Protecting the Internet in the Quantum Age – Part 1

September 19, 2024

Protecting the Internet in the Quantum Age – Part 1
Image assisted/created by AI

By Pablo Casal, Netlabs Co-founder & CEO

Introduction

One of the first questions that comes to mind when talking about quantum computers is this: Is it true that Internet security will no longer exist? While the quick answer is ‘no’, it’s difficult to provide a simple, clean answer to this question. However, it is clear where this concern comes from. In 1994, American mathematician  Peter Shor demonstrated that his algorithm for quantum computers could find the prime factors of an integer in polynomial time.

Although classical computers have great processing and computational power, certain problems are beyond their reach, such as quickly factorizing very large numbers. Many cryptographic systems leverage this difficulty to protect highly sensitive information on the Internet, for example, our bank accounts.

And while quantum computers are currently in their infancy, it is very likely that the day will come when they become powerful and stable enough to achieve this.

(Free access, no subscription required)

Although a quantum computer with the required size and stability is still 10 to 30 years away, work has already begun on alternatives to traditional algorithms. These alternatives are known as  Post Quantum (PQ) algorithms. One of the organizations leading the standardization of PQ algorithms is the National Institute of Standards and Technology (NIST). On 13 August 2024—just five days ago— NIST completed Round 1 of  standardization. The winning algorithms were those derived from CRYSTALS-Dilithium, CRYSTALS-KYBER, and SPHINCS.

In the parallel universes interpretation, Shor’s algorithm works because the elements that model quantum states interfere with one another, allowing all possible solutions to be calculated simultaneously – DALL-E

Description of the Vulnerabilities

The Transport Layer Security (TLS) protocol is one of the most widely used security protocols on the Internet today.

The views expressed by the authors of this blog are their own and do not necessarily reflect the views of LACNIC.

0 Comments
Oldest
Newest Most Voted
Inline Feedbacks
View all comments