Post-quantum Cryptography

Intro

Is quantum computing for the future or is it already here, in the present?

What are the dangers for technology of quantum computing for the future?

What is quantum computing?

Bits an qubits is the main difference

  • Bit can be only binary. It can be only 0 or 1.

  • Qubit can be 0 and 1 at the same time (superposition).

    • It can let you know all of the availabilities at once.

Revolution in computing

  • Quantum computing gives us quantum parallel calculations. This gives us lots of speed.

  • Qantum interferention let’s us reach the answer as fast as possible.

  • Decoheration

    • In other words it’s instability.

Most powerful computers

  • IBM CONDOR 1121(qubits) (it has the most powerful processor)

  • KOOK ABURRA 4158(qubits) (planning for the 2025)

    • With this much qubits, you can crack AES126 key.
  • Google Willow 103(qubits) (introduced at 2024 12 09)

  • IAONQ

Main advancements in quantum computing

Main algorithms are:

  • Shor’s algorithm

    • It gives us ability to factor big numbers
  • Grover-s algorithm

    • Makes the search in NoSQL databases a lot faster. This algorithm can find stuff in chaos.

Future of Quantum computing

  • Google wants to achieve 1 million qubits. Number is big, but Google likes big numbers.

Businesses working in Quantum Computing

  • IBM

  • Google

  • Intel

  • Xanadu

  • IonQ (First in Europe, other businesses are in USA)

  • Business representatives:

    • Rigetti

    • D-Wave

    • Quantinuum

AI + Quantum Computing

Quantum machine learning:

  • It gives us lots of effectiveness and speed for calculation.

  • It takes low energy.

Quantum neural networks:

  • New architecture using quantum parallelism.

Data Classification:

  • A lot faster big data analysis

Synergy potential

It can make faster pharmacy industry for medication foundings.

9 qubit types

Businesses need to decide which type they need to use.

  • Superconducting qubits

  • Trappen ion qubits

  • Photonic qubits

  • Spin qubits in semiconductors

  • Nuclear spin qubits

  • Neutral atom qubits

  • Mechanical qubits

  • Moleccular qubits

Cyber Security dangers in quantum era

  • Shor’s algorithm can easily break RSA and ECC encryption systems.

  • Nowadays security standards won’t be safe anymore.

  • Digital signatures won’t be as safe as before.

Shor’s algorithm

Classical computing is using mathematical calculations. Quantum computing mathematical calculations means nothing. It take seconds.

Quantum security management

Quantum computer can now easily brute force the password. It takes 1 second.

Quantum computing can easily give you answers who did the attack. It basically say who is attacker. SOC/SIEM systems can be safer than ever before.

Quantum Communication

Quantum Key Distribution (QKD)

  • Safe cryptographic key exchange.

  • Europe has one satellite EAGLE-1 with QKD availability.

ML40 is the main algorithm for quantum security.

Quantum Hackers (#qacker)

Future Perspectives

In the near feature (5 years or even earlier) the threat is real.

Preparation for Q day: Situation now and our future

This is the day when quantum computer will be powerful enough to crack asymmetric cryptography.

We can’t wait for this day and only then start preparing. We must start to think about our security now.

There are reports that chinese qackers already broke military-grade encryption. We do not know what they are capable of.

Who should be interested?

Basically everyone who has network connection.

How to prepare for Q day?

  • There are new algorithms being created. Post quantum algorithms. The following algorithms are already approved:

  • Technology giants already produces new Post Quantum algorithms.

  • There are new groups in European Union dedicated to Post Quantum Cryptography

Transition to Post Quantum Cryptography

Until 2027 European Union Countries must be ready for quantum threats. There are plans prepared for achieving this.

  • Road to quantum security has already started. That’s the good news.

Post Quantum Cryptography (PQC) migration inside organizations

Main quantum threats:

  • Quantum computer will be capable of cracking nowadays cryptographic algorithms.

  • Save now - decrypt later

    • Attackers can now keep the keys and decrypt it later.

First step: Cryptography investigation in your organization

  • Checking where asymmetric algorithms are used.

  • Talking with system admins.

How to manage founded risks?

  • We can check strategies on how we will do it.

  • Resources and budget

  • Decision selection

  • Forming new teams

Testing

  • Lab testing

  • It’s a really good method to check whether your strategies work or not.

  • You need to decide and check which PQC algorithm is best for you.

Making it reality

  • It’s a step by step process

  • Risk management

  • Minimize the disturbances

  • Crypto flexibility

Summary of migration in organization

  • It’s a step by step process

  • It’s a big strategical project

  • Team work

  • We have to act now!

Discussion outcomes

How to prepare for Quantum Computing?

What’s the most difficult challenge here?
  • Qackers are the most dangerous now.

  • The future of quantum computing is not the maybe, it’s guaranteed to happen.

  • It’s opportunity to be safer.

  • Education is a challenge too. How to talk with C level executives about it.

  • Big challenge now is psychological aspect.

  • Post Quantum Cryptography sounds scary…

What are the real usage of quantum computing in businesses?
  • Manufacturers react differently

  • Make current technologies stronger

  • Creating PQC adaptation systems

  • New QKD adaptations

  • 2035 is the year when Post Quantum Era should begin

  • CloudFlare has already developed some techniques for safe Software Development.

  • SCADA/ICS systems will face a challenge, because old controllers cannot adapt to quantum systems.

  • Cryptocurrency industry will have a big challenge, because cryptocurrencies are based upon algorithms.

What do you think about post quantum standardization of algorithms, what does it means for the future?
  • Challenge will be to test new algorithms. To make sure that the algorithm is safe.

  • There has to be a process which checks if the methods of creating algorithms is known.

Do we have too much now?
  • If we want to have safe future, we need to create ecosystem for these processes.

  • We do not have many quantum computers. That’s the problem.

  • We must have infrastructure for this thing. Let’s give toys to the scientists.

We must check who developed the libraries used for quantum algorithms.

How to do inventory analysis?
  • There should be a data manager. A person who knows where and how data are stored. Ant what is the data.

  • It takes time. Lots of time.

  • Just write what data and where you store it. Take a simple Excel file and start.

4
Subscribe to my newsletter

Read articles from Jonas Satkauskas directly inside your inbox. Subscribe to the newsletter, and don't miss out.

Written by

Jonas Satkauskas
Jonas Satkauskas