Can quantum computing break encryption algorithms?
Valentin Komarovskiy, MBA
Solving complex business problems and alleviating technical pain points to improve efficiency and reduce risks.
Chinese researchers, led by Wang Chao from Shanghai University, claim to have achieved a significant breakthrough by using a D-Wave quantum computer to mount the first successful quantum attack on widely used encryption algorithms. This advancement, highlighted in their peer-reviewed paper in the Chinese Journal of Computers, demonstrates the potential threat that quantum computing could pose to sensitive sectors like banking and the military, especially as it relates to cryptographic algorithms based on the Substitution-Permutation Network (SPN) structure.
Using a quantum computer not originally intended for cryptographic applications, Wang’s team targeted algorithms such as Present, Gift-64, and Rectangle, which share structural similarities with Advanced Encryption Standard (AES). While these algorithms were breached, no specific passcodes were cracked, underlining the early-stage nature of the threat.
Quantum computing is still hindered by limitations like environmental interference, underdeveloped hardware, and the inability to create a universal attack method for different encryption systems. Despite these barriers, the research marks a significant step forward, showing that quantum computers are inching closer to compromising encryption systems.
The study highlights quantum annealing as the technique employed to solve complex mathematical problems more efficiently than classical methods, thanks to the unique properties of quantum tunneling. Although quantum computing has not yet fully realized its cryptographic potential, ongoing developments could expose new vulnerabilities in encryption systems used across critical industries.
Is AES-256 Encryption at Risk from Quantum Computing?
Recent claims by Chinese researchers using a D-Wave quantum computer to breach cryptographic algorithms have reignited concerns about the potential vulnerabilities of AES-256 encryption in a quantum world. The researchers’ experiment, which targeted Substitution-Permutation Network (SPN)-structured algorithms (similar to those found in AES), raises the question: Is AES-256 encryption truly at risk from quantum computing?
AES-256 and Quantum Computing
AES-256 is widely considered the gold standard in encryption, particularly for sensitive sectors like finance, defense, and government. Its strength lies in the fact that it uses a 256-bit key, making brute-force attacks virtually impossible for classical computers. Even with the best available technology, it would take classical computers billions of years to crack AES-256 encryption. However, quantum computing, with its ability to solve certain types of problems exponentially faster, poses a potential long-term threat.
Quantum Threats: Reality or Hype?
The recent study by Wang Chao’s team certainly highlights the advances in quantum computing, specifically using quantum annealing to breach SPN-structured algorithms. However, several key factors suggest that AES-256 remains secure for the foreseeable future:
The Timeline of Quantum Threats
Experts agree that while quantum computers will one day be capable of breaking current encryption algorithms, we are not there yet. The consensus among cryptographers is that it could be 10-20 years before quantum computers can run algorithms like Shor’s at a scale necessary to break AES-256 encryption. This gives organizations ample time to transition to post-quantum cryptographic methods.
Conclusion: AES-256 Remains Safe for years to come
The findings of Wang Chao’s team are noteworthy, but they do not signal an immediate threat to AES-256 encryption. The challenges in quantum computing, combined with the continued development of post-quantum cryptography, suggest that AES-256 will remain secure for years to come. While the future of encryption in a quantum world is uncertain, current quantum capabilities are far from making AES-256 obsolete.
What about ASE 128?
Older encryption algorithms, such as AES-128, are more susceptible to compromise by quantum computing compared to stronger variants like AES-256. However, both AES-128 and AES-256 remain secure against traditional (classical) computing attacks for the time being.
领英推荐
Key Length and Security
2. Grover’s Algorithm Impact
3. Shor’s Algorithm Impact
4. AES-128 vs. AES-256 in a Quantum Context
5. What you need to do
How to improve protection against quantum computing hacks:
Move to RSA-2048+ or ECC-384+: While quantum-resistant algorithms are still being standardized, it’s advisable to use the strongest classical algorithms available. RSA keys shorter than 2048 bits and ECC keys shorter than 384 bits are considered weak against future quantum computers. Increasing key lengths (e.g., RSA-4096) can provide some additional protection in the meantime, though these will still eventually be vulnerable to quantum attacks.
Increase Symmetric Key Sizes: Symmetric encryption algorithms like AES will also be affected by quantum computers, though to a lesser extent. Using AES-256 rather than AES-128 will offer greater resilience, as even with quantum speedup (e.g., Grover’s algorithm), AES-256 provides 128-bit security.
Update Key Lifetimes: Shorten the lifetime of cryptographic keys to minimize exposure to potential future quantum attacks. By refreshing keys more frequently, even if quantum computers become a threat, the amount of sensitive data that could be decrypted by future quantum attacks is reduced.
Audit and Inventory Certificates: Perform a comprehensive audit of your PKI infrastructure to understand where vulnerable algorithms are in use. Replace outdated certificates and keys with stronger ones, and ensure that processes are in place to regularly update them.
Offline Root CA: Keeping the root CA offline adds an additional layer of security by protecting the most critical keys from being exposed to network-based attacks, including potential future quantum attacks. An offline root CA is less susceptible to compromise since it isn’t directly accessible to malicious actors.
Protect Cryptographic Hardware: Ensure Hardware Security Modules (HSMs) used in your PKI infrastructure are updated with secure firmware and hardened against both classical and quantum-based attacks. These devices protect private keys and must be physically secured to prevent tampering.
Maintain Operational Security: Ensure that access to PKI systems is tightly controlled and regularly audited. Poor operational security could allow adversaries to compromise a system even before quantum threats become fully realized.