Quantum computing calls for new encryption techniques?

In summary: However, as they get faster and more powerful they will be able to start doing more complicated maths.
  • #1
uperkurk
167
0
With the phenomenal speed to be expected from quantum computers in the future, todays encryption techniques such as RSA will be pretty much useless. A quantum computer could factorise 600bit+ numbers in a relatively short period of time. Aside from Shor's algorithm, are there any other mathematicians out there who are trying to invent a new algorithm?

It just hit me that when quantum computing starts to take over a "new internet" will need to be created. Any security we have at the moment will just be too weak. Networking, programming, websites, wireless, every aspect of security we have today will be completely useless due to the tremendous power that comes with quantum computing.
 
Computer science news on Phys.org
  • #2
My own opinion is that like any computer you really need the hardware first before people can figure out the best ways to program the thing. We don't even know a lot of the science behind quantum computers and it looks like the learning curve will be steep. For example, just recently entanglement has been demonstrated to be contextual. That means the strength of the entanglement is dependent on the number of particles entangled and such basic knowledge could be critical to designing quantum security.
 
  • #4
uperkurk said:
It just hit me that when quantum computing starts to take over a "new internet" will need to be created. Any security we have at the moment will just be too weak. Networking, programming, websites, wireless, every aspect of security we have today will be completely useless due to the tremendous power that comes with quantum computing.

This is not the case. Only public key systems are currently at risk, where the cost of cracking the key is the same as the cost of legitimately encrypting something with it. Symmetric cipher strength is only halved by Grover's attack and unaffected by Shor's.

WPA2 is AES based and will remain secure provided the keylength is long enough. The TLS (secure http) key exchange is at risk, but the actual data encryption (which also uses AES) is not, and rolling out a new key exchange is just an RFC and a few patches away.

Probably the most widespread use of public key cryptography is in the SSH protocol, but there are barriers to attack there. The most important is that the public key in an SSH channel isn't actually "public" the way it is for say PGP keys. This means risk of attack by Shor's is pretty low, since it operates on the public key (factors it) -- not the encrypted datastream.
 
  • #5
Currently Quantum computers can only do simple maths such as 3x5=15
 

1. What is quantum computing?

Quantum computing is a type of computing technology that relies on the principles of quantum mechanics to perform calculations. Unlike classical computers, which use bits to store and process information, quantum computers use quantum bits (qubits) that can exist in multiple states at the same time. This allows them to solve certain problems much faster than classical computers.

2. How does quantum computing pose a threat to current encryption techniques?

Quantum computers have the potential to break many of the commonly used encryption techniques, such as RSA and AES, because they can quickly solve certain mathematical problems that classical computers would take years or even centuries to solve. This means that sensitive information, such as personal data and financial transactions, could be at risk if not protected by quantum-resistant encryption methods.

3. Why do we need new encryption techniques for quantum computing?

Current encryption techniques are based on classical computing principles and are not designed to withstand attacks from quantum computers. In order to protect sensitive information from being compromised in the future, it is necessary to develop new encryption methods that are resistant to quantum computing attacks.

4. What are some potential solutions for quantum-resistant encryption?

There are several approaches being explored for quantum-resistant encryption. One method is to use lattice-based cryptography, which involves using complex mathematical problems that are difficult for both classical and quantum computers to solve. Another approach is to use quantum key distribution, which uses the principles of quantum mechanics to securely exchange encryption keys.

5. When will we need to start using quantum-resistant encryption?

It is difficult to predict exactly when quantum computers will become powerful enough to break current encryption techniques. However, it is important to start developing and implementing quantum-resistant encryption methods now in order to ensure the security of sensitive information in the future.

Similar threads

  • Programming and Computer Science
Replies
14
Views
1K
  • Computing and Technology
Replies
1
Views
1K
Replies
1
Views
793
  • Quantum Physics
Replies
11
Views
2K
  • Science and Math Textbooks
Replies
4
Views
4K
  • Quantum Physics
Replies
8
Views
2K
  • Programming and Computer Science
Replies
29
Views
3K
Replies
2
Views
863
Replies
2
Views
1K
  • Computing and Technology
Replies
4
Views
3K
Back
Top