How Quantum Computers Could Break Current Encryption in 2024
Quantum computing is an emerging technology that harnesses the properties of quantum physics to perform computations exponentially faster than classical computers. Quantum computers leverage the ability of subatomic particles to exist in more than one state at a time. By encoding information in quantum bits or qubits, quantum computers can process information in parallel, enabling them to solve problems that are impractical or impossible for classical computers.
Why Quantum Computers Threaten Encryption
Many of the encryption methods used to secure data today are based on mathematical problems that are prohibitively difficult for classical computers to solve, such as factoring large prime numbers. However, these problems can be efficiently solved using Shor’s algorithm on a sufficiently advanced quantum computer.
Here’s a high-level overview of how Shor’s algorithm allows quantum computers to break common encryption schemes:
-
RSA encryption – relies on the difficulty of factoring large numbers into primes. Shor’s algorithm can quickly find the prime factors, allowing the private key to be derived.
-
Elliptic curve cryptography (ECC) – relies on the difficulty of finding discrete logarithms in cyclic groups. Shor’s algorithm can efficiently compute discrete logs, compromising ECC keys.
-
AES encryption – highly resistant to brute force attacks with classical computers. However, Grover’s algorithm run on a quantum computer could speed up brute forcing of AES keys, making them vulnerable.
Timeline for Quantum Computers Breaking Encryption
Quantum computing is still in its early stages, but rapid advances are being made. There is debate around exactly when quantum computers will be capable of breaking encryption schemes:
-
2024-2030 – Some experts predict quantum computers will be able to break RSA 2048-bit keys and certain ECC keys by 2024-2030. Government agencies like NIST have accelerated plans for new cryptography standards resistant to quantum attacks.
-
2040-2050 – More conservative estimates place the timeline at 2040-2050 before quantum computers can reliably factor large numbers and compute discrete logs required to break common encryption.
Preparing for the Quantum Threat
Organizations should start preparing now for the possibility of quantum computers breaking encryption much sooner than later:
-
Crypto-agility – Encryption schemes and protocols should be designed to allow cryptographic keys and algorithms to be easily updated when new ones resistant to quantum are available.
-
Hybrid encryption – Leverage both pre- and post-quantum algorithms, so data encrypted today remains secure but new information uses quantum-safe encryption.
-
Post-quantum cryptography – New asymmetric key encryption methods are in development like lattice-based and hash-based cryptography thought to be quantum resistant.
-
Quantum key distribution (QKD) – Uses quantum properties to generate shared keys, providing quantum-secure key exchange resistant to retrospective attacks.
Conclusion
Quantum computing holds tremendous promise to solve complex problems and accelerate scientific discovery. However, malicious use of quantum capabilities could also undermine the integrity of digital systems. Quantum-safe cryptography and cybersecurity measures are essential to prepare for this emerging threat to encrypted data in the not-too-distant future. Organizations should pay close attention to developments in post-quantum cryptography and continually evolve their encryption schemes to stay ahead of the quantum curve.