Quantum-Resistant Cryptographic Algorithms

Despite the fact that large-scale, fault-tolerant quantum computing remains a longer-term goal, the National Institute of Standards and Technology (NIST) has requested public input and proposals regarding the development of quantum-resistant cryptographic algorithms. 

For some context, while modern day computers pass and conceal information through the use of bits (1s and 0s - on and off respectively), quantum computers operate with qubits. Qubits differ fundamentally from classical bits, as they can exist on, off, or in both states simultaneously. In theory, sufficiently powerful quantum computers could factor large numbers far more efficiently than a standard computer.

Because of this, current encryption algorithms that could take centuries to solve would no longer offer adequate security, as sufficiently powerful quantum attacks could dramatically reduce the effort required to break them. This would essentially overwhelm current encrypted communications—compromising and exposing significant amounts of critical data. And while the advancement of quantum computing is exciting and filled with much promise, if and when it does become mainstream, existing network infrastructures will require significant cryptographic updates and careful migrations.

While fully functioning quantum systems are a distant reality, NIST recognizes the long-term implications of such capabilities and the need for preventative, quantum-resistant cryptography. The goal is to ensure that all systems can defend against breach attempts—both standard and quantum—before it’s too late.

The research and development of quantum-resistant cryptographic algorithms is a long-term effort. Since NIST’s initial call for submissions in 2017, substantial progress has been made toward standardizing post-quantum cryptographic algorithms.

At first glance, it may seem like NIST’s request was a bit preemptive; however, one cannot fully understand or predict the performance of a system until it’s been properly assessed. Unforeseen glitches and miscalculations could occur with catastrophic results. It is important to develop and test this technology before a nation state or malicious actor obtains the capability to exploit post-quantum cryptography—using it not as a shield, but as a weapon. While post-quantum cryptography has many hurdles to overcome, in many ways it is also stronger than current standards. The actual implementation of this technology, however, will likely not be without its difficulties. It will be interesting to observe NIST’s progress as this project transpires.

Learn More:
https://www.federalregister.gov/documents/2016/12/20/2016-30615/announcing-request-for-nominations-for-public-key-post-quantum-cryptographic-algorithms
https://en.wikipedia.org/wiki/Qubit

Previous
Previous

Autonomous Vehicles and the Hyperloop

Next
Next

Custom Tor Hidden Services