Post-Quantum Cryptography Should Be Part Of Your Strategy
David Birch
International keynote speaker, author, advisor, commentator and investor digital financial services. Recognised thought leader around digital currency, digital ID and digital assets. Follow dgwbirch.bsky.social
The recent news that IBM has used a quantum computer to solve a problem that stumps the leading classical methods is another step on the road to what has become known as “quantum advantage”, where a quantum system solves a problem that cannot be solved by any amount of classical computation. For those of us around fintech, the one problem that we really want to solve is breaking public key cryptography so that we can forge digital signatures, get access to bank systems and, of course, steal a lot of Bitcoin.
Quantum Supremacy
This is important stuff. In the British government’s new technology strategy, quantum computing is one of the “priority” technologies and it is easy to understand why. That point about solving problems beyond the reach of existing computers means that there is something of an arms race underway, with quantum supremacy as the goal. One of the interesting problems that quantum computers can solve is breaking the asymmetric cryptography at the heart of cryptocurrency in order to transfer money out of lost or abandoned wallets. If you look at Bitcoin, for example the accountants Deloitte reckon that about four million Bitcoins will be vulnerable to such an attack. That means there are billions of dollars up for grabs in a quantum computing digital dumpster dive.
It will take a while to get to the aforementioned quantum supremacy, where quantum computers can outgun the classical incumbents. But… the IBM solution is already at 127 qubits (quantum bits). If quantum computers are put up against classical supercomputers capable of up to a quintillion (10^18) floating-point operations per second, quantum supremacy could be reached with as few as 208 qubits. Quantum supremacy isn’t science fiction.
If we apply quantum computers the problem of breaking the 256-bit elliptic curve encryption of keys in the Bitcoin network within the small available time frame in which it would actually pose a threat to do so, researchers calculate it would require 317 × 106 physical qubits to break the encryption within one hour using the surface code, a code cycle time of 1 μs, a reaction time of 10 μs, and a physical gate error of 10?3 10 ? 3. To instead break the encryption within one day, it would require 13 × 106 physical qubits. So never mind quantum supremacy with a few hundred qubits, quantum computers would need millions of physical qubits to be a threat to Bitcoin.
Nevertheless, quantum computing will come. So is the sky falling in for the banks and the credit card companies and mobile operators and the military and everyone else who uses public key cryptography then? Well, no.
They are not idiots with their heads in the sand and they are already planning to adopt a new generation of Quantum Resistant Cryptographic (QRC) algorithms to defend their data against the inevitable onslaught from quantum computers in unfriendly hands. They have been looking towards the National Institute of Standards and Technology (NIST), which in 2022 selected a set of algorithms designed to withstand such an onslaught after a six-year effort to devise encryption methods that could resist an attack from a future quantum computer that is more powerful than the comparatively limited machines available today. NIST has now released these algorithms as standards ready for use out in the wild.
As quantum technology advances, there will be an inevitable competition between the quantum computers that can break cryptographic algorithms and the cryptography community's efforts to develop quantum-resistant algorithms. This means there will be a period where entities (eg, Visa and the DoD, not just Bitcoin) will be transitioning to new cryptographic methods, which is why the US Cybersecurity and Infrastructure Security Agency (CISA) has just issued a note calling on critical infrastructure and other organizations to begin work now to create road maps for how they’ll migrate to QRC.
领英推荐
Harvest Now, Decrypt Later
Technology strategists in banks, fintechs and “crypto” know why these standard algorithms are being pushed out now, when any actual quantum computer is still some years away. The fact is that you can be at risk from quantum computers that do not yet exist because of what is known as the “harvest now, decrypt later” attack. It’s the idea that your enemy could copy your data, which is encrypted, and they can hold onto it right now. They can’t read it. But maybe when a quantum computer comes out in 10 years, then they can get access to your data.
Incidentally, this transition has implications in the world of central bank digital currency (CBDC). In an interesting paper on “Post-Quantum Protocols for Banking Applications” Luk Bettale, Marco De Oliveira and Emmanuelle Dottax of IDEMIA point out the that the cryptographic data involved in banking transactions is valuable only for a short period of time and after validation by the bank they become useless. This makes banking transactions such as tapping your credit card on a contactless terminal immune to that “harvest now, decrypt later” threat. However, offline transactions (which are integral to any worthwhile population scale CBDC) rely exclusively on card authentication that is vulnerable to such an attack.
If the information you’re protecting is valuable enough, then you’re already in trouble because of that threat.
Book Dave
Are you looking for:
Strategic Security | Risk Awareness | Responsible Leadership | Thoughtful Innovation
1 年I think mentioning Bitcoin is just using a popular term to make a problem serious or visible. Although of course the risk is already existing. The "Harvest now, decrypt later" paragraph is much more interesting, I see a much more fundamental problem in that. Try to imagine for example state actors who are stealing data for years :-) and in recent future can be this amount of data readable like a plain text
Advisory Board | Consulting | Board Member | Fintech | Payments | Digital Banking | Cloud Computing | Sales & Marketing
1 年David Birch Beyond the card companies and the TBTF banks, how many FI's and fintechs are aware of and actually investing to meet the threat of quantum computing to public key cryptography?
Founder at Vaulted Ventures, and Quantum Safe Alliance
1 年Stealing bitcoin, or any blockchain's cryptocurrency for that matter, in the quantum era won't be very profitable, because as soon as it starts happening the value of the assets will revert to its "use value" as a commodity (i.e., zero). Who's going to even bother stealing bitcoins when they can't stop the next guy stealing them from again?
Decentralized transactional ecosystem enabler
1 年... wow David, ur expanding beyond how to choose a strong password. Ambitious start to the new year.