Learning Library

← Back to Library

Quantum Threats to Modern Cryptography

Key Points

  • The belief that encrypted data is safe even if leaked is challenged by the prospect of future quantum computers that could break today’s encryption, rendering all privacy and transaction integrity unreliable.
  • Cryptographic schemes fall into two categories: symmetric algorithms (e.g., AES) using single short keys (128‑256 bits) and asymmetric algorithms (e.g., RSA) using paired long keys (1024‑2048 bits) based on mathematically hard problems like large‑number factorization.
  • Quantum attacks, particularly Grover’s algorithm, effectively halve the security strength of symmetric ciphers, while algorithms such as Shor’s algorithm can dramatically reduce the difficulty of breaking asymmetric keys.
  • As a result, current key sizes become insufficient against quantum adversaries, necessitating either substantially larger classical keys or the adoption of quantum‑resistant (post‑quantum) cryptographic methods.
  • Preparing for this quantum threat is essential to preserve confidentiality, authentication, and trust in digital systems before quantum computers become capable of executing these attacks.

Full Transcript

# Quantum Threats to Modern Cryptography **Source:** [https://www.youtube.com/watch?v=ecvCfTPRBrI](https://www.youtube.com/watch?v=ecvCfTPRBrI) **Duration:** 00:09:15 ## Summary - The belief that encrypted data is safe even if leaked is challenged by the prospect of future quantum computers that could break today’s encryption, rendering all privacy and transaction integrity unreliable. - Cryptographic schemes fall into two categories: symmetric algorithms (e.g., AES) using single short keys (128‑256 bits) and asymmetric algorithms (e.g., RSA) using paired long keys (1024‑2048 bits) based on mathematically hard problems like large‑number factorization. - Quantum attacks, particularly Grover’s algorithm, effectively halve the security strength of symmetric ciphers, while algorithms such as Shor’s algorithm can dramatically reduce the difficulty of breaking asymmetric keys. - As a result, current key sizes become insufficient against quantum adversaries, necessitating either substantially larger classical keys or the adoption of quantum‑resistant (post‑quantum) cryptographic methods. - Preparing for this quantum threat is essential to preserve confidentiality, authentication, and trust in digital systems before quantum computers become capable of executing these attacks. ## Sections - [00:00:00](https://www.youtube.com/watch?v=ecvCfTPRBrI&t=0s) **Quantum Threat to Cryptography** - The speaker explains how future quantum computers could break today’s encryption—rendering encrypted data vulnerable, undermining privacy and trust—and outlines the differences between symmetric (e.g., AES) and asymmetric (e.g., RSA) algorithms. - [00:03:12](https://www.youtube.com/watch?v=ecvCfTPRBrI&t=192s) **Quantum Threat to Asymmetric Cryptography** - The speaker explains that Grover's algorithm only halves symmetric key strength (remediable by longer keys), whereas Shor's algorithm can entirely compromise current asymmetric schemes, creating urgent demand for quantum‑safe cryptographic algorithms as projections suggest viable quantum attacks could emerge by 2026–2031. - [00:06:16](https://www.youtube.com/watch?v=ecvCfTPRBrI&t=376s) **Preparing for Quantum‑Safe Cryptography** - The speaker stresses immediate data discovery and classification as interim safeguards while NIST‑selected quantum‑resistant algorithms (with IBM contributions) are vetted and deployed. ## Full Transcript
0:01Today, you assume that if your data escapes, as long as it's encrypted, it's no problem, because if someone gets the data, they still can't read it. 0:09But imagine a case where if you could jump into a time machine 0:13and go a hundred years into the future and bring back one of their computers with all its capabilities and use it to crack today's crypto systems? 0:22Well, guess what? 0:24They would fall. 0:25In fact, nothing would be secret anymore. 0:28Privacy would go out the window. 0:29Transactions would no longer would be reliable and records couldn't be trusted. 0:34Well, that's the threat that we're facing with quantum cracking of crypto algorithms. 0:41So let's take a look at not only the threat, but why is this a problem and what's the nature of the problem? 0:47Well, first of all, as you may be aware, there are different types of crypto algorithms. 0:52There are symmetric algorithms and there are asymmetric algorithms. 0:58Symmetric algorithms use one key; you encrypt with that key, you decrypt with the same key. 1:04The most common example of this is the AES encryption standard, and the key links are normally in the 128 to 256 bit range in terms of their size. 1:16So that's how that works. 1:18Asymmetric is different. 1:20Asymmetric, we use two keys. 1:22One is a public key and one is a private key. 1:24So if I encrypt with one, I decrypt with the other. 1:27Most common example of this is the RSA algorithm. 1:31And what's different here is the algorithms operate differently and the math behind them is different. 1:37The key lengths for asymmetric algorithms tend to be much longer. 1:41For instance, RSA, we're typically using 1024 to 2048 bits in length. 1:48So really 10x the size of the keys that we were using for symmetric algorithms. 1:54Now, just as an aside, why does this stuff work? 1:57Well, for instance, if you're looking at an asymmetric algorithm like RSA-- 2:02Now this is not an exact example, so this is a gross approximation, just to give you an idea. 2:07But they're strong because they rely on underlying mathematical problems that are hard to solve. 2:12One of those is trying to do factorization. 2:15If, for instance, I give you an example of a number like 21. 2:19And I say, tell me what are the prime factors of 21? 2:24Well, 7 and 3, not so hard to figure out. 2:27Those are both prime numbers and they multiplied together, become 21. 2:31But what if I give you a really big number like this and say, tell me, what are the two large prime factors that will multiply together to equal that? 2:40Much more difficult to determine. 2:42Now, again, RSA uses a lot more complexity than that, but it gives you a taste of what's involved mathematically. 2:48Well, so let's take a look. 2:50If our asymmetric algorithm is like this and we get a key length, that's of this size, well, then what happens if we put a quantum computer on this problem to crack it? 3:01I'll tell you what turns out is, the algorithm effectively becomes half as strong because of a thing called Grover's algorithm. 3:13Grover's weakens symmetric algorithms by half. 3:18Now, the good news is, if we want to go ahead and overcome the cracking capabilities of the quantum computer, 3:24all I have to do is just make the key twice as long. 3:28So that's not such a hard problem to solve. 3:31The thing we're much more worried about is in these cases with asymmetric algorithms, 3:36even though we have really long keys, it turns out that these things fall like a house of cards against a thing known as Shor's algorithm. 3:47Shor's algorithm is optimized for a quantum computer. 3:50A traditional computer can't do nearly as much with that. 3:53So with Shor's, the whole thing falls. 3:57So what we need here is a new crypto algorithm that is going to be quantum safe. 4:03And the good news is, we have some of those now, and I'll talk more about those in a minute. 4:09But first of all, why do you care about this? 4:11Because today's quantum computers are limited. 4:14They can't crack this at the moment. 4:16At the moment that I'm saying this. 4:18Now, this could all change tomorrow, if somebody finds a new back door. 4:21But just consider that today, it's okay. 4:24But if we look into the future, crypto experts tell us, for instance, some of the projections are that there's a 1 in 7 chance that by the year 2026, 4:35we'll be able to break these asymmetric algorithms with Shor's algorithm using a quantum computer that has enough qubits, 4:43that is a relative measure of the power of the quantum system. 4:48Further, the numbers look like it's 1 in 2 by the year 2031. 4:55So if we're looking at these kind of projections, that's not so far off into the future. 5:01So if we want to even just estimate and say, well, maybe 5 to 10 years, we'll be okay. 5:09You might say to me, "Jeff, why do you care? 5:12Wake me up in five years or ten years when the quantum systems get strong enough to actually break this." 5:18And I'm going to tell you, you have to care now, because remember that time machine example in the beginning of the video? 5:25That's what's going to happen. 5:26We have this kind of attack where we harvest the data now and we decrypt later. 5:37In other words, I put a sniffer on your network and I start collecting all the encrypted data that's going across your network. 5:44Or I get a copy of your database, even though it's encrypted. 5:48Maybe it's a backup copy of the database and it's encrypted. And we're going on that assumption 5:52I said at the beginning, that as long as it's encrypted, we think we're safe. 5:56Well, if I go and grab one of these systems from the future and I've kept this data, eventually the future comes to us. 6:04And eventually I can start cracking all of the data that I harvested in the past. 6:10All of those records now become publicly available. 6:14That becomes a huge problem for us. 6:16So the time to start thinking about this problem is in fact now. 6:20In fact, if you could get into a time machine and go backwards, the time to start thinking about the problem would have been before now. 6:26But what can we do for now? 6:28Well, there's a number of things that we can do. 6:31And there's there's some good news in this story. 6:34So, for instance, what we ultimately want to get to is quantum safe cryptography. 6:40That is a new set of algorithms that are not vulnerable to Shor's. 6:44And those will allow us to continue to encrypt data with confidence. 6:49But until we get there and where we're actually using these in production, then there are some things we could do to set up. 6:56Now, first of all, to say we're not having to wait for this necessarily. 7:00The good news is the National Institute of Standards has actually picked four algorithms that they believe are quantum safe. 7:07Now, just as a point of pride, IBM contributed to three out of those four. 7:12So we're doing a lot of really important research to try to protect the world against this kind of threat. 7:18It's going to take some time to vet these algorithms fully and actually get them implemented, so what did we do before then? 7:23Well, some of the things we should do first is basically discover where is my data. 7:30See where all of the important information is. 7:34Classify it and know what levels of sensitivity I'm dealing with. 7:38Not everything is the same level of sensitivity. 7:40Some data, maybe if someone decrypts it later and it's two years into the future, or even tomorrow, it might not matter anymore. 7:49It's time sensitivity has expired. 7:51But some other data has a very long shelf life and we need to protect it for decades. 7:56So we need to understand that. 7:58The next thing is to do an inventory. 8:01Where is all of that data? 8:02Once I've looked at the kinds of data I have, where is it all located? 8:06Because eventually I'm going to need to go back and protect all of that stuff. 8:09If I don't know where it is, I can't protect it. 8:12And then, ultimately, I'm going to look at trying to create an ability that we call "crypto-agility". 8:20That is, when I'm coding new algorithms, when I'm putting new functions into place, I want to make sure that I'm not just hard coding crypto algorithms in. 8:31I want to be able to do a plug-and-play-- pull that algorithm out and put a new one in. 8:35Pull RSA out and put it in the new quantum safe algorithm. 8:39So crypto-agility means creating the right kinds of interfaces into our systems so that we'll have that kind of protection. 8:46And then ultimately, when we get the quantum safe crypto, we can put that in place and now we'll have the protection going forward. 8:53But again, this is a problem that is going to affect us in the future and we're laying the seeds for how we will deal with that right now. 9:01Remember harvest, now decrypt later. 9:03This is what the quantum future holds for us. 9:06So be prepared. 9:08Thanks for watching. 9:09If you found this video interesting and would like to learn more about cybersecurity, please remember to hit like and subscribe to this channel.