Quantum computing calls for new encryption techniques?

Click For Summary

Discussion Overview

The discussion revolves around the implications of quantum computing on current encryption techniques, particularly focusing on the potential obsolescence of methods like RSA and the need for new algorithms and security measures. Participants explore theoretical and practical aspects of quantum computing, its impact on cybersecurity, and the future of internet security.

Discussion Character

  • Debate/contested
  • Technical explanation
  • Exploratory

Main Points Raised

  • One participant asserts that quantum computers could render current encryption techniques, such as RSA, ineffective due to their ability to factor large numbers quickly, suggesting a need for new algorithms.
  • Another participant emphasizes the importance of hardware development in quantum computing, noting that understanding fundamental concepts like entanglement is crucial for designing secure systems.
  • Some participants argue that while RSA-based systems may be at risk, other encryption methods remain secure against known quantum computing technologies, highlighting the resilience of symmetric ciphers like AES.
  • Concerns are raised about the need for a "new internet" due to the anticipated power of quantum computing, although some participants challenge this notion by clarifying that only public key systems are currently vulnerable.
  • A claim is made that symmetric cipher strength is only halved by Grover's algorithm, and that the actual data encryption in protocols like TLS remains secure, provided key lengths are sufficient.
  • One participant humorously states that current quantum computers are limited to performing simple arithmetic, which contrasts with the more serious implications discussed by others.

Areas of Agreement / Disagreement

Participants express a mix of concerns and reassurances regarding the impact of quantum computing on encryption. While there is agreement that RSA and similar public key systems face risks, there is disagreement on the extent of the threat and the necessity for a complete overhaul of current security systems.

Contextual Notes

Participants reference various algorithms and security protocols without resolving the complexities of their interactions with quantum computing. There are assumptions about the capabilities of quantum computers and the definitions of security that remain unexamined.

uperkurk
Messages
167
Reaction score
0
With the phenomenal speed to be expected from quantum computers in the future, todays encryption techniques such as RSA will be pretty much useless. A quantum computer could factorise 600bit+ numbers in a relatively short period of time. Aside from Shor's algorithm, are there any other mathematicians out there who are trying to invent a new algorithm?

It just hit me that when quantum computing starts to take over a "new internet" will need to be created. Any security we have at the moment will just be too weak. Networking, programming, websites, wireless, every aspect of security we have today will be completely useless due to the tremendous power that comes with quantum computing.
 
Computer science news on Phys.org
My own opinion is that like any computer you really need the hardware first before people can figure out the best ways to program the thing. We don't even know a lot of the science behind quantum computers and it looks like the learning curve will be steep. For example, just recently entanglement has been demonstrated to be contextual. That means the strength of the entanglement is dependent on the number of particles entangled and such basic knowledge could be critical to designing quantum security.
 
uperkurk said:
It just hit me that when quantum computing starts to take over a "new internet" will need to be created. Any security we have at the moment will just be too weak. Networking, programming, websites, wireless, every aspect of security we have today will be completely useless due to the tremendous power that comes with quantum computing.

This is not the case. Only public key systems are currently at risk, where the cost of cracking the key is the same as the cost of legitimately encrypting something with it. Symmetric cipher strength is only halved by Grover's attack and unaffected by Shor's.

WPA2 is AES based and will remain secure provided the keylength is long enough. The TLS (secure http) key exchange is at risk, but the actual data encryption (which also uses AES) is not, and rolling out a new key exchange is just an RFC and a few patches away.

Probably the most widespread use of public key cryptography is in the SSH protocol, but there are barriers to attack there. The most important is that the public key in an SSH channel isn't actually "public" the way it is for say PGP keys. This means risk of attack by Shor's is pretty low, since it operates on the public key (factors it) -- not the encrypted datastream.
 
Currently Quantum computers can only do simple maths such as 3x5=15
 

Similar threads

Replies
45
Views
7K
  • · Replies 14 ·
Replies
14
Views
2K
  • · Replies 1 ·
Replies
1
Views
2K
  • · Replies 11 ·
Replies
11
Views
3K
  • · Replies 4 ·
Replies
4
Views
6K
  • · Replies 8 ·
Replies
8
Views
3K
Replies
29
Views
6K
  • · Replies 3 ·
Replies
3
Views
4K
  • · Replies 1 ·
Replies
1
Views
2K
Replies
2
Views
3K