It's a race between Security and Crackers !
Carthic Kameshwaran
Quantum Computing | Fraud detection | Tech Strategy | Solution Consulting Leader
Quantum Computing is a game changer of this decade. But, one of the major downsides is their ability to crack classical cryptography in matter of minutes, if not in seconds, that puts the entire world at risk.
Imagine your cryptocurrency drained out because someone used the quantum computer to crack it wide open. Imagine the TLS layer (of HTTPS) for a Financial transaction is compromised in real time and the attacker gains access to your bank account. Imagine secure defence communications intercepted and decoded at the height of a conflict. What if confidential information is stored in encrypted form and decrypted later using Quantum computers?
Post-Quantum Cryptography (PQC) are algorithms designed to thwart attacks from quantum computers. The National Institute of Standards and Technology (NIST) has been leading an effort to standardize PQC algorithms. Some organisations have started preparing for the worst. (Read: https://thequantuminsider.com/2025/01/04/solana-takes-a-step-toward-pqc-era-with-quantum-resistant-vault/ )
Below are major PQC algorithms, along with a comparison and discussion of their resiliency.
Lattice-Based Cryptography
It is based on the hardness of problems like Learning with Errors (LWE) and Shortest Vector Problem (SVP) in high-dimensional lattices (of hundreds and thousands of dimensions). Though it has high resistance to quantum attacks its moderate resistance to side-channel attacks make it concerning an limits the applications.
Code-Based Cryptography
This relies on the difficulty of decoding randomly generated linear codes (e.g., Goppa codes). Though it has excellent quantum resistance, it is highly vulnerable to classical side-channel attacks if not implemented carefully. Going by the history of cryptographic implementations, one can expect many CVRs raised on this.
Multivariate Quadratic (MQ) Equations
Solving systems of m multivariate quadratic equations in n variables (MQ-problem) over finite fields is NP-hard problem. The MQ equation driven security is based on solving systems of multivariate quadratic equations over finite fields. This set of PQC algorithms is generally weaker against quantum attacks compared to lattice and code-based systems.
Hash-Based Cryptography
Traditional cryptographic Hash based approaches offer tremendous avenues in PQC. Though it offers very high quantum and classical security, concerns remain about the long term viability of maintaining large signature sizes.
领英推荐
Isogeny-Based Cryptography
These algorithms leverage the difficulty of computing isogenies between supersingular elliptic curves. It offers moderate quantum resistance but further research needed after recent cryptanalytic breakthroughs.
Symmetric-Key Quantum-Resistant Algorithms
These algorithms leverage Grover's algorithm's quadratic speedup and is able to provide security by using larger key sizes. This allows it to be resistant to Grover's algorithm, provided the key size is doubled.
Current Status
Conclusion
Extensive research investment is needed to ensure a reliable PQC is established. Expect plenty of new algorithms being attempted (and discarded) in next few years. This is akin to early days of classical cryptography.
#quantumComputing #postQuantumCryptography #informationsecurity #infosec #quantumComputer #cryptography #computing #QuantumTech #QuantumSupremacy #PQC #QuantumEncryption #QuantumProof #CyberResilience #QuantumSecurity #QuantumSafe #QuantumAlgorithms #QuantumFuture #QuantumMechanics
Growth Leader I Banking I Risk I Fraud Prevention | Gen AI I Start-Ups
2 个月Thanks for sharing
vCISO | I help fast-growing startups in scaling security | Fintech Security & Compliance | CISSP | ISO 27001 LA | Cybersecurity Trainer
2 个月Carthic Kameshwaran Nice read. Also, are there any known instances / reports of a Quantum computing breaking the cryptography currently be in use ?