotification.prepend(adBlockNotificationClose) $('body').append(adBlockNotification); setTimeout(function (e) { adBlockNotification.addClass('open'); }, 10); adBlockNotificationClose.on('click', function (e) { adBlockNotification.removeClass('open'); }) } }, 5000)

Previous Quantum Security Concepts
Next How RFC 8784 Resists Quantum Computing Threats

Recommended For You

{{ if(( raw.pantechdoctype != "techdocsAuthoredContentPage" && raw.objecttype != "Knowledge" && raw.pancommonsourcename != "TD pan.dev Docs")) { }} {{ if (raw.panbooktype) { }} {{ if (raw.panbooktype.indexOf('PANW Yellow Theme') != -1){ }}

{{ } else if (raw.panbooktype.indexOf('PANW Green Theme') != -1){ }}

{{ } else if (raw.panbooktype.indexOf('PANW Blue Theme') != -1){ }}

{{ } else { }}

{{ } }} {{ } else { }}

{{ } }} {{ } else { }} {{ if (raw.pantechdoctype == "pdf"){ }}

{{ } else if (raw.objecttype == "Knowledge") { }}

{{ } else if (raw.pancommonsourcename == "TD pan.dev Docs") { }}

{{ } else if (raw.pancommonsourcename == "LIVEcommunity Public") { }}

{{ } else { }}

{{ } }} {{ } }}

{{ if (raw.pancommonsourcename == "LIVEcommunity Public") { }}

{{ if (raw.pantechdoctype == "pdf"){ }}

{{ } }}

{{ } else { }}

{{ if (raw.pantechdoctype == "pdf"){ }}

{{ } }}

{{ } }}

{{ if (raw.pancommonsourcename != "TD pan.dev Docs"){ }} {{ if (raw.pandevdocsosversion){ }} {{ } else { }} {{ if ((_.size(raw.panosversion)>0) && !(_.isNull(raw.panconversationid )) && (!(_.isEmpty(raw.panconversationid ))) && !(_.isNull(raw.otherversions ))) { }} (See other versions) {{ } }} {{ } }} {{ } }}

{{ } }}{{ if (raw.pantechdoctype == "bookDetailPage"){ }}

{{ } }}{{ if (raw.pantechdoctype == "bookLandingPage"){ }}

{{ } }}{{ if (raw.pantechdoctype == "productLanding"){ }}

{{ } }}{{ if (raw.pantechdoctype == "techdocsAuthoredContentPage"){ }}

{{ } }}{{ if (raw.pantechdoctype == "pdf"){ }}

{{ } }}

© 2024 Palo Alto Networks, Inc. All rights reserved.

The Quantum Computing Threat (2024)

FAQs

What is a quantum computing threat? ›

Quantum computing threatens to break much of the cryptography we currently use. Quantum computers will use quantum physics to efficiently process information and solve problems that are impractical to solve using current computing capabilities.

What is the biggest problem with quantum computing? ›

Cost and Accessibility. Currently, quantum computers are expensive and require very specialized environments to operate. Therefore, one of the big challenges for this technology is to make it accessible for widespread use.

What are quantum computing attacks? ›

A cybersecurity quantum attack refers to the risk that quantum computers may be used to attack traditional cryptographic schemes. It is assumed that quantum computers will solve encryption equations faster than standard computers.

What is the concern regarding quantum computing? ›

Quantum computing has disadvantages from both an engineering and a societal perspective. These are three most significant: Quantum error correction and environmental sensitivity are major challenges. Post-quantum cryptography is a national security concern.

Will quantum computers break security? ›

Researchers typically estimate that it will be many years until quantum computers can crack cryptographic keys—the strings of characters used in an encryption algorithm to protect data—faster than ordinary computers.

Is Bitcoin threatened by quantum computing? ›

Quantum computers could potentially break current blockchain encryption, risking billions in cryptocurrency assets, according to a quantum policy expert. Quantum-resistant cryptography and quantum random-number generators are emerging as vital solutions to protect blockchain networks from quantum attacks.

How will quantum computing affect us? ›

Complex problems that currently take the most powerful supercomputer several years could potentially be solved in seconds. Future quantum computers could open hitherto unfathomable frontiers in mathematics and science, helping to solve existential challenges like climate change and food security.

Why you can t ignore quantum computing? ›

Modern encryption relies on the difficulty of factoring large prime numbers. Current computers would take months or even years to break these encryptions. However, quantum computers are expected to do this in seconds.

What can't quantum computing do? ›

For instance, contrary to some reports, quantum computers cannot store infinite data. While qubits can hold more information than binary bits because of their ability to exist in multiple states simultaneously, there is still a finite limit to the number of qubits and the data they can represent.

How to protect against quantum computing? ›

Post-quantum cryptography (PQC) is a form of cryptography that is designed to be resistant to quantum computing. It uses mathematical algorithms that are believed to be secure against attacks from quantum computers, even when they become powerful enough to break traditional encryption algorithms.

What is example of quantum computing? ›

Quantum computers can run complex simulations. They're fast enough to be used to simulate more intricate systems than classical computers. For example, this could be helpful for molecular simulations, which are important in prescription drug development. Optimization.

What would a quantum computer do? ›

A quantum computer capable of achieving the quantum advantage should be able to deliver a significant, practical benefit beyond all known classical computing methods—calculating solutions in a way that is cheaper, faster or more accurate than any available classical alternatives.

Why did NASA shut down the quantum computer? ›

The abrupt shutdown of NASA's quantum computing project was triggered by an unforeseen incident during a routine test. During the analysis of a complex simulation, the quantum computer demonstrated unprecedented computational power, solving a previously intractable problem.

What is the threat of quantum computing? ›

Quantum computers will be able to break common encryption methods at an alarming speed. Encryption tools currently used to protect everything from banking and retail transactions to business data, documents and digital signatures can be rendered ineffective – fast.

How close are we to quantum computers? ›

The current field of quantum computers isn't quite ready for prime time: McKinsey has estimated that 5,000 quantum computers will be operational by 2030 but that the hardware and software necessary for handling the most complex problems won't be available until 2035 or later.

What is an example of a quantum computer problem? ›

One such example is a method called quantum error correction, which could minimize this drawback. In simple terms, the process involves joining multiple physical qubits into one longer-lived logical qubit. Like RAID, logical qubits need more space to represent each logical qubit.

Which two major challenges do quantum computers face? ›

Each is a major hurdle on the road to quantum computing, and must be overcome if the technology is to reach full potential.
  • Challenge 1: Quantum Decoherence.
  • Challenge 2: Quantum Error Correction.
  • Challenge 3: Scalability.
Sep 21, 2023

Should we be worried about quantum computing? ›

In short, quantum computers can threaten our data and privacy to the extent that this will force the largest technology upgrade cycle in computer history.

Top Articles
How to Print USPS Labels with QR Codes for Easy Shipping
What is a shipping label? | Pitney Bowes
Whas Golf Card
Archived Obituaries
Unitedhealthcare Hwp
How to Type German letters ä, ö, ü and the ß on your Keyboard
Apply A Mudpack Crossword
Hardly Antonyms
All Obituaries | Ashley's J H Williams & Sons, Inc. | Selma AL funeral home and cremation
Bros Movie Wiki
zopiclon | Apotheek.nl
Saw X | Rotten Tomatoes
Beau John Maloney Houston Tx
Craiglist Galveston
Gon Deer Forum
Youravon Comcom
Blackwolf Run Pro Shop
Directions To Advance Auto
Airrack hiring Associate Producer in Los Angeles, CA | LinkedIn
Epguides Strange New Worlds
Chase Bank Pensacola Fl
Mega Personal St Louis
Panola County Busted Newspaper
WRMJ.COM
R/Airforcerecruits
Gillette Craigslist
The Powers Below Drop Rate
Grave Digger Wynncraft
Stockton (California) – Travel guide at Wikivoyage
Orange Park Dog Racing Results
Neteller Kasiinod
24 Hour Drive Thru Car Wash Near Me
Eegees Gift Card Balance
Stouffville Tribune (Stouffville, ON), March 27, 1947, p. 1
Aladtec Login Denver Health
Boondock Eddie's Menu
De beste uitvaartdiensten die goede rituele diensten aanbieden voor de laatste rituelen
Robot or human?
Zero Sievert Coop
Mars Petcare 2037 American Italian Way Columbia Sc
Prior Authorization Requirements for Health Insurance Marketplace
How Many Dogs Can You Have in Idaho | GetJerry.com
Join MileSplit to get access to the latest news, films, and events!
Umiami Sorority Rankings
Craigs List Hartford
Thor Majestic 23A Floor Plan
Memberweb Bw
Fedex Passport Locations Near Me
فیلم گارد ساحلی زیرنویس فارسی بدون سانسور تاینی موویز
Walmart Front Door Wreaths
Ronnie Mcnu*t Uncensored
Mikayla Campinos Alive Or Dead
Latest Posts
Article information

Author: Pres. Lawanda Wiegand

Last Updated:

Views: 5834

Rating: 4 / 5 (51 voted)

Reviews: 90% of readers found this page helpful

Author information

Name: Pres. Lawanda Wiegand

Birthday: 1993-01-10

Address: Suite 391 6963 Ullrich Shore, Bellefort, WI 01350-7893

Phone: +6806610432415

Job: Dynamic Manufacturing Assistant

Hobby: amateur radio, Taekwondo, Wood carving, Parkour, Skateboarding, Running, Rafting

Introduction: My name is Pres. Lawanda Wiegand, I am a inquisitive, helpful, glamorous, cheerful, open, clever, innocent person who loves writing and wants to share my knowledge and understanding with you.