11.09.2024
||Artikel
Shopping, making cashless payments, ordering online, signing contracts without a pen - our everyday lives are more convenient than ever. Many things require little effort and we hardly think about the complex mechanics behind these processes. Trust in the reliability of our digital world is high. But is this trust really justified?
Experts have been warning for decades that this very reliability could one day be jeopardized. Are all the everyday activities that we use as private individuals and the services that companies offer to generate revenue really secure? This question is currently also being discussed in the media in Switzerland.1
To answer it, we need to take a closer look at two developments in the field of encryption:
Quantum computers have the potential to solve certain mathematical problems on which many current encryption systems are based much faster than classical computers. While conventional computers would take billions of years to crack today’s cryptographic systems, quantum computers could reduce this time to seconds or minutes. This makes attacks on our current security mechanisms, and therefore on the world as we know it, realistic and threatening.
Post-quantum cryptography comprises new cryptographic methods that are resistant to attacks from quantum computers. These new encryption methods are designed in such a way that even if the expected breakthroughs in quantum computing research are achieved, decryption is not considered realistic. The two developments are in competition with each other. It will be decisive which of them achieves a breakthrough and the necessary degree of dissemination more quickly and thus shapes our digital world. What is the current state?
This greatly increases the theoretical performance. In practice, however, this still depends on the associated software - here too, IBM is making further progress with the Qiskit SDK. In total, the manufacturer reports between 20 and 50 % performance and quality growth this year alone.4 This performance is not yet sufficient to pose a practical threat, but this is only a matter of time.
On the other hand, the standardization of the first important algorithms by NIST was officially completed just a few weeks ago.5 In order to understand the progress here, it is necessary to take a differentiated look at the use cases.
The introduction of PQC (post-quantum cryptography) is basically “just” the implementation of another algorithm that will replace existing procedures. To prepare your organization for this, you should ensure that
Nevertheless, there is still a strong dependency on product manufacturers, who must now incorporate the innovations into their products. Cryptography is only as secure as its weakest link in the chain. Pay particular attention to the capabilities to upgrade cryptographic algorithms when purchasing new products!
With the standardization of FIPS 203, 204 and 205, PQC has gained a head start over quantum computing, although progress there is also promising. Nevertheless, the use of this technology will remain cost-intensive and it is unlikely that every potential attacker will have a quantum computer in the near future. It can therefore be assumed that attackers will carefully weigh up whether the decryption effort is worthwhile. Individuals will hardly be the focus of attention, but central services such as administrations and financial institutions will be - in other words, anyone who processes and exchanges long-lasting, sensitive data. We therefore recommend that these organizations consider the following questions now so that they can start using PQC as soon as possible:
https://www.nzz.ch/wirtschaft/quantencomputer-werden-bald-in-der-lage-sein-alle-derzeitigen-verfahren-zur-datenverschluesselung-zu-knacken-sagt-der-internet-pionier-harald-summa-ld.1843334 ↩︎
https://mediacenter.ibm.com/media/IBM+Quantum+System+Two/1_oud2c8tg ↩︎
https://newsroom.ibm.com/2023-12-04-IBM-Debuts-Next-Generation-Quantum-Processor-IBM-Quantum-System-Two,-Extends-Roadmap-to-Advance-Era-of-Quantum-Utility ↩︎
https://newsroom.ibm.com/2024-05-15-IBM-Expands-Qiskit,-Worlds-Most-Performant-Quantum-Software ↩︎
https://www.federalregister.gov/documents/2024/08/14/2024-17956/announcing-issuance-of-federal-information-processing-standards-fips-fips-203-module-lattice-based ↩︎
https://security.apple.com/assets/files/A_Formal_Analysis_of_the_iMessage_PQ3_Messaging_Protocol_Basin_et_al.pdf ↩︎