{"id":2421,"date":"2013-10-07T13:57:58","date_gmt":"2013-10-07T17:57:58","guid":{"rendered":"http:\/\/me-en.kaspersky.com\/blog\/?p=2421"},"modified":"2020-02-26T18:57:51","modified_gmt":"2020-02-26T14:57:51","slug":"quantum-computers-and-the-end-of-security","status":"publish","type":"post","link":"https:\/\/me-en.kaspersky.com\/blog\/quantum-computers-and-the-end-of-security\/2421\/","title":{"rendered":"Quantum Computers And The End Of Security"},"content":{"rendered":"<p>Quantum computing and quantum communications; these concepts were invented just 30 years ago, after scientific journals refused to issue earlier publications regarding these subjects because it looked more like science-fiction. Nowadays, quantum systems really do exist, with some of them reaching the stage of commercial sales. Quantum computers raise and answer new questions in the security field, primarily in cryptography.<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2013\/10\/05102019\/quantum2_title_EN.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-2853\" alt=\"quantum2_title_EN\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2013\/10\/05102019\/quantum2_title_EN.jpg\" width=\"640\" height=\"420\"><\/a><\/p>\n<p>We live in a world of radio waves and electromagnetic signals: Wi-Fi, GSM, satellite TV and GPS, FM-tuner and speed camera are just some examples of electromagnetic wave usage in our daily lives. Of course, computers are an integral part of this ecosystem, be it a mainframe, laptop or a smartphone. A very important feature of electromagnetic signals is measurability. It\u2019s quite easy to read all the parameters of a signal without introducing changes to it, and this is the exact reason why almost every aforementioned technology today is equipped with <a href=\"https:\/\/www.kaspersky.com\/blog\/encrypt-your-data\/\" target=\"_blank\" rel=\"noopener nofollow\">encryption<\/a>, which protect transmitted information from being read or altered by a third party. Typically, communicating parties don\u2019t have another channel to talk, and cryptosystem developers brilliantly solved a very complicated problem \u2013 how to negotiate a secret encryption key when all communication might be observed by others. The solution to this problem is the foundation for all modern protection systems, and quantum computers might break it. Will quantum cryptography become a next-generation security solution? Let\u2019s find out.<\/p>\n<p>\u00a0<\/p>\n<p><b>The tagline<\/b><\/p>\n<p>The names \u201cQuantum computing\u201d and \u201cQuantum cryptography\u201d are accurate. These systems are based on quantum effects like superposition and entanglement of micro-particles.<\/p>\n<div class=\"pullquote\">A quantum computer is unusable for most daily tasks, but it\u2019s able to quickly solve some mathematical problems for modern encryption algorithms.<\/div>\n<p>The primary difference between ordinary and quantum computers is a data unit. While an ordinary computer uses bits and bytes, which are strictly 0 or 1, a quantum computer uses qubits (quantum bits), which are able to be in several states simultaneously. It sounds confusing, and it\u2019s even more confusing to implement, but years of research clearly show that it works. A quantum computer is wildly different from an ordinary one and it\u2019s barely possible to use it for Tetris, but it performs much better in probability-related or optimization-related task solving.<\/p>\n<p>The list of tasks, which might be dramatically sped up using quantum computing, is quite long: logistic optimizations, DNA sequencing, stock market predictions and cryptographic keys brute-forcing. It is worth mentioning that everything in the quantum world is complicated and it takes much effort to read an \u201canswer\u201d given by a quantum computer. However, each task runs several times, and it doesn\u2019t take too long. Therefore, it\u2019s possible to obtain a final answer (read: encryption key) by comparing results of these runs.<\/p>\n<p>\u00a0<\/p>\n<p align=\"center\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2013\/10\/05102018\/quantum-cerberis.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-2855\" alt=\"quantum-cerberis\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2013\/10\/05102018\/quantum-cerberis.jpg\" width=\"721\" height=\"550\"><\/a><\/p>\n<p align=\"center\">All quanta are in the white box on the right<\/p>\n<p><b><i>Deep<\/i><\/b><b><i> <\/i><\/b><b><i>dive<\/i><\/b><b><i>:<\/i><\/b><i> <\/i><i>Modern systems in the core of SSL, HTTPS, <\/i><a href=\"https:\/\/www.kaspersky.com\/blog\/vpns-use\/\" target=\"_blank\" rel=\"noopener nofollow\"><i>VPN<\/i><\/a><i>, etc., are typically encrypted data using a secret key and symmetric algorithm. It\u2019s the same on the sender and receiver sides (hence symmetric), which negotiate a secret key in the beginning of the session using another, asymmetric cryptosystem. Asymmetric algorithm is used just for secret key negotiation because it\u2019s computational-heavy. Security of asymmetrical cryptosystem is based on solving the complexity of some mathematical problem. e.g. integer factorization of very large numbers (RSA algorithm). It takes noticeable time just to multiply or divide such large numbers, to say nothing about trying multiple numbers in order. So the cryptosystem setup assumes that a spy <b>can<\/b> eavesdrop on the connection, but it will take an unreasonable amount of time (from dozens to millions of years depending of key length) to calculate a secret key and decrypt the connection. It turns out that quantum computers might help here. Using Shor\u2019s algorithm, a quantum computer comes to a final state corresponding to solved mathematical problems very quickly, almost as fast, as an ordinary computer multiplying a couple of numbers. Despite some extra issues, like the necessity to run this task several times and complicated results reading with the help of classical computers, a quantum computer might find the required large numbers very quickly, helping an attacker calculate the secret key and decrypting the message.<\/i><\/p>\n<p><i>By the way, good symmetric algorithms, e.g. AES, don\u2019t have flaws allowing that kind of dramatic bruteforcing speedup. By existing estimates, bruteforcing 256-bit AES key on quantum computer is equal to bruteforcing 128-bit AES on a classic computer, so security levels remain very high.<\/i><\/p>\n<p>\u00a0<\/p>\n<p><b>Where the shoe pinches<\/b><\/p>\n<p>Quantum computers don\u2019t reside on the desktop of every other teenage hacker wishing to eavesdrop on his classmates\u2019 Facebook sessions for good reason. Creation of a full-scale quantum computer involves many engineering challenges that some specialists consider to be impossible to accomplish. The main challenge is making sure qubits are entangled, because each quantum system tends to collapse into a classical state, lacking valuable undetermined properties. We can\u2019t avoid mentioning the long-suffering <a href=\"http:\/\/en.wikipedia.org\/wiki\/Schr%C3%B6dinger%27s_cat\" target=\"_blank\" rel=\"noopener nofollow\">Schr\u00f6dinger\u2019s cat<\/a> here, which eventually can\u2019t stay both dead and alive simultaneously \u2013 a quantum computer, however, must maintain this miraculous state for a long enough time to perform calculation and measure results. Modern prototypes can keep this state for milliseconds, and in some cases, a couple of seconds. The task becomes more and more complicated when the qubit count rises too. To break cryptosystems, computers must have 500-2000 qubits (depending on the algorithm and key length), but existing quantum computers operate with 14 qubits at maximum. That is why today\u2019s quantum computers are not usable for breaking your SSL certificate, but the situation may change in 5 years.<\/p>\n<p>\u00a0<\/p>\n<p align=\"center\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2013\/10\/05102016\/quantum-dwave-512.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-2856\" alt=\"quantum-dwave-512\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2013\/10\/05102016\/quantum-dwave-512.jpg\" width=\"660\" height=\"473\"><\/a><\/p>\n<p align=\"center\">Main expositors of science in general and specifically Schr\u00f6dinger\u2019s cat \u2013 Penny and Sheldon of \u201cThe Big Bang Theory\u201d<\/p>\n<p><b>Steps toward quantum goal<\/b><\/p>\n<p>Against this background, Canadian company D-Wave brassily claims that it produces 512-qubit quantum computers. Moreover, these devices are available for sale. Many experts say that the D-Wave computer is not \u201creal,\u201d because it utilizes a quantum annealing effect and can\u2019t demonstrate full properties of a quantum computer. However, it\u2019s complicated to argue with piles of cash, and D-Wave has customers willing to pay $10 million for the device, such as the military contractor Lockheed Martin and search giant Google to name a few. In spite of existing controversy, the computer solves a specific subset of optimization tasks using methods, which are quantum in nature and bring real value to customers.\u00a0 Google plans to experiment with machine learning and Lockheed Martin believes that a quantum computer is <a href=\"http:\/\/www.wired.com\/wiredenterprise\/2012\/02\/dwave-quantum-cloud\/all\/\" target=\"_blank\" rel=\"noopener nofollow\">able to find mistakes in the source code of software<\/a> used in F-35 jet fighters. D-Wave scientists admit that their computer is unable to solve some other \u201cquantum\u201d tasks, e.g. aforementioned integer factorization, so it poses no threat for modern cryptoalgorithms. However, there is another threat: real and functional quantum computers inspire big companies and governments to invest more in quantum development, speeding up the creation of other, cryptography-capable computers.<\/p>\n<p style=\"text-align: center;\" align=\"center\">\u00a0<a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2013\/10\/05102011\/quantum-dwave-1024x683.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter  wp-image-2857\" alt=\"quantum-dwave\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2013\/10\/05102011\/quantum-dwave-1024x683.jpg\" width=\"900\" height=\"600\"><\/a><\/p>\n<p align=\"center\">D-Wave Two \u2014 quantum computer-annealer<\/p>\n<p><b>Quantum cryptography<\/b><\/p>\n<p>Quite amusingly, quantum physics might offer the remedy to threats it poses. Theoretically speaking, it\u2019s impossible to eavesdrop on a connection if it\u2019s based on a single micro-particles transmission \u2013 quantum physics laws say that to try to measure one parameter of a micro-particle will alter another parameter. This phenomenon, known as the observer effect (and often confused with the uncertainty principle), should resolve the main issue of \u201cclassical\u201d communications \u2013 the possibility of eavesdropping. Each attempt to spy on a communication will alter the transmitted message.<\/p>\n<div class=\"pullquote\">Each attempt to spy on a communication will alter the transmitted message.<\/div>\n<p>In quantum communications, significant interference means that an unwanted third party monitors the connection. Of course, you want to prevent information leaks, as well as know that it happens. That is one of the reasons why modern quantum cryptosystems only use \u201cquantum\u201d communication channels to negotiate session encryption keys, which are used to encrypt information transmitted via traditional channels. So a potentially intercepted key is rejected and parties negotiate a new key until transmission comes unaltered. We see that quantum key distribution (QKD) system is being used exactly in the same role, as asymmetric cryptoalgorithms, which may fall to quantum attacks soon.<\/p>\n<p align=\"center\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2013\/10\/05102010\/quantum-sheldon-1024x667.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-2858\" alt=\"quantum-sheldon\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2013\/10\/05102010\/quantum-sheldon-1024x667.jpg\" width=\"1024\" height=\"667\"><\/a><\/p>\n<p align=\"center\">Meet Cerberis, commercially available quantum key distribution system<\/p>\n<p>Unlike quantum computers, quantum cryptosystems have been available commercially for quite a long time. First scientific research emerged circa 1980, but practical implementation appeared swiftly. The first lab tests were conducted in 1989, and at the end of the century there were commercially available systems able to transmit an encryption key over a 30-mile long fiber optic. Companies like id Quantique and MagiQ Technologies sell ready out of the box QKD systems, which are simple enough to be installed by a network technician. In addition to government and military institutions, QKD users are multinational corporations, banks and even FIFA.<\/p>\n<p><b>Perfect protection?<\/b><\/p>\n<p>In theory, quantum communication systems do not allow stealthy eavesdropping, but current implementations were demonstrated to have some flaws. First, to avoid interference and allow long-distance transmission, the system transmits multiple photons. Of course, developers try to keep that at minimum, but there is a theoretical possibility to intercept one photon and analyze its state without touching others. Second, there is a distance limit (about 100 miles) for current systems, which makes their use much more limited.\u00a0 Geographically distant branches would not be able to communicate without some \u201crepeater\u201d, which becomes an obvious point for <a href=\"https:\/\/www.kaspersky.com\/blog\/man-in-the-middle-attack\/\" target=\"_blank\" rel=\"noopener nofollow\">man-in-the-middle attacks<\/a>.<\/p>\n<div class=\"pullquote\">Quantum cryptosystems are invulnerable only in ideal conditions, which is impossible to achieve. That\u2019s why it\u2019s too early to dump traditional protection measures.<\/div>\n<p>Third, hackers of the physicist world discovered, that by \u201cbliding\u201d photodetectors with a powerful laser, they are able to manipulate its readings, which enables <a href=\"https:\/\/threatpost.com\/researchers-find-hole-quantum-cryptography-083110\/74405\" target=\"_blank\" rel=\"noopener nofollow\">all kind of data manipulation in QKD systems<\/a>. All these are implementation flaws. However, it clearly demonstrates, that quantum systems by no means are silver bullets and protection of transmitted data, even if implemented in domain of physics instead of math, still remains a problem for decades ahead. And there is one more thing. Unlike existing technology, quantum devices will remain niche for many years, you won\u2019t encounter dozens of them in each office or apartment as it currently happens with Wi-Fi or smartphones. That\u2019s why it\u2019s too early to dismiss math \u2013 classic cryptosystems, which are able to work over any physical communication channel, will remain in high demand for many decades. However, there is a need to pick new algorithms, more resistant to quantum computing.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Quantum computing and quantum communications; these concepts were invented just 30 years ago, after scientific journals refused to issue earlier publications regarding these subjects because it looked more like science-fiction.<\/p>\n","protected":false},"author":32,"featured_media":2422,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[5],"tags":[448,321],"class_list":{"0":"post-2421","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-news","8":"tag-quantum-computers","9":"tag-technology"},"hreflang":[{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/quantum-computers-and-the-end-of-security\/2421\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/quantum-computers-and-the-end-of-security\/2522\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/quantum-computers-and-the-end-of-security\/2653\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/quantum-computers-and-the-end-of-security\/2496\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/quantum-computers-and-the-end-of-security\/2852\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/quantum-computers-and-the-end-of-security\/1701\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/quantum-computers-and-the-end-of-security\/2852\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/quantum-computers-and-the-end-of-security\/2852\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/me-en.kaspersky.com\/blog\/tag\/quantum-computers\/","name":"Quantum Computers"},"_links":{"self":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/2421","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/32"}],"replies":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=2421"}],"version-history":[{"count":2,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/2421\/revisions"}],"predecessor-version":[{"id":15632,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/2421\/revisions\/15632"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/2422"}],"wp:attachment":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=2421"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=2421"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=2421"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}