Quantum computing is poised to revolutionize many industries, providing unprecedented computational power. But this advancement poses a paradox in cybersecurity: it has the potential to enhance security measures while simultaneously threatening to undermine the very encryption protocols that safeguard our digital world.
The Quantum Threat to Current Cryptography
Current methods based on encryption through RSA and ECC rely on problems such as integer factorization and discrete logarithms, for which quantum computers based on algorithms such as Shor’s can break in an exponential speedup compared with classical computers, making all these methods of current encryption unsafe if a large-enough quantum computer is available to decrypt today’s standards, leading to data theft.
According to a survey conducted in 2021, 47% of respondents across the globe expressed a high concern about security threats related to quantum computing, and Australians were most concerned at 58%. This fear is seen in the commercial world; 60% of Canadian and 73% of U.S. businesses believe that it is a matter of when, not if cybercriminals take advantage of the quantum capabilities to decrypt current cybersecurity protocols. Quantum computing is founded on quantum mechanics and can be used to do virtual experiments, among other difficult problems that even the best today’s computers can’t solve. Cybersecurity researchers fear that such a computer may well break most modern cryptography and, therefore, present a serious security risk.
Post-Quantum Cryptography:
In response to these looming threats, the field of post-quantum cryptography (PQC) has emerged, aiming to develop algorithms resistant to quantum attacks. The National Institute of Standards and Technology (NIST) has been at the forefront of this initiative, recently approving three algorithms for post-quantum cryptography after eight years of research. This proactive approach is crucial, as the transition to quantum-resistant systems is expected to be complex and time-consuming, potentially spanning over a decade.
It seems most major technology companies are already assimilating new algorithms into products. For instance, Google and Apple have just started integrating the quantum-safe algorithm to future-proof the security infrastructures. The United States government, too, mandated a transition toward quantum-safe systems by 2035, reflecting the urgency that surrounds this transition.
In addition, Cybersecurity experts highlight the dual nature of quantum computing. Pierluigi Paganini, a cyber security expert, says that while quantum computing brings many advances, it also poses a significant threat to current encryption methods, which may make existing security protocols obsolete. Similarly, the U.S. Government Accountability Office points out the need for leadership in defining quantum threat mitigation strategies, stressing that quantum computers could compromise the cryptographic methods protecting our systems and data.
The Path Forward
Transitioning to quantum-resistant cryptography is not a technological challenge only but also a strategic imperative. Organizations need to assess their present cryptographic systems and design roadmaps to migrate to their quantum-safe equivalents. This exercise requires collaboration among industries and governments to ensure coordinated and effective action against the quantum threat.
In conclusion, quantum computing is both a blessing and a curse when it comes to cybersecurity. Unmatched computational ability promises significant improvements but also puts current encryption standards at existential risk. Proactive engagement with post-quantum cryptography and strategic planning are necessary in order to utilize the benefits of quantum computing without risking its threat.
Author: Ms. Anadhi Sharma, Bachelor in Political Science, Hindu College, University of Delhi
Disclaimer – The views and opinions expressed in the commentaries/blogs/articles are those of the authors and do not necessarily reflect the official policy or position of the Forum for Global Studies.