Can Quantum Computers Break Encryption? Demystifying the Connection Between Quantum Computing and Encryption (2024)

Demystifying the Connection Between Quantum Computing and Encryption

With recent news about advances in quantum computing and the potential risk to information security, a lot of people are wondering about the connection between quantum computing and encryption. This article seeks to answer these questions in simple terms and as a series of questions, so that the average person can make sense of what is going to be a very important topic in the coming months and years, if not already.

Can Quantum Computers Break Encryption? Demystifying the Connection Between Quantum Computing and Encryption (1)

What is encryption?

Encryption consists of transforming data into undecipherable strings by using another secret string also known as an encryption key. The transformation algorithms have special characteristics such that once the key is mixed into the original data and many iterations of the algorithm are performed, it is virtually impossible to retrieve the original data from the transformed string without access to the encryption key. Encryption was invented in the late 1970’s and the particular algorithms have evolved to become stronger and stronger over the years under the aegis of NIST. The current gold standard of encryption is the AES 256 algorithm.

Is there more than one type of encryption?

There are two main types of encryption: symmetric and asymmetric.

Symmetric encryption

Symmetric encryption utilizes the same key to encrypt and decrypt data. This means that the same key needs to be available at the time of encryption and also at the time of decryption. Needless to say, this would work in cases where the data that is being secured remains in possession of the party that encrypted it. Alternatively, the party that encrypted it would need to find a safe way to send the encryption keys over to the party that needs to decrypt it. If keys are compromised then the security of the entire encrypted data set is compromised.

So, what about cases where encrypted data needs to be sent to a second party who needs to decrypt it on their end without access to the original key? This is where asymmetric encryption comes in.

Asymmetric encryption

Asymmetric encryption utilizes two different, but related, keys – one to encrypt and the other to decrypt the data. In this scenario, encryption keys are created in pairs – known as the public key and the private key.

The relationship between keys is such that deriving one (say the private key) from the other (say the public key) requires factoring exceedingly large prime numbers, which is so computationally intensive, that it would take normal computers a very very long time. Due to the exceedingly long times involved, this has been considered non-viable so far.

So, for two parties to share encrypted data via asymmetric encryption, the party that is encrypting the data grabs the receiving party’s public key from a publicly accessible source and uses it to encrypt the data. They then send the encrypted data over to the receiving party, who uses the associated private key to decrypt the data. Asymmetric key encryption is the foundation behind secure transmission of data across networks. When data is encrypted in this fashion, gathering data via network interception does not yield usable data and therefore does not constitute a data breach.

What makes quantum computers special?

In order to understand why quantum computers are special, let us take a quick look at how traditional computers encode and process data.

Until quantum computers came along, computers stored and processed data utilizing a binary format. Binary implies that the data is encoded into bits that can exist in two states, say 0 and 1. You can think of them as on and off. The amount of data that can be stored on traditional computers and their speed of processing is limited by the number of states i.e. the sheer amount of information that can be held on a single bit.

Quantum computers, on the other hand, utilize special bits called qubits which can take on the value of two bits at once. This means that they can store and process orders of magnitude more information than their traditional binary counterparts. This is significant because this means that a quantum computer can complete computationally intensive operations much faster than traditional computers.

Why does quantum computing put encryption at risk?

Since quantum computers can complete computationally intensive operations, such as factoring prime numbers, very fast, the entire premise behind the security of asymmetric encryption becomes at risk (See answer to previous question for context).

Specifically, a quantum computer could take a publicly available public key and derive the associated private key from it. This means that any data encrypted using that public key could now be decrypted without the consent of the party that sought to protect that data. This applies to all data that is secured using asymmetric key encryption and is a big deal!

Does quantum computing put all types of encryption at risk?

Due to the reasons described above, quantum computing puts asymmetric encryption at risk. Symmetric key encryption is not at risk since the same key is used to encrypt and decrypt the data and this key is typically safeguarded by the party that performed the encryption. In symmetric encryption, there is no concept of a public and private key. In the absence of key pairs there is no risk of deriving a decryption key from an available public key.

What is most concerning about the threat of quantum computing with respect to encryption?

One of the more concerning aspects of the threat of quantum computers to (asymmetric) encryption is the knowledge that bad actors have been intercepting networks and collecting encrypted data for a long time. This “gather now, harvest later” strategy has been adopted by cybercriminals including nation state actors with the anticipation that at some point in the near future this data could become the source of sensitive data, personal data, intellectual property, trade secrets, and national secrets, past and present.

How can we keep encrypted data secure against the threat of quantum computing?

At this time NIST is overseeing the development of quantum safe cryptography. Our advice would be to utilize symmetric encryption for data under your control. For data that does need to be securely shared with another party, wherever possible, we advise sharing sensitive data via a secure data sharing platform (disclosure: this is a use case that Portal26 addresses via the Portal26 Data Security Platform).

Find Out More >

A platform (such as Portal26) can secure valuable data using symmetric encryption and make it available to authorized parties in a number of forms. This includes decrypting it (if the data owner permits), making it available for search and analytics without decryption (in cases where the receiving party needs to query the data rather than download it), or make it available in partially masked or redacted formats based on permissions granted by the data owner.

Portal26’s Data Security Solutions

For more information about secure data sharing and other data security use cases addressed by Portal26, please contact us and or book a demo today.

Schedule a Demo >

Can Quantum Computers Break Encryption? Demystifying the Connection Between Quantum Computing and Encryption (2024)

FAQs

Can Quantum Computers Break Encryption? Demystifying the Connection Between Quantum Computing and Encryption? ›

Specifically, a quantum computer could take a publicly available public key and derive the associated private key from it. This means that any data encrypted using that public key could now be decrypted without the consent of the party that sought to protect that data.

Can quantum cryptography be broken? ›

The hope is that quantum computers will not break these four algorithms, he says, although there is always that possibility. According to Moody, no one can guarantee that no one will ever develop a smart new attack that could break a post-quantum cryptographic algorithm.

What is the threat of quantum computing to encryption? ›

An attacker can intercept and store encrypted data today, and when quantum computers become feasible, the attacker could decrypt the stored data. If quantum computers are realised in fewer than the number of years the data must be confidential for, the security requirement has been broken.

How long does it take for a quantum computer to break encryption? ›

Quantum basics

Our blog post explains in detail what a quantum computer is, how it works, and why it's so difficult to build. So far, all experts have agreed that a quantum computer large enough to crack RSA would probably be built no sooner than around a few dozen decades.

Is it possible to break encryption? ›

One of the most straightforward yet resource-intensive methods used to break encryption is a brute force attack. In this method, adversaries systematically try every possible combination of keys until they find the correct one and decrypt the cipher text.

Could quantum computers break encryption? ›

Specifically, a quantum computer could take a publicly available public key and derive the associated private key from it. This means that any data encrypted using that public key could now be decrypted without the consent of the party that sought to protect that data.

What happens to encryption after quantum computing? ›

As such, quantum computers have the potential to render current encryption methods vulnerable to attack, compromising the security of sensitive data. Thus, the threat becomes real when more powerful quantum computers are developed in the future, which could defeat commonly used encryption systems.

Why did NASA stop quantum computing? ›

The abrupt shutdown of NASA's quantum computing project was triggered by an unforeseen incident during a routine test. During the analysis of a complex simulation, the quantum computer demonstrated unprecedented computational power, solving a previously intractable problem.

Why is quantum encryption unbreakable? ›

For example, it is impossible to copy data encoded in a quantum state. If one attempts to read the encoded data, the quantum state will be changed due to wave function collapse (no-cloning theorem).

How safe is quantum encryption? ›

Even encrypted data that is safe against current adversaries can be stored for later decryption once a practical quantum computer becomes available. At the same time it will be no longer possible to guarantee the integrity and authenticity of transmitted information, as tampered data will go undetected.

Can quantum computers break passwords? ›

In other words, when Shor proved quantum computers would have the ability to break large numbers into their prime factors much faster than classic computers, he proved quantum computers could weaken or break many of the encryption methods we use today.

Can AES be broken with quantum computing? ›

AES256 is currently quantum resistant, and will remain so until quantum computers become at least an order-of-magnitude more powerful than the current cutting-edge technology in quantum computing.

Could a quantum computer break blockchain? ›

Quantum computers could potentially break current blockchain encryption, risking billions in cryptocurrency assets, according to a quantum policy expert.

What is the threat to encryption in quantum computing? ›

So far, public-key encryption has been uncrackable by using very long key pairs—like 2,048 bits, which corresponds to a number that is 617 decimal digits long. But sufficiently advanced quantum computers could crack even 4,096-bit key pairs in just a few hours using a method called Shor's algorithm.

What is the hardest encryption to break? ›

AES 256-bit encryption is the strongest and most robust encryption standard that is commercially available today. While it is theoretically true that AES 256-bit encryption is harder to crack than AES 128-bit encryption, AES 128-bit encryption has never been cracked.

Can artificial intelligence break encryption? ›

Without AI, you might need 8 million qubits to break a single encryption; using AI, you might need less than 400, he said.

Is quantum cryptography Unhackable? ›

In theory, quantum communications should be impossible to hack, but study shows this may not be true in practice. Interest in quantum technologies, particularly quantum communications, is growing as it seeks to improve data security, which is increasingly becoming compromised in the modern world.

Can quantum break crypto? ›

Quantum computers could potentially break current blockchain encryption, risking billions in cryptocurrency assets, according to a quantum policy expert. Quantum-resistant cryptography and quantum random-number generators are emerging as vital solutions to protect blockchain networks from quantum attacks.

Can AES be broken with quantum? ›

Grover's algorithm is a quantum algorithm for unstructured data that provides a quadratic speedup in the computation over classical computing. This can result in AES-128 being feasible to crack, but AES-256 is still considered quantum resistant—at least until 2050, (as referenced throughout ETSI GR QSC 006 V1. 1.1.)

How secure is quantum cryptography? ›

While still in its early stages, quantum encryption has the potential to be far more secure than previous types of cryptographic algorithms and is even theoretically unhackable. Unlike traditional cryptography, which is built on mathematics, quantum cryptography is built on the laws of physics.

Top Articles
How long a Host has to respond to your trip request
How to manage the emotions of trading
Metallica - Blackened Lyrics Meaning
Monthly Forecast Accuweather
Obor Guide Osrs
Toyota Campers For Sale Craigslist
Boomerang Media Group: Quality Media Solutions
Air Canada bullish about its prospects as recovery gains steam
Prosper TX Visitors Guide - Dallas Fort Worth Guide
Otterbrook Goldens
Google Jobs Denver
Cumberland Maryland Craigslist
The Idol - watch tv show streaming online
Mivf Mdcalc
Visustella Battle Core
Violent Night Showtimes Near Amc Fashion Valley 18
[2024] How to watch Sound of Freedom on Hulu
W303 Tarkov
Oscar Nominated Brings Winning Profile to the Kentucky Turf Cup
George The Animal Steele Gif
Socket Exception Dunkin
Craigslist Motorcycles Orange County Ca
Radio Aleluya Dialogo Pastoral
Munich residents spend the most online for food
Mani Pedi Walk Ins Near Me
Gdlauncher Downloading Game Files Loop
Grandview Outlet Westwood Ky
Faurot Field Virtual Seating Chart
Espn Horse Racing Results
The Ultimate Guide to Extras Casting: Everything You Need to Know - MyCastingFile
Redfin Skagit County
Unable to receive sms verification codes
Rugged Gentleman Barber Shop Martinsburg Wv
Arlington Museum of Art to show shining, shimmering, splendid costumes from Disney Archives
Is Light Raid Hard
The Menu Showtimes Near Amc Classic Pekin 14
Baddies Only .Tv
Nail Salon Open On Monday Near Me
EST to IST Converter - Time Zone Tool
Why Holly Gibney Is One of TV's Best Protagonists
Greater Keene Men's Softball
Maxpreps Field Hockey
Craigslist Gigs Wichita Ks
Plead Irksomely Crossword
2700 Yen To Usd
Www Usps Com Passport Scheduler
Umiami Sorority Rankings
At Home Hourly Pay
Pulitzer And Tony Winning Play About A Mathematical Genius Crossword
Winta Zesu Net Worth
Vcuapi
Latest Posts
Article information

Author: Gregorio Kreiger

Last Updated:

Views: 6047

Rating: 4.7 / 5 (57 voted)

Reviews: 80% of readers found this page helpful

Author information

Name: Gregorio Kreiger

Birthday: 1994-12-18

Address: 89212 Tracey Ramp, Sunside, MT 08453-0951

Phone: +9014805370218

Job: Customer Designer

Hobby: Mountain biking, Orienteering, Hiking, Sewing, Backpacking, Mushroom hunting, Backpacking

Introduction: My name is Gregorio Kreiger, I am a tender, brainy, enthusiastic, combative, agreeable, gentle, gentle person who loves writing and wants to share my knowledge and understanding with you.