Quantum computers threaten our whole cybersecurity infrastructure: here’s how scientists can bulletproof it


Team Udayavani, Jan 16, 2023, 3:47 PM IST

Representative Image (Source: Shutterstock)

Thirteen, 53 and 433. That’s the size of quantum computers in terms of quantum bits, or qubits, which has significantly grown in the last years due to important public and private investments and initiatives. Obviously, it is not only a mere question of quantity: the quality of the prepared qubits is as important as their number for a quantum computer to beat our existing classical computers, that is, to attain what’s called the “quantum advantage”. Yet it is conceivable that soon quantum-computing devices delivering such an advantage will be available. How would this affect our daily lives?

Making predictions is never easy, but it is agreed that cryptography will be altered by the advent of quantum computers. It is an almost trivial statement that privacy is a key issue in our information society: every day, immense amounts of confidential data are exchanged through the Internet. The security of these transactions is crucial and mostly depends on a single concept: complexity or, more precisely, computational complexity. Confidential information remains secret because any eavesdropper wanting to read it needs to solve an extremely complex mathematical problem.

In fact, the problems used for cryptography are so complex for our present algorithms and computers that the information exchange remains secure for any practical purposes – solving the problem and then hacking the protocol would take a ridiculous number of years. The most paradigmatic example of this approach is the RSA protocol (for its inventors Ron Rivest, Adi Shamir and Leonard Adleman), which today secures our information transmissions.

The security of the RSA protocol is based on the fact that we don’t yet have any efficient algorithm to factorise large numbers – given a large number, the goal is to find two numbers whose product is equal to the initial number. For example, if the initial number is 6, the solution is 2 and 3, as 6=2×3. Cryptographic protocols are constructed in such a way that the enemy, to decrypt the message, needs to factorise a very large number (not 6!), which is at present impossible to do.

If computing devices are built for that would allow current cryptography methods to be easily cracked, our current privacy paradigm needs to be rethought. This will be the case for quantum computers (once an operational quantum computer exists, that is): they should be able to break RSA because there is a quantum algorithm for efficient factorisation. While classical computers may need the age of the universe to such a problem, ideal quantum computers should be able to do it in a few hours or maybe even minutes.

This is why cryptographers are developing solutions to replace RSA and attain quantum-safe security, that is, cryptographic protocols that are secure against an enemy who has access to a quantum computer. To do so, there exist two main approaches: post-quantum cryptography and quantum key distribution.

How to encrypt information in a world equipped with quantum computers

Post-quantum cryptography maintains the security paradigm based on complexity. One should look for mathematical problems that remain difficult for quantum computers and use them to construct cryptographic protocols, the idea again being that an enemy can hack them only after a ridiculously large amount of time. Researchers are working hard to develop algorithms for post-quantum cryptography. In fact, the National Institute of Standards and Technology (NIST) initiated a process to solicit and evaluate these algorithms and the chosen candidates were announced in July 2022.

Post-quantum cryptography presents a very strong advantage: it is based on software. It is therefore cheap and, more importantly, its integration with existing infrastructures is straightforward, as one only needs to replace the previous protocol, say RSA, by the new one.

But post-quantum cryptography also has a clear risk: our confidence on the “hardness” of the chosen algorithms against quantum computers is limited. Here it is important to recall that, strictly speaking, none of the cryptographic protocols based on complexity are proven to be secure. In other words, there is no proof that they cannot be solved efficiently on a classical or quantum computer.

This is the case for factoring: one can’t rule out the discovery of an efficient algorithm for factorisation that would enable a classic computer to break down RSA, no quantum computer required. While unlikely, such a possibility cannot be excluded. In the case of the new algorithms, the evidence of their complexity is much more limited, as they have not yet been intensively tested against smart researchers, much less quantum computers. Indeed, a quantum-safe algorithm proposed in the NIST initiative was later cracked in an hour on a standard PC.

Exploit the laws of quantum physics to secure communications

The second approach for quantum-safe security is quantum key distribution. Here, the security of the protocols is no longer based on complexity considerations, but on the laws of quantum physics. We therefore speak of quantum physical security.

Without entering into the details, a secret key is distributed using qubits and the protocol’s security follows from the Heisenberg uncertainty principle, which implies that any intervention by the eavesdropper is detected because modifies the state of these qubits. The main advantage of quantum key distribution is that it is based on quantum phenomena that have been verified in many experimental labs.

The main problem for its adoption is that it requires new (quantum) hardware. It is therefore expensive and its integration with existing infrastructures is not easy. Yet important initiatives are taking place for the deployment of quantum key distribution at a European scale.

Which approach to take? This question is often presented as an either-or choice and even in this article, you may have given this impression too. However, our vision is that the right way to go is to look for the combination of post-quantum and quantum key distribution. The latter has shown us that quantum physics provides us with new tools and recipes to truly safeguard our secrets. If the two approaches are combined, hackers will have a much more difficult time, as they will have to face both complex computational problems and quantum phenomena.

Written by Antonio Acín, Professor and group leader, Instituto de Ciencias Fotónicas (ICFO) (The Conversation)

Udayavani is now on Telegram. Click here to join our channel and stay updated with the latest news.

Top News

Balasore tragedy result of composite negligence of railway officials: Orissa High Court

Actress Kasthuri stokes controversy by her remarks on Telugu-speaking people in TN

Three convicted for 2016 Kollam collectorate blast case

Expect Canadian government to ensure justice, uphold rule of law: PM Modi

Lone tusker spotted on NH-166 near Karkala, disrupts traffic

Lokayukta police summon Karnataka CM Siddaramaiah for questioning in MUDA case on Wednesday

Not ‘kaun banega mukhyamantri’ contest; MVA to name CM pick after polls: Jairam Ramesh

Related Articles More

Three Chinese astronauts enter space station after successful launch

What is AI superintelligence? Could it destroy humanity? And is it really almost here?

IIT-B develops method to maintain comfortable temperature inside homes in joint research

Scammers use fear and urgency to con people using ‘digital arrest’, online scams: Cyber advisory

ISRO to launch electric propelled satellite in Dec: Somanath

MUST WATCH

Gho Pooja in Deepavali Festival

Melukote Deepavali

Ganapathi Co-operative Society Ltd

Udayavani Chinnara Banna 2024

Annapoorna Aahar | Food Places In Mysore


Latest Additions

Balasore tragedy result of composite negligence of railway officials: Orissa High Court

Actress Kasthuri stokes controversy by her remarks on Telugu-speaking people in TN

Three convicted for 2016 Kollam collectorate blast case

Expect Canadian government to ensure justice, uphold rule of law: PM Modi

Group clash in Indore after argument over bursting firecrackers: NSA slapped against 2 accused

Thanks for visiting Udayavani

You seem to have an Ad Blocker on.
To continue reading, please turn it off or whitelist Udayavani.