Quantum what?
lila-art.net

Quantum what?

No alt text provided for this image

Quantum computing, quantum cryptography, and post-quantum cryptography: these terms are confusing. This post attempts to clarify them and draws the relationship between them.

Quantum computing is the set of technologies that use quantum-mechanical phenomena to perform computing. Quantum computing uses qubits rather than bits. Where one bit of conventional computing has one of the two possible states “0” or “1”, a qubit has a set of independent states simultaneously via superposition. Furthermore, entangled qubits behave together in non-conventional ways (for instance, immediate synchronization independent from the distance separating the two qubits).

These properties allow solving some classes of problems, many orders faster than conventional computing. In 1994, Peter Shor published “Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer” [1]. His algorithm solves the prime factorization and discrete logarithm hard problems. Prime factorization is the foundation of cryptosystems such as Diffie Hellman (DH) and RSA. Discrete logarithms are the foundation of elliptic curve cryptosystems (ECC). In 1996, Lov Grover published “A fast quantum mechanical algorithm for database search” [2]. His algorithm inverts one-way functions in  time.  It applies to symmetric ciphers and cryptographic hashes.

Whenever quantum computing is operational, accurate, and with enough qubits, these algorithms and their enhancements will impact traditional cryptography. To mitigate Grover’s algorithm, the size of symmetric keys and hashes has to increase. For instance, AES will need at least 256-bit keys. Shor’s algorithm annihilates the security of prime factorization or discrete logarithm-based cryptosystems. In other words, DH, RSA, and ECC will not be secure anymore.

Post-quantum cryptography encompasses the algorithms that are allegedly immune against quantum computing.  There are mainly four categories of algorithms.

  •  Hash-based signatures; It uses the current hash algorithms, and its security is well understood. The size of the public key is far larger and usable only once. 
  •  Code-based encryption; It uses sophisticated error-correcting codes.  The McEliece’s scheme was first proposed in 1978 [3] and has not been broken since. 
  • Lattice-based encryption is the most efficient and promising solution. It allows encryption, digital signatures, and fully homomorphic encryption.
  • Multi-variate Quadratic Equations seem the less promising path. All proposed schemes are currently broken. 

It is wise to strengthen post-quantum cryptography to be ready whenever this threat is active.  NIST estimates that a 1 billion $ quantum computer may break RSA 2048 keys in a matter of hours.  A future post will explore more in detail post-quantum cryptography.

Quantum cryptography or Quantum Key Distribution (QKD) sends over information, including a secret key, using photons over a line between Alice and Bob. Once Bob received the secret key, Alice and Bob use it to encrypt and decrypt via traditional symmetric cryptosystems their messages. This key distribution is very similar to many current systems.  Nevertheless, due to the Heisenberg’s principle, if Eve eavesdrops the QKD, she alters the secret key. Thus, Alice and Bob know they are eavesdropped, offering higher security. The obvious limitation is that it can only be used in point to point communications. The first QKDs were designed in the 80s.

Hoping that this post shed some light, I wish you a happy new year.

References

[1]         P. W. Shor, “Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer,” SIAM J. Comput., vol. 26, no. 5, pp. 1484–1509, Oct. 1997, doi: 10.1137/S0097539795293172.

[2]         L. K. Grover, “A fast quantum mechanical algorithm for database search,” ArXivquant-Ph9605043, Nov. 1996.

[3]         R. McEliece, “A public-key cryptosystem based on algebraic coding theory,” NASA, DSN 42-44, 1978.

 

 

Hello all: Fine note, my sources predict practical QC about 5-10 yrs, the Chinese are far ahead of US and EU in QC at this point.  Be good to have Eric's thoughts on the impact of block chain technology on DRM and the media business in general.  Bon journee,  Jon in Paris 

Like
Reply

Nice summary Eric DIEHL, but you cannot claim that the McEliece system wasn't broken since 1978. There is no polynomial algorithm to crack the problem, but there was a lot of improvements to the initial Stern's attack. https://cr.yp.to/codes/mceliece-20080807.pdf What is true is that it relies on a NP-complete problem, and provided P is not NP, quantum computing isn't likely to solve NP-complete problems in polynomial time. Happy New Year !

Like
Reply

Great explanation Eric.

Like
Reply

Simple and clear explanation as always. Thanks. 

Like
Reply

Thanks, Eric, for this interesting update. And while I'm at it, I wish you a Happy New Year!

Like
Reply

To view or add a comment, sign in

More articles by Eric DIEHL

  • IS RSA2048 broken?

    Recently, an academic paper from a large team of Chinese researchers made the headlines of the specialized press [1]…

    2 Comments
  • Biometric Vein Recognition Hacked

    Happy New Year 2019. It seems that the new year always brings exciting news.

    3 Comments
  • Blockchain: why have permissionless blockchains to be slow?

    This post is the seventh post in a series dedicated to demystifying blockchains. The previous post introduced the…

    2 Comments
  • Blockchain: Consensus based on Byzantine Fault Tolerance

    This post is the sixth post in a series dedicated to demystifying blockchains. The last post introduced the Proof of…

    2 Comments
  • Blockchain: Proof of Stake

    This post is the fifth post in a series dedicated to demystifying blockchains. The fourth post introduced the most…

    1 Comment
  • Blockchain: Proof of Work

    This post is the fourth post in a series dedicated to demystifying blockchains. The third post introduced the major…

  • Blockchain: consensus protocols

    This post is the third post in a series dedicated to demystifying blockchains. The second post described the difference…

    3 Comments
  • Blockchain: Permissionless versus Permissioned

    This post is the second one in a series dedicated to demystifying blockchains. The first post proposed a definition of…

    2 Comments
  • Blockchain: A Definition

    This post is the first one of a series dedicated to the blockchain. In the coming weeks, I will discuss many aspects of…

    10 Comments
  • Password complexity

    Password complexity is one of the top conflictual topics of security. According to NIST, many companies may…

    2 Comments

Others also viewed

Explore content categories