Q-Day: When Quantum Computers can Factor ultra-large numbers in a few...

  • Thread starter Thread starter WWGD
  • Start date Start date
Click For Summary
Q-Day marks the point when quantum computers can efficiently break widely used encryption methods, such as RSA 2048, posing significant security risks. Discussions highlight concerns over data being harvested now for future decryption, emphasizing the need for stronger encryption methods to protect sensitive information. While some alternative encryption solutions are available, the transition may not be as straightforward as past events like Y2K. Current algorithms like Shor's and Grover's pose challenges for asymmetric encryption, prompting calls for immediate action to secure data. The conversation underscores the urgency for organizations to adapt their security measures in anticipation of quantum advancements.
WWGD
Science Advisor
Homework Helper
Messages
7,743
Reaction score
12,946
TL;DR
Q-day is expected to arrive by around2035. How to deal with the potential pitfalls?
Edit:
Q-Day refers to the point in time when Quantum-based algorithms will be able to break within hours, large-enough keys used in factoring-based encryption, e.g., n=2048 for RSA 2048.

What will we do, what will be the pitfalls, when Quantum Computers are able to factor , say, large-enough keys, depending of the type of factoring-based encryption (Asymmetric)? This is the basis of most encryption models used nowadays. Some are said to be acquiring and storing large amounts of data now, aka, "Harvest now, Decrypt later"(2) , to use said data upon the availability of strong-enough Quantum Computers, which may compromise security.

Currently , alternative encryption methods exist, while others are being researched, so that this may end up being a new version of Y2K, where we will refit all our databases/data storage in time, so that it will be a non-event, albeit the situation is more uncertain in that, for one, the solutions aren't as clear as those of Y2K.

Major Quantum-based current algorithms to contend with are are Shor's , which can factor in Polynomial time, and Grover's algorithms (3)(4) . Shor's presents issues for Asymmetric encryption methods( like RSA or ECC) . Symmetric algorithms (No keys exchanged, e.g., AES 256, may be mitigated by using larger keys ))Major Any opinions?

Edit: I tried to change the "Downfall" for "Pitfalls", but the option to edit the TL; DR seems to be disabled.

1) Time estimates for onset of Q-day : https://www.secureworks.com/blog/predicting-q-day-and-impact-of-breaking-rsa2048

2) Harvest now, decrypt later:
https://www.appviewx.com/blogs/what-you-need-to-know-about-harvest-now-decrypt-later-attacks/

3)https://en.wikipedia.org/wiki/Grover's_algorithm

4)https://en.wikipedia.org/wiki/Shor's_algorithm


3) https://en.wikipedia.org/wiki/Grover's_algorithm

4)https://en.wikipedia.org/wiki/Shor's_algorithm
 
Last edited:
Computer science news on Phys.org
WWGD said:
What will we do when Quantum computers are able to factor , say, 30+-digit numbers?
Use 60+ digit numbers.

WWGD said:
Some are said to be acquiring and storing large amounts of data now , waiting for Q day. It is said alternative encryption methods are being researched
We don't need to research them, we already have them. If you are storing any data that will still be confidential 10 years from now then you need to (i) prevent it getting into the hands of bad actors and (ii) use an appropriate encryption method.
 
  • Like
Likes .Scott, Demystifier and WWGD
pbuk said:
use an appropriate encryption method
I don't see how that is possible. My browser uses what it uses (HTTPS) and if my online transaction is scoffed up now and in 5 years that encryption can be broken, they get all my info from that transaction. Until the browsers use better encryption, how can *I* use better encryption?
 
  • Like
Likes FactChecker and WWGD
The field of quantum cryptography and quantum encryption studies ways to do unhackable encryption. Some companies are already getting ready (doing?) for it.
 
FactChecker said:
The field of quantum cryptography and quantum encryption studies ways to do unhackable encryption. Some companies are already getting ready (doing?) for it.
Yes, and when banks and browsers team up to use new encryption schemes then I might be protected, but what you are saying doesn't answer post #3
 
  • Like
Likes FactChecker
phinds said:
Yes, and when banks and browsers team up to use new encryption schemes then I might be protected, but what you are saying doesn't answer post #3
Good point, regarding current material encrypted by current methods being obtained and unencrypted in the future.
 
Given some groups are storing current data in order to decode it after Q day , (assuming some data, such as ID, age, SS number etc. , used to authenticate , will likely still be useful to them. Edit: And records, data suggesting a shady past , may be used to blackmail), adjustments other than new types of encryption will likely be necessary.
 
  • Like
Likes pines-demon and FactChecker
In always thought that creating self-contained groups that purposefully share false information in unsecured sites _only amongst them_ may be a good way of throwing off the Black hat types.
 
phinds said:
My browser uses what it uses (HTTPS) and if my online transaction is scoffed up now and in 5 years that encryption can be broken, they get all my info from that transaction.
No, "they" can only get the information included in the transaction. What information do you think is included in an online transaction that you are concerned about?
 
  • #10
pbuk said:
No, "they" can only get the information included in the transaction. What information do you think is included in an online transaction that you are concerned about?
Financial transactions, medical records, etc.
 
  • #11
pbuk said:
No, "they" can only get the information included in the transaction. What information do you think is included in an online transaction that you are concerned about?
efiled taxes.
 
  • #12
FactChecker said:
efiled taxes.
I don't know how it works in the US but in the UK I can't think of any information in a tax return that would be particularly useful if intercepted by a bad actor.

And in order for the bad actor to be able to decode the information in five years time they must know today that the encrypted message is worth keeping because it contains interesting information and is not just a random post on an internet forum.

And in order to have the encrypted message they must be able to penetrate the communications on your network, either by a physical intrusion or by intercepting and decoding wireless communications using encrypted protocols that are not breakable at reasonable cost with todays technology.

If I lived in the US right now I would have plenty of things to worry about before I reached for the tin foil hat over this.
 
  • #13
Large prime factorisation becomes irrelevant with secure one-time pads.
Quantum key distribution makes everything a one-time pad.

Cryptographic breakthroughs only become a real advantage, when you can read your enemies traffic, faster than they can act. Well-supported cryptanalysts, are inherently brighter and faster, than the enemies cipher clerks.

For the legacy archives, there may be historical interest, but the value of old information is very low, and the sewers are filled with it. The statutes of limitation, preclude the legal use of old information, but mud sticks.

The revelation or use of originally secure transmitted data, often carries a greater criminal penalty, than the original act that is being revealed.

Democracies change government faster than the archives are normally revealed. Only long term dictatorships can exist for long enough, to be damaged by access to the archives.

"In war-time, truth is so precious that she should always be attended by a bodyguard of lies". (Winston Churchill). Misinformation can be conjured-up faster than reality can be decrypted. Misinformation and conspiracy theories, are more available, and more believable than the truth.

Wikileaks demonstrated the embarrassment felt by Governments, on the revelation of their incompetence, when undeniable information became openly available.

How can Q-Day be any worse than that?
 
  • #14
pbuk said:
I don't know how it works in the US but in the UK I can't think of any information in a tax return that would be particularly useful if intercepted by a bad actor.

And in order for the bad actor to be able to decode the information in five years time they must know today that the encrypted message is worth keeping because it contains interesting information and is not just a random post on an internet forum.

And in order to have the encrypted message they must be able to penetrate the communications on your network, either by a physical intrusion or by intercepting and decoding wireless communications using encrypted protocols that are not breakable at reasonable cost with todays technology.

If I lived in the US right now I would have plenty of things to worry about before I reached for the tin foil hat over this.
Personal information such as age, dob, ssn can be used for bkackhat attempts to authenticate the user: " I'm sorry , sir, I forgot my password. I'm Ben Johnson, dob 3/ 26/ 1945, etc. Edit: I had this account while I lived in 1000 Pepsi Lane, Boulder , Co, Can you remind me of my password?".

Edit: Besides, this is information that has _already_ been stolen , captured, and criminals are waiting for Q day to decrypt it. So no need to penetrate communications in the network.
 
Last edited:
  • #15
WWGD said:
" I'm sorry , sir, I forgot my password. I'm Ben Johnson, dob 3/ 26/ 1945, etc. Can you remind me of my password?"
We have set a new random password for you, and sent it to your (mobile phone) or (email address). Use that to log in, and you must change that to a new password within the next 5 minutes.
 
  • #16
Baluncore said:
We have set a new random password for you, and sent it to your (mobile phone) or (email address). Use that to log in, and you must change that to a new password within the next 5 minutes.
Possibly, valid point . One issue with that is that most companies lend essentially identical services or sell identical products( to each other). The way they differentiate themselves from the competitor is by the quality of their customer service, and are thus overly eager to help, please the customer. EDIT: Or maybe you can just tell the customer rep you've changed your phone. When you're paying someone $10/hr you're not likely to get top of the line service.
 
Last edited:
  • #17
WWGD said:
Possibly, valid point . One issue with that is that most companies lend essentially identical services or sell identical products( to each other). The way they differentiate themselves from the competitor is by the quality of their customer service, and are thus overly eager to help them.
Maybe so but surely you are aware that intentionally storing plain text passwords so you can 'help' a customer by revealing them is not something that any competant company has done for more than a decade? (Although it is of course true that at least one very large company has unintentionally stored plain text passwords much more recently than that).

With two factor authentication knowing a password doesn't help anyway.

@WWGD the more time you spend trying to think of potential risks the less time you have available to protect yourself from real risks.

Edit: you can do that by using a password manager on all your devices to create and store secure and unique passwords and change them at least once a year.
 
  • #18
Your password should be encrypted within the system, unavailable to customer reps for examination.

WWGD said:
EDIT: Or maybe you can just tell the customer rep you've changed your phone.
If you change your phone, and have forgotten your password, you can transfer your old phone number to the new phone, or open a new account.
 
  • #19
Baluncore said:
Your password should be encrypted within the system, unavailable to customer reps for examination.
Hashed rather than encrypted, and therefore unavailable to anyone for any purpose.
 
  • #20
Well, despite all those best practices consistently implemented , weve had major data breaches on what, a monthly basis for years now? Do you think you will attract all the talent and knowhow by hiring for $10/hr for customer reps? The techniques/scenario I described aren't speculation; they've been used. The situation may not be as bad as I describe it but not as safe as you make them out to be either.
 
Last edited:
  • #21
WWGD said:
Well, despite all those best practices consistently implemented , weve had major data breaches on what, a monthly basis for years now?
WWGD said:
The situation may not be as bad as I describe it but not as safe as you make them out to be either.
We only hear of the failures. How many computers and websites are there now out there, with how many passwords and daily hits? What is the data breech rate as a percentage of active users? Will Q-Day change any of that?
 
  • #22
Baluncore said:
We only hear of the failures. How many computers and websites are there now out there, with how many passwords and daily hits? What is the data breech rate as a percentage of active users? Will Q-Day change any of that?
I assume the major players are the ones that are seriously targeted. Others are attacked in very primitive ways using very simple template (Edit) attacks. I admit I am not an expert in this area Edit 2; I think we've dealt addressed and given the "relevant" opinions here . Thank you, thanks all, for your input.
 
Last edited:
  • #23
Unfortunately, many financial companies only improve their security when customers demand it in their selection of a company. That is why banks tend to be slow in adopting improved security measures until those measures become so common that they are expected/demanded by customers.
 
  • #24
WWGD said:
Personal information such as age, dob, ssn can be used for bkackhat attempts to authenticate the user: " I'm sorry , sir, I forgot my password. I'm Ben Johnson, dob 3/ 26/ 1945, etc. Edit: I had this account while I lived in 1000 Pepsi Lane, Boulder , Co, Can you remind me of my password?".

Edit: Besides, this is information that has _already_ been stolen , captured, and criminals are waiting for Q day to decrypt it. So no need to penetrate communications in the network.
There have already been so many large scale data breaches that most of this information is already on the dark web.
 
  • #25
jbergman said:
There have already been so many large scale data breaches that most of this information is already on the dark web.
That's why I thought setting up databases with false content may help throw off some criminals. black-hat hackers.
 
  • #26
WWGD said:
Q day is expected to arrive by 2035.
I don't think Q-day is imminent. (Certainly not on a timescale of a decade!) All that talk of qubits notwithstanding, quantum computers are analog, not digital devices (https://arxiv.org/abs/2312.17570).
Theoreticians can conceive of perfect ## \pi/2 ##-pulses turning ## \ket 0 ## into ## \ket 1 ## and vice versa, but experimental realization is a different matter. I'm pretty sure that factoring a 30-digit number with a quantum computer will turn out to be just as difficult as measuring frequencies with 30-digit accuracy. And metrologists will assure you that we aren't there yet.
 
  • Like
Likes AndreasC and WWGD
  • #27
Wait wait wait. Who said Q-day will happen by 2035? I have some serious doubts about that.
 
  • #28
Maybe a lowball estimate but that's not the key issue, but rather what to do when Q day arrives. I'll do a bit more of a search, though, to provide a more accurate/supportable estimate.
 
  • #29
This IBM tutorial will walk you through the process of setting up a QM-secure SSH on your Linux computer system and then opening up a QM-secure connection to an IBM server that supports that QM-secure protocol.
That article will also give you a good sense as to how far away we are from a fully distributed QM-secure SSH protocol.
That article uses the term "fork" to denote a OpenSSH development branch that is not expected to ever become "main line". SSH is the standard and most common way a computer system has for creating a secure login. Current SSH's provide for a selection of encryption algorithms. A connection is made when the SSH's at each end of the communication select a algorithm that both of them support.

Of particular interest to the OP is this caution provided in the article:
This fork is currently based on OpenSSH version 8.9 [...]. IT IS AT AN EXPERIMENTAL
STAGE, and has not received the same level of auditing and analysis that OpenSSH
has received. [...]

WE DO NOT RECOMMEND RELYING ON THIS FORK TO PROTECT SENSITIVE DATA.

[...]

As research advances, the supported algorithms may see rapid changes in their security,
and may even prove insecure against both classical and quantum computers.

We believe that the NIST Post-Quantum Cryptography standardization project is currently
the best avenue to identifying potentially quantum-resistant algorithms, and strongly
recommend that applications and protocols rely on the outcomes of the NIST
standardization project when deploying quantum-safe cryptography.

While at the time of this writing there are no vulnerabilities known in any of the
quantum-safe algorithms used in this fork, it is advisable to wait on deploying
quantum-safe algorithms until further guidance is provided by the standards
community, especially from the NIST standardization project.

We realize some parties may want to deploy quantum-safe cryptography prior to the
conclusion of the standardization project. We strongly recommend such attempts
make use of so-called hybrid cryptography, in which quantum-safe public-key
algorithms are combined with traditional public key algorithms (like RSA or
elliptic curves) such that the solution is at least no less secure than existing
traditional cryptography. This fork provides the ability to use hybrid cryptography.
 
  • #30
Baluncore said:
Large prime factorisation becomes irrelevant with secure one-time pads.
Quantum key distribution makes everything a one-time pad.

Cryptographic breakthroughs only become a real advantage, when you can read your enemies traffic, faster than they can act. Well-supported cryptanalysts, are inherently brighter and faster, than the enemies cipher clerks.

For the legacy archives, there may be historical interest, but the value of old information is very low, and the sewers are filled with it. The statutes of limitation, preclude the legal use of old information, but mud sticks.

The revelation or use of originally secure transmitted data, often carries a greater criminal penalty, than the original act that is being revealed.

Democracies change government faster than the archives are normally revealed. Only long term dictatorships can exist for long enough, to be damaged by access to the archives.

"In war-time, truth is so precious that she should always be attended by a bodyguard of lies". (Winston Churchill). Misinformation can be conjured-up faster than reality can be decrypted. Misinformation and conspiracy theories, are more available, and more believable than the truth.

Wikileaks demonstrated the embarrassment felt by Governments, on the revelation of their incompetence, when undeniable information became openly available.

How can Q-Day be any worse than that?
The people at NSA don't think that QKD makes everything a one-time pad in practical application. Theory and secure implementation of secure systems are worlds apart. We used vacuum tube crypto systems on NSS systems until the 90's to transmit Nuclear EAM codes. Even if that old system of secure transmissions (that were stored for decades from the original transmission) were cracked by some future Quantum Computer they would be of no use because those messages required a separate one-time pad like Gold Codes for authentication.
https://en.wikipedia.org/wiki/Gold_Codes

https://www.nsa.gov/Cybersecurity/Quantum-Key-Distribution-QKD-and-Quantum-Cryptography-QC/

Synopsis​

NSA continues to evaluate the usage of cryptography solutions to secure the transmission of data in National Security Systems. NSA does not recommend the usage of quantum key distribution and quantum cryptography for securing the transmission of data in National Security Systems (NSS) unless the limitations below are overcome.
 
  • Like
Likes pbuk and WWGD

Similar threads

  • · Replies 14 ·
Replies
14
Views
2K
Replies
2
Views
3K
  • · Replies 11 ·
Replies
11
Views
3K
  • · Replies 2 ·
Replies
2
Views
3K
Replies
29
Views
5K
Replies
5
Views
3K
  • · Replies 13 ·
Replies
13
Views
4K