2018-10-02

Prepare Your Encryption for the Era of Quantum Computing

Encryption and Computing Performance

Legacy computing uses binary digits and, even with doubling the computing performance every 18 months, it is believed to take 70 years to break AES256 encryption with a standard approach to computing.

Quantum computing uses quantum bits, which enable the computer to perform multiple calculations simultaneously. Thus, the probability of having AES256 enciphered much faster the primitives using Shor's factorisation quantum algorithm than with standard computers. It is believed that Quantum computing is still 20 years ahead, but governments may gain the ability earlier, even within three years’ time.

Threat cases

“If someone were to record that communication now, in three years’ time a quantum computer comes along, then they can decrypt that communication and make money from the credit card details.” 

“The flaw of the Public Key Method is that the message and the private key travel together, so if you have enough processing power you can work out the key and compromise the data.”

“Instead of relying on prime-factor based methods for encrypting data, post-quantum encryption uses techniques that have been described as quantum-resistant”.

Mitigation

  • Gain understanding what encryption methods your units are using. Be at least sure that all used encryption complies with SHA 2 requirements.
  • If possible, extend the key length of current public key encryption.
  • From now on, start acquiring encryption devices that support automation upgrade of encryption algorithms.
  • Use Secret key algorithm (symmetric algorithm) that uses the same key for both encryption and decryption. That key is distributed other ways, sometimes out-of-band, so if the key remains secret and there is no access to both plain and encrypted text.
  • Start testing new algorithms like:
  • Grover’s Algorithm may stand against Quantum speed of unstructured searching and provide an amplitude amplification to existing algorithms.
  • Lattice-based cryptography solutions

References

1. https://www.computerweekly.com/feature/Prepare-now-for-quantum-computers-QKD-and-post-quantum-encryption?src=5798104&asrc=EM_ERU_101142323&utm_content=eru-rd2-rcpF&utm_medium=EM&utm_source=ERU&utm_campaign=20181001_ERU%20Transmission%20for%2010/01/2018%20(UserUniverse:%202637481)
2. https://searchsecurity.techtarget.com/tip/How-lattice-based-cryptography-will-improve-encryption