What you’ll learn:
- Why quantum computers can break existing cryptography.
- How encryption on conventional computers can thwart quantum-computer code breaking.
Quantum computing is still in its infancy, but it promises to solve many problems more quickly than possible with conventional computing systems. One area that’s garnered a lot of attention is how quantum computers will be able to break our existing encryption in a matter of hours or less.
I talked with Bart Stevens, Senior Director of Product Marketing at RAMBUS (see the video above), about NIST’s post-quantum cryptography (PQC) as well as how new encryption algorithms are being designed to make it harder for quantum computers to be used to break these codes.
NIST’s Quantum-Resistant Plan of Attack
Addressing cybersecurity is one of the tasks of the National Institute of Standards and Technology (NIST). In 2002, “NIST Announces First Four Quantum-Resistant Cryptographic Algorithms” highlighted the emerging standard for encryption support that’s resistant to cracking by quantum computers.
NIST selected the CRYSTALS-Kyber algorithm for general encryption needs like that used for secure, HTTPS website access. It can utilize small encryption keys for two-party communication.
The other common cryptography task includes digital signatures used to sign documents and transactions. The three algorithms selected for this task are CRYSTALS-Dilithium, FALCON, and SPHINCS+. The first is the primary recommendation at this time, while FALCON provides security using smaller signatures.
Existing public key systems employ large prime factorization that’s very hard to break using conventional brute-force mechanisms. However, it’s something quantum computers can do extremely fast. SPHINCS+ employs a hashing approach while the other three quantum-resistant algorithms use a structured lattice approach.
Encryption protocols need to be expanded to utilize the new encryption standards and hardware. Moreover, software is needed to implement the encryption algorithms. The standards aren’t yet set in stone, but that will likely come to fruition in the near future. Significant work is being done to evaluate the algorithms and finalize the standards.
Check out more videos/articles in the TechXchange: Quantum Computing and Security.