Latest update: November 22nd, 2024
Understanding the Quantum Threat: Chapter 1
By now, you may have heard of the looming threat quantum technology poses to cryptography. But what's the real story behind it? In this introductory article of our 3-part series titled Understanding the Quantum Threat, we will delve into the world of quantum computing and unveil the enigmatic timeline leading to the emergence of a quantum computer with the power to shatter classical cryptography. Join us for a closer look at the quantum threat.
The Quantum Threat
To understand the quantum risk, we rewind to the groundbreaking 1990s, when Peter Shor, a visionary mathematician, discovered an algorithm that holds the tantalizing potential to attack fundamental algorithms in classical cryptography that form the bedrock of our secure communication systems. The catch? Today's supercomputers remain powerless to execute these algorithms. However, the day when a powerful quantum computer will change the game is fast approaching.
Quantum Supremacy Achieved
One thing that many people are unaware of is that researchers have been experimenting with quantum computers for over a decade. While these processors were initially very limited, their processing powers have grown exponentially. Not only are there already quantum computers in operation today, but there are quantum computers that have broken the quantum supremacy barrier. Quantum supremacy means that a quantum computer can solve some problems faster than any (non-quantum) supercomputer. When we say, ‘broken the quantum supremacy barrier,’ we mean that there exist quantum computers that have solved certain mathematical problems very quickly, say in mere seconds, that would take the most powerful classical supercomputer millions of years or more.
The quantum supremacy barrier does not mean that the quantum computer can run every problem faster than a classical computer. In fact, most problems will always be faster to run on a classical supercomputer. The mathematical problems used to demonstrate quantum supremacy were carefully chosen to give quantum computers an edge; they were not designed to have any practical use cases.
Practical Applications for Quantum Computers Abound
That does not mean that quantum computing will not be useful. It is likely that within a few years, quantum computers will already be powerful enough to solve numerous commercial problems. Some areas that will most benefit from quantum computing are material engineering, pharmaceutical design, logistics, finance, and artificial intelligence. According to Canada’s National Quantum Strategy, "in 2045, quantum is expected to be a $138.9 billion industry, with 209,200 jobs and $42.3 billion in returns".
Governments worldwide, including Canada, the USA, the EU and China, are investing aggressively in the quantum sector, aiming to stay at the forefront of research and development. Major international technology companies, including IBM, Google, and Microsoft, as well as engineering companies specializing in quantum technology, have ambitious programs to build commercially viable machines in the next couple of years.
A Timeline for a Cryptographically Relevant Quantum Computer
The tens of billions of dollars being funneled into quantum computing research has resulted in the rapid development of quantum computers’ power. Yet, this still begs the question, when will a quantum computer be built that is powerful enough to break current cryptography? This is extremely hard to predict, because a single engineering breakthrough could significantly change the landscape, and there are many players in academia and industry making active progress.
Another point that makes estimating the timeline difficult is the uncertainty surrounding whether certain governments—notably the American and Chinese—possess more powerful, classified quantum computers. However, it is public knowledge that the U.S. government is actively implementing regulations for its agencies to transition to quantum-resistant cryptography (running on classical computers) as new post-quantum cryptography (PQC) standards become available. With NIST's recent release of post-quantum cryptography standards, agencies responsible for National Security Systems are required to adopt these new algorithms. It's crucial to recognize that quantum computing has not hit a hard barrier; the scale of quantum computers continues to grow exponentially. According to Gartner's predictions, quantum computing advancements will pose significant threats to asymmetric cryptography by 2029, compromising the security of applications, data, and networks that rely on it. By 2034, Gartner's expert, Mark Horvath, argues that quantum computing technologies are expected to completely break these cryptographic protections. (Gartner®, Begin Transitioning to Post-Quantum Cryptography Now, by Mark Horvath, 2024)
Quantum computing poses a significant threat to traditional encryption methods, even today. Contact us to leverage AgileSec™ Platform's advanced capabilities and protect your organization from rogue actors. Our solutions help you identify vulnerabilities, maintain compliance, and future-proof your critical cryptographic infrastructure.