Learning Library

← Back to Library

Quantum‑Safe Cryptography: From Classical to Lattice

Key Points

  • Quantum computers, once fully mature, will be able to solve factorization and discrete‑logarithm problems far faster than classical computers, jeopardizing widely‑used asymmetric algorithms like RSA, Diffie‑Hellman, and ECC.
  • Modern encryption combines symmetric (shared‑key) and asymmetric (public‑key) schemes, with the latter relying on mathematically hard problems that are easy to verify but currently infeasible to solve.
  • To protect data against future quantum attacks, “quantum‑safe” or post‑quantum cryptography must be adopted, using problems that remain hard for both classical and quantum processors.
  • Lattice‑based cryptographic constructions—leveraging high‑dimensional geometric structures—are a leading candidate for quantum‑resistant algorithms because their underlying mathematical challenges are believed to be intractable for quantum computers.

Full Transcript

# Quantum‑Safe Cryptography: From Classical to Lattice **Source:** [https://www.youtube.com/watch?v=1lTA2n142Mk](https://www.youtube.com/watch?v=1lTA2n142Mk) **Duration:** 00:08:41 ## Summary - Quantum computers, once fully mature, will be able to solve factorization and discrete‑logarithm problems far faster than classical computers, jeopardizing widely‑used asymmetric algorithms like RSA, Diffie‑Hellman, and ECC. - Modern encryption combines symmetric (shared‑key) and asymmetric (public‑key) schemes, with the latter relying on mathematically hard problems that are easy to verify but currently infeasible to solve. - To protect data against future quantum attacks, “quantum‑safe” or post‑quantum cryptography must be adopted, using problems that remain hard for both classical and quantum processors. - Lattice‑based cryptographic constructions—leveraging high‑dimensional geometric structures—are a leading candidate for quantum‑resistant algorithms because their underlying mathematical challenges are believed to be intractable for quantum computers. ## Sections - [00:00:00](https://www.youtube.com/watch?v=1lTA2n142Mk&t=0s) **Classical Cryptography Primer Before Quantum Safety** - The speaker reviews symmetric and asymmetric encryption fundamentals—including secret‑key exchange, public‑private keys, and algorithms such as RSA, Diffie‑Hellman, and ECC—to set the stage for a discussion of quantum‑safe cryptography. - [00:03:11](https://www.youtube.com/watch?v=1lTA2n142Mk&t=191s) **Introducing Lattice‑Based Quantum‑Safe Cryptography** - The speaker explains the shift from classical to quantum‑safe algorithms, using geometric lattice concepts—especially the short vector problem—as the basis for new cryptographic schemes. - [00:06:29](https://www.youtube.com/watch?v=1lTA2n142Mk&t=389s) **Quantum‑Safe Transition Timeline and IBM Initiatives** - It outlines NIST's multi‑year rollout of post‑quantum cryptographic standards, highlights IBM's role in promoting the CRYSTALS‑Dilithium, Falcon, and Kyber algorithms, and advertises IBM’s quantum‑safe program for organizations. ## Full Transcript
0:00As quantum computers become more and more powerful, they have the potential to completely 0:05reshape the cybersecurity landscape. 0:08So in this video, we're going to talk about what it means to become quantum safe and talk 0:12about terms like quantum safe cryptography. 0:15But before we dive into that, let's firsttake some time to do a quick recap on classical cryptography. 0:23Most of our modern encryption protocols arebased on a combination of symmetric and asymmetric encryption. 0:29So let's start by talking about symmetricencryption. 0:38We're going to use a classic example of Alice, who wants to send a secure message to her friend, Bob. 0:52In order to do this, she first needs to encrypther message, which she can do using a secret key. 1:00She can then securely send her message toBob, who can then decrypt that message using the same secret key. 1:13And asymmetric encryption works in a verysimilar way. 1:17But instead of Alice and Bob using the samesecret key, Alice will have a public key and Bob will have a private key. 1:31So these keys are different. One is mathematically derived from the other. 1:39And in a nutshell, anyone could possibly accessthat public key, but only the private key can be used to decrypt the message. 1:48And so most of our most popular cryptographicalgorithms include examples such as RSA, Diffie-Hellman and Elliptic Curve Cryptography. 2:02And these are all asymmetric encryption algorithms,and they are based on three different types 2:07of mathematical problems, namely: factorization,discrete logarithm, and elliptic curve discrete logarithm. 2:21And these cryptographic algorithms work sowell because these mathematical problems that 2:26they're based on are very difficult to solve,but their solutions are very computationally easy to check. 2:33So, for example, if we wanted to crack RSA, we would need to factorize a 2048 bit integer, which serves as the public key. 2:53Using a classical computer, this could takepotentially millions of years, but quantum computers are different. 3:01When quantum computers reach full maturity, they have the potential to solve factorization and discrete logarithm problems much, much faster. 3:11So instead of relying on these classical cryptographic algorithms that have served us so well up 3:17until now, we need to start thinking about quantum safe cryptographic algorithms. 3:25Quantum safe algorithms are based on mathematical problems that neither classical nor quantum computers can solve efficiently. 3:33They're normally based on geometric problemsrather than numerical ones like these. 3:40One example is a mathematical problems that are based on lattices. 3:51So let's have a quick review on lattices. 3:55Lattices could be very simple like this, just a grid of points with lines in between them that can represent vectors. 4:09And this is just a simple two dimensional lattice. 4:12But lattices could have many more dimensions, and they can also vary in size. 4:18They could be of of even an infinite, infinite size. 4:25And we can use a range of different latticebased problems to develop quantum safe cryptographic algorithms. 4:33One example is the short vector problem, andthe short vector problem essentially works like this. 4:46Let's say we have a very small, simple latticelike this. 4:54And we can draw some lines in between themthat represent the vectors between each the points. 4:59And the way that I've drawn out here is what is known as a short basis. 5:08But I could draw this exact same lattice in a slightly different way. 5:22And you can kind of see here how the vectorsin between each of the points are much longer. So we would call this a long basis. 5:32So the short vector problem is essentially,let's say we have a point in the middle of this lattice here or if it we're representing it like this could look like that. 5:43And to solve this problem, we want to findthe closest points to A on this lattice. 5:49If we're given a short basis, this can be quite easy to see where the shortest vectors are between between the points. 5:58But if we're only given a long basis, this becomes much more complicated. 6:02And you can imagine this problem would get even more difficult if we increase the size of the lattice and if we add many more dimensions. 6:09And so this is quite a simple example, butit really highlights the key point of lattice 6:17based problems, which is that the larger andmore complex, the lattice, the more difficult 6:22it is to solve math problems that are basedon them, and the more difficult it would be to crack algorithms that are based on those problems. 6:29It might still be many years before quantum computers can crack algorithms like RSA, but 6:36it also takes a really long time for teams and organizations to adopt and deploy new cryptographic standards. 6:44The National Institute for Standards and Technology says it can take anywhere from 5 to 15 years to implement new cryptographic standards. 6:52As you can imagine, it takes time to train developers and cybersecurity professionals as well as implement the new standards as well. 7:02But NIST has actually been researching different standards already since 2016. 7:06And in July of 2022, they identified four different standards that organizations can start looking into to become a quantum safe. 7:16And three of those were developed by IBM. 7:19They include CRYSTALS-Dilithium digital signature algorithm, as well as the Falcon digital signature algorithm. 7:37And lastly, the CRYSTALS-Kyber public key encryption algorithm. 7:48And IBM is already helping organizations become quantum safe. 7:52In 2022, as well as these announcing these cryptographic standards from NIST, they also 7:58launched the First Quantum Safe System with the launch of their Z 16 platform, and they 8:05also offer the IBM Quantum Safe Program, which aims to educate and provide strategic guidance 8:12towards organizations that are looking to become quantum safe, with individualized programs 8:18to help organizations better understand their exposure to cryptographic attacks. 8:24So if you and your team and your organization are ready to start becoming quantum safe, 8:28check out the links in the description to all the things that I mentioned in this video. 8:34Remember to like subscribe. 8:36Leave any questions that you have in the comments. 8:37I hope you found this content helpful, 8:40and thank you very much for watching