Quantum computing technologies are not that far away. Have you ever thought what the implications of quantum computing might be in the present cryptography? Have you ever thought about how this might impact e-commerce, authentication mechanisms and data-exchange protocols over the Internet? Have you ever thought about how this might impact in general the way trust is established over the Internet?
In a nutshell, existing cryptographic primitives used to establish trust among machines via handshake or key-encapsulation or key exchange protocols will be broken efficiently by a quantum computer. Hence, no trust could be established if we don’t get prepared.
All cryptographic algorithms based on mathematical hard problems such as the “Integer Factoring” (RSA) and “Discrete Logarithm” (ElGamal, Diffie-Hellman Key Exchange protocol, ECDSA, ECDH, DSA, Elliptic Curve Digital Signature Algorithm) will be efficiently broken by a quantum computer and in particular with quantum algorithms such as Shor’s and Grover’s algorithm.
The National Institute of Standards and Technology (NIST) has published the algorithms that will be secure and in-secure in a post quantum era (Table I, Table II) and as a result of the urgency it announced a fast-track submission process for the selection of new cryptographic primitives for the new post-quantum era. There are still many challenges to be addressed like very long key sizes and ciphertexts or signatures, as well as the lack of high computational capabilities.
Executives and Decision Makers within enterprises or organization need to start considering the following questions:
- How could quantum computing affect our sector?
- What are the associated challenges?
- How do we need to prepare our infrastructures?
At Electi we bring decades of cutting-edge academic and industry experience in the fields of Cryptography and Cryptanalysis working with leading academic institutions and organizations.
Our Electi Quantum Readiness Framework ™ can help companies and organizations to evaluate the readiness level of their organization with respect to quantum computing attacks and thus provide them with the most optimal strategy for a smoother transition to the post-quantum era.
We are here to help you for the post-quantum era.