Post-quantum Cryptography


Intro
Is quantum computing for the future or is it already here, in the present?
What are the dangers for technology of quantum computing for the future?
What is quantum computing?
Bits an qubits is the main difference
Bit can be only binary. It can be only 0 or 1.
Qubit can be 0 and 1 at the same time (superposition).
- It can let you know all of the availabilities at once.
Revolution in computing
Quantum computing gives us quantum parallel calculations. This gives us lots of speed.
Qantum interferention let’s us reach the answer as fast as possible.
Decoheration
- In other words it’s instability.
Most powerful computers
IBM CONDOR 1121(qubits) (it has the most powerful processor)
KOOK ABURRA 4158(qubits) (planning for the 2025)
- With this much qubits, you can crack AES126 key.
Google Willow 103(qubits) (introduced at 2024 12 09)
IAONQ
Main advancements in quantum computing
Main algorithms are:
Shor’s algorithm
- It gives us ability to factor big numbers
Grover-s algorithm
- Makes the search in NoSQL databases a lot faster. This algorithm can find stuff in chaos.
Future of Quantum computing
- Google wants to achieve 1 million qubits. Number is big, but Google likes big numbers.
Businesses working in Quantum Computing
IBM
Google
Intel
Xanadu
IonQ (First in Europe, other businesses are in USA)
Business representatives:
Rigetti
D-Wave
Quantinuum
AI + Quantum Computing
Quantum machine learning:
It gives us lots of effectiveness and speed for calculation.
It takes low energy.
Quantum neural networks:
- New architecture using quantum parallelism.
Data Classification:
- A lot faster big data analysis
Synergy potential
It can make faster pharmacy industry for medication foundings.
9 qubit types
Businesses need to decide which type they need to use.
Superconducting qubits
Trappen ion qubits
Photonic qubits
Spin qubits in semiconductors
Nuclear spin qubits
Neutral atom qubits
Mechanical qubits
Moleccular qubits
Cyber Security dangers in quantum era
Shor’s algorithm can easily break RSA and ECC encryption systems.
Nowadays security standards won’t be safe anymore.
Digital signatures won’t be as safe as before.
Shor’s algorithm
Classical computing is using mathematical calculations. Quantum computing mathematical calculations means nothing. It take seconds.
Quantum security management
Quantum computer can now easily brute force the password. It takes 1 second.
Quantum computing can easily give you answers who did the attack. It basically say who is attacker. SOC/SIEM systems can be safer than ever before.
Quantum Communication
Quantum Key Distribution (QKD)
Safe cryptographic key exchange.
Europe has one satellite EAGLE-1 with QKD availability.
ML40 is the main algorithm for quantum security.
Quantum Hackers (#qacker)
Future Perspectives
In the near feature (5 years or even earlier) the threat is real.
Preparation for Q day: Situation now and our future
This is the day when quantum computer will be powerful enough to crack asymmetric cryptography.
We can’t wait for this day and only then start preparing. We must start to think about our security now.
There are reports that chinese qackers already broke military-grade encryption. We do not know what they are capable of.
Who should be interested?
Basically everyone who has network connection.
How to prepare for Q day?
There are new algorithms being created. Post quantum algorithms. The following algorithms are already approved:
Technology giants already produces new Post Quantum algorithms.
There are new groups in European Union dedicated to Post Quantum Cryptography
Transition to Post Quantum Cryptography
Until 2027 European Union Countries must be ready for quantum threats. There are plans prepared for achieving this.
- Road to quantum security has already started. That’s the good news.
Post Quantum Cryptography (PQC) migration inside organizations
Main quantum threats:
Quantum computer will be capable of cracking nowadays cryptographic algorithms.
Save now - decrypt later
- Attackers can now keep the keys and decrypt it later.
First step: Cryptography investigation in your organization
Checking where asymmetric algorithms are used.
Talking with system admins.
How to manage founded risks?
We can check strategies on how we will do it.
Resources and budget
Decision selection
Forming new teams
Testing
Lab testing
It’s a really good method to check whether your strategies work or not.
You need to decide and check which PQC algorithm is best for you.
Making it reality
It’s a step by step process
Risk management
Minimize the disturbances
Crypto flexibility
Summary of migration in organization
It’s a step by step process
It’s a big strategical project
Team work
We have to act now!
Discussion outcomes
How to prepare for Quantum Computing?
What’s the most difficult challenge here?
Qackers are the most dangerous now.
The future of quantum computing is not the maybe, it’s guaranteed to happen.
It’s opportunity to be safer.
Education is a challenge too. How to talk with C level executives about it.
Big challenge now is psychological aspect.
Post Quantum Cryptography sounds scary…
What are the real usage of quantum computing in businesses?
Manufacturers react differently
Make current technologies stronger
Creating PQC adaptation systems
New QKD adaptations
2035 is the year when Post Quantum Era should begin
CloudFlare has already developed some techniques for safe Software Development.
SCADA/ICS systems will face a challenge, because old controllers cannot adapt to quantum systems.
Cryptocurrency industry will have a big challenge, because cryptocurrencies are based upon algorithms.
What do you think about post quantum standardization of algorithms, what does it means for the future?
Challenge will be to test new algorithms. To make sure that the algorithm is safe.
There has to be a process which checks if the methods of creating algorithms is known.
Do we have too much now?
If we want to have safe future, we need to create ecosystem for these processes.
We do not have many quantum computers. That’s the problem.
We must have infrastructure for this thing. Let’s give toys to the scientists.
We must check who developed the libraries used for quantum algorithms.
How to do inventory analysis?
There should be a data manager. A person who knows where and how data are stored. Ant what is the data.
It takes time. Lots of time.
Just write what data and where you store it. Take a simple Excel file and start.
Subscribe to my newsletter
Read articles from Jonas Satkauskas directly inside your inbox. Subscribe to the newsletter, and don't miss out.
Written by
