Protecting the Internet in the Quantum Age – Part 1

19/09/2024

Protecting the Internet in the Quantum Age – Part 1
Image assisted/created by AI

By Pablo Casal, Netlabs Co-founder & CEO

Introduction

One of the first questions that comes to mind when talking about quantum computers is this: Is it true that Internet security will no longer exist? While the quick answer is ‘no’, it’s difficult to provide a simple, clean answer to this question. However, it is clear where this concern comes from. In 1994, American mathematician  Peter Shor demonstrated that his algorithm for quantum computers could find the prime factors of an integer in polynomial time.

Although classical computers have great processing and computational power, certain problems are beyond their reach, such as quickly factorizing very large numbers. Many cryptographic systems leverage this difficulty to protect highly sensitive information on the Internet, for example, our bank accounts.

And while quantum computers are currently in their infancy, it is very likely that the day will come when they become powerful and stable enough to achieve this.

Although a quantum computer with the required size and stability is still 10 to 30 years away, work has already begun on alternatives to traditional algorithms. These alternatives are known as  Post Quantum (PQ) algorithms. One of the organizations leading the standardization of PQ algorithms is the National Institute of Standards and Technology (NIST). On 13 August 2024—just five days ago— NIST completed Round 1 of  standardization. The winning algorithms were those derived from CRYSTALS-Dilithium, CRYSTALS-KYBER, and SPHINCS.

In the parallel universes interpretation, Shor’s algorithm works because the elements that model quantum states interfere with one another, allowing all possible solutions to be calculated simultaneously – DALL-E

Description of the Vulnerabilities

The Transport Layer Security (TLS) protocol is one of the most widely used security protocols on the Internet today.

(Free access, no subscription required)

It is the security behind the padlock on each secure webpage we visit.

TLS protects every exchange of information between servers and their users. While highly secure in the current context dominated by classical computers, the asymmetric encryption used in TLS is vulnerable to potential attacks from future quantum computers.

Both  RSA and  ECDH (Elliptic Curve Diffie-Hellman) —some of the algorithms responsible for establishing the master key from which, for instance, the symmetric encryption key is derived— would be vulnerable to Shor’s algorithm if run on a sufficiently large and stable quantum computer. The same applies to the authentication phase, when either the server or the client proves its identity to the other using Public Key Infrastructure (PKI), a process that currently involves signature algorithms such as RSA or ECDSA.

The views expressed by the authors of this blog are their own and do not necessarily reflect the views of LACNIC.

Subscribe
Notify of

0 Comments
Oldest
Newest Most Voted
Inline Feedbacks
View all comments