{"id":2471,"date":"2022-07-13T09:30:22","date_gmt":"2022-07-13T09:30:22","guid":{"rendered":"https:\/\/iot-ngin.eu\/?p=2471"},"modified":"2022-07-13T09:43:43","modified_gmt":"2022-07-13T09:43:43","slug":"how-far-is-the-quantum-computing-risk-for-current-cryptography","status":"publish","type":"post","link":"https:\/\/iot-ngin.eu\/index.php\/2022\/07\/13\/how-far-is-the-quantum-computing-risk-for-current-cryptography\/","title":{"rendered":"How far is the Quantum Computing risk for current cryptography?"},"content":{"rendered":"\n<p>The concept of Quantum Computing has raised high expectations for the next generation of computing, similar to the birth of computing in mid 1900\u2019s, when ENIAC was powered for the first time. Although several challenges still burden the commercial availability of a general-purpose quantum computer, the breakthrough potential is huge and so are the challenges arising from the -needed- computing landscape refactoring.<\/p>\n\n\n\n<p>Implications are mostly for current encryption techniques, which have dominated transport-layer security, protecting HTTP traffic. These techniques largely rely on the premise that cracking keys and factoring prime numbers is impossible within an attacker\u2019s lifetime, considering the capabilities of today\u2019s supercomputers. This assumption was challenged in 1995 by Peter Shor who proposed a polynomial-time quantum algorithm for this problem, which reduced an original problem of exponential complexity into one of polynomial complexity, thus allowing quantum computers to solve the numbers\u2019 factoring problem in amazingly short time<sup>1<\/sup>.<\/p>\n\n\n\n<p>Although Quantum Computing technology has only allowed to factor 35 as the biggest number so far on IBM\u2019s Quantum Computer<sup>2<\/sup>, running Shor\u2019s algorithm on a large integer -like 2048 bit RSA keys &#8211; is still a distant target. In addition, due to complexities of science and engineering, it is difficult to predict when the first fully\u00a0functional quantum computer will be available, but steady progress is being made, and some argue it could be within the next few decades<sup>3<\/sup>.<\/p>\n\n\n\n<p>Acknowledging the significance of post-quantum cryptography, several European National Agencies authorities have been investigating and preparing for potential mitigations. ENISA has proactively provided 2 proposals for system owners in order to protect against a quantum attacker, including hybrid implementations of pre-quantum and post-quantum schemes, and mixing of pre-shared keys into all keys established via public-key cryptography. However, these solutions come at considerable cost and at limited scope, since they apply to systems which keep state and have a limited set of peers<sup>4<\/sup>.<\/p>\n\n\n\n<p>As preliminary standardization steps, the U.S. National Institute of Standards and Technology (NIST) in 2016 announced a call for post-quantum asymmetric encryption algorithms, as well as a call for digital-signature algorithms. The draft standards should be available in the timeframe between 2022-2024<sup>5<\/sup>. The European Telecommunications Standards Institute (ETSI) has published multiple reports investigating various aspects of quantum computing<sup>6 7<\/sup> , as well as providing migration strategies and recommendations for Quantum-Safe schemes, and enhancing cryptography awareness across all business sectors<sup>8<\/sup>, while monitoring the status of NIST standardization.<\/p>\n\n\n\n<p>So, whatever the timeframe for breaking traditional cryptography and releasing quantum-safe standards, the digital world must be prepared for an unprecedented transition to post-quantum cryptographic schemes, which would affect any web application and service and which could last for decades till its full transition. \u00a0<\/p>\n\n\n\n<hr class=\"wp-block-separator is-style-wide\">\n\n\n\n<p><meta charset=\"utf-8\"><strong>References<\/strong><\/p>\n\n\n\n<p>\n<sup>1<\/sup> \n<a href=\"https:\/\/quantum-computing.ibm.com\/composer\/docs\/iqx\/guide\/shors-algorithm \"> https:\/\/github.com\/IoT-NGIN\/guide-to-semantic-twins https:\/\/quantum-computing.ibm.com\/composer\/docs\/iqx\/guide\/shors-algorithm <\/a>\n<br>\n<sup>2<\/sup> \n<a> M. Amico, Z. H. Saleem and M. Kumph, &#8220;Experimental study of Shor&#8217;s factoring algorithm using the IBM Q Experience,&#8221; Physical Review A, vol. 100, no. 1, 2019. <\/a>\n<br>\n<sup>3<\/sup> \n<a href=\"https:\/\/www.heritage.org\/technology\/report\/quantum-science-and-national-security-primer-policymakers \"> https:\/\/www.heritage.org\/technology\/report\/quantum-science-and-national-security-primer-policymakers  <\/a>\n<br>\n<sup>4<\/sup> \n<a > W. Beullens, J.-P. D\u2019Anvers, A. H\u00fclsing, T. Lange, L. Panny, C. de Saint Guilhem, N. P. Smart, E. Rekleitis, A. Aktypi and A.-V. Grammatopoulos, &#8220;Post Quantum Cryptography &#8211; Current state and mitigation,&#8221; ENISA, 2021 <\/a>\n<br>\n<sup>5<\/sup> \n<a href=\"https:\/\/csrc.nist.gov\/Projects\/post-quantum-cryptography\/workshops-and-timeline \"> https:\/\/csrc.nist.gov\/Projects\/post-quantum-cryptography\/workshops-and-timeline  <\/a>\n<br>\n<sup>6<\/sup> \n<a> ETSI, &#8220;Quantum Safe Cryptography; Case Studies and Deployment Scenarios,&#8221; ETSI GR QSC 003, 2017 <\/a>\n<br>\n<sup>7<\/sup> \n<a> ETSI, &#8220;Quantum-Safe Cryptography; Quantum-Safe threat assessment,&#8221; ETSI GR QSC 004, 2017 <\/a>\n<br>\n<sup>8<\/sup> \n<a> ETSI, &#8220;CYBER; Migration strategies and recommendations to Quantum Safe schemes,&#8221; ETSI TR 103 619, 2020 <\/a>\n<br>\n<\/p>\n\n\n\n<div style=\"height:100px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n","protected":false},"excerpt":{"rendered":"<p>The concept of Quantum Computing has raised high expectations for the next generation of computing, similar to the birth of computing in mid 1900\u2019s, when ENIAC was powered for the first time. Although several challenges still burden the commercial availability &hellip;<\/p>\n","protected":false},"author":2,"featured_media":2475,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_mi_skip_tracking":false,"footnotes":""},"categories":[17],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>How far is the Quantum Computing risk for current cryptography? - IOT NGIN<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/iot-ngin.eu\/index.php\/2022\/07\/13\/how-far-is-the-quantum-computing-risk-for-current-cryptography\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How far is the Quantum Computing risk for current cryptography? - IOT NGIN\" \/>\n<meta property=\"og:description\" content=\"The concept of Quantum Computing has raised high expectations for the next generation of computing, similar to the birth of computing in mid 1900\u2019s, when ENIAC was powered for the first time. Although several challenges still burden the commercial availability &hellip;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/iot-ngin.eu\/index.php\/2022\/07\/13\/how-far-is-the-quantum-computing-risk-for-current-cryptography\/\" \/>\n<meta property=\"og:site_name\" content=\"IOT NGIN\" \/>\n<meta property=\"article:published_time\" content=\"2022-07-13T09:30:22+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-07-13T09:43:43+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/iot-ngin.eu\/wp-content\/uploads\/2022\/07\/How-far-is-the-Quantum-Computing-risk-for-current-cryptography.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1269\" \/>\n\t<meta property=\"og:image:height\" content=\"846\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Giannis Tsichlas\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/iot-ngin.eu\/#website\",\"url\":\"https:\/\/iot-ngin.eu\/\",\"name\":\"IOT NGIN\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/iot-ngin.eu\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/iot-ngin.eu\/index.php\/2022\/07\/13\/how-far-is-the-quantum-computing-risk-for-current-cryptography\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/iot-ngin.eu\/wp-content\/uploads\/2022\/07\/How-far-is-the-Quantum-Computing-risk-for-current-cryptography.png\",\"contentUrl\":\"https:\/\/iot-ngin.eu\/wp-content\/uploads\/2022\/07\/How-far-is-the-Quantum-Computing-risk-for-current-cryptography.png\",\"width\":1269,\"height\":846},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/iot-ngin.eu\/index.php\/2022\/07\/13\/how-far-is-the-quantum-computing-risk-for-current-cryptography\/#webpage\",\"url\":\"https:\/\/iot-ngin.eu\/index.php\/2022\/07\/13\/how-far-is-the-quantum-computing-risk-for-current-cryptography\/\",\"name\":\"How far is the Quantum Computing risk for current cryptography? - IOT NGIN\",\"isPartOf\":{\"@id\":\"https:\/\/iot-ngin.eu\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/iot-ngin.eu\/index.php\/2022\/07\/13\/how-far-is-the-quantum-computing-risk-for-current-cryptography\/#primaryimage\"},\"datePublished\":\"2022-07-13T09:30:22+00:00\",\"dateModified\":\"2022-07-13T09:43:43+00:00\",\"author\":{\"@id\":\"https:\/\/iot-ngin.eu\/#\/schema\/person\/dac2bc3c10805a89083986685c5801d1\"},\"breadcrumb\":{\"@id\":\"https:\/\/iot-ngin.eu\/index.php\/2022\/07\/13\/how-far-is-the-quantum-computing-risk-for-current-cryptography\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/iot-ngin.eu\/index.php\/2022\/07\/13\/how-far-is-the-quantum-computing-risk-for-current-cryptography\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/iot-ngin.eu\/index.php\/2022\/07\/13\/how-far-is-the-quantum-computing-risk-for-current-cryptography\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/iot-ngin.eu\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How far is the Quantum Computing risk for current cryptography?\"}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/iot-ngin.eu\/#\/schema\/person\/dac2bc3c10805a89083986685c5801d1\",\"name\":\"Giannis Tsichlas\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/iot-ngin.eu\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/740c19c414d2291ee24fcbe553ee2609?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/740c19c414d2291ee24fcbe553ee2609?s=96&d=mm&r=g\",\"caption\":\"Giannis Tsichlas\"},\"url\":\"https:\/\/iot-ngin.eu\/index.php\/author\/tsichlas\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How far is the Quantum Computing risk for current cryptography? - IOT NGIN","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/iot-ngin.eu\/index.php\/2022\/07\/13\/how-far-is-the-quantum-computing-risk-for-current-cryptography\/","og_locale":"en_US","og_type":"article","og_title":"How far is the Quantum Computing risk for current cryptography? - IOT NGIN","og_description":"The concept of Quantum Computing has raised high expectations for the next generation of computing, similar to the birth of computing in mid 1900\u2019s, when ENIAC was powered for the first time. Although several challenges still burden the commercial availability &hellip;","og_url":"https:\/\/iot-ngin.eu\/index.php\/2022\/07\/13\/how-far-is-the-quantum-computing-risk-for-current-cryptography\/","og_site_name":"IOT NGIN","article_published_time":"2022-07-13T09:30:22+00:00","article_modified_time":"2022-07-13T09:43:43+00:00","og_image":[{"width":1269,"height":846,"url":"https:\/\/iot-ngin.eu\/wp-content\/uploads\/2022\/07\/How-far-is-the-Quantum-Computing-risk-for-current-cryptography.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Giannis Tsichlas","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebSite","@id":"https:\/\/iot-ngin.eu\/#website","url":"https:\/\/iot-ngin.eu\/","name":"IOT NGIN","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/iot-ngin.eu\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/iot-ngin.eu\/index.php\/2022\/07\/13\/how-far-is-the-quantum-computing-risk-for-current-cryptography\/#primaryimage","inLanguage":"en-US","url":"https:\/\/iot-ngin.eu\/wp-content\/uploads\/2022\/07\/How-far-is-the-Quantum-Computing-risk-for-current-cryptography.png","contentUrl":"https:\/\/iot-ngin.eu\/wp-content\/uploads\/2022\/07\/How-far-is-the-Quantum-Computing-risk-for-current-cryptography.png","width":1269,"height":846},{"@type":"WebPage","@id":"https:\/\/iot-ngin.eu\/index.php\/2022\/07\/13\/how-far-is-the-quantum-computing-risk-for-current-cryptography\/#webpage","url":"https:\/\/iot-ngin.eu\/index.php\/2022\/07\/13\/how-far-is-the-quantum-computing-risk-for-current-cryptography\/","name":"How far is the Quantum Computing risk for current cryptography? - IOT NGIN","isPartOf":{"@id":"https:\/\/iot-ngin.eu\/#website"},"primaryImageOfPage":{"@id":"https:\/\/iot-ngin.eu\/index.php\/2022\/07\/13\/how-far-is-the-quantum-computing-risk-for-current-cryptography\/#primaryimage"},"datePublished":"2022-07-13T09:30:22+00:00","dateModified":"2022-07-13T09:43:43+00:00","author":{"@id":"https:\/\/iot-ngin.eu\/#\/schema\/person\/dac2bc3c10805a89083986685c5801d1"},"breadcrumb":{"@id":"https:\/\/iot-ngin.eu\/index.php\/2022\/07\/13\/how-far-is-the-quantum-computing-risk-for-current-cryptography\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/iot-ngin.eu\/index.php\/2022\/07\/13\/how-far-is-the-quantum-computing-risk-for-current-cryptography\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/iot-ngin.eu\/index.php\/2022\/07\/13\/how-far-is-the-quantum-computing-risk-for-current-cryptography\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/iot-ngin.eu\/"},{"@type":"ListItem","position":2,"name":"How far is the Quantum Computing risk for current cryptography?"}]},{"@type":"Person","@id":"https:\/\/iot-ngin.eu\/#\/schema\/person\/dac2bc3c10805a89083986685c5801d1","name":"Giannis Tsichlas","image":{"@type":"ImageObject","@id":"https:\/\/iot-ngin.eu\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/740c19c414d2291ee24fcbe553ee2609?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/740c19c414d2291ee24fcbe553ee2609?s=96&d=mm&r=g","caption":"Giannis Tsichlas"},"url":"https:\/\/iot-ngin.eu\/index.php\/author\/tsichlas\/"}]}},"cc_featured_image_caption":{"caption_text":"","source_text":"","source_url":""},"_links":{"self":[{"href":"https:\/\/iot-ngin.eu\/index.php\/wp-json\/wp\/v2\/posts\/2471"}],"collection":[{"href":"https:\/\/iot-ngin.eu\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/iot-ngin.eu\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/iot-ngin.eu\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/iot-ngin.eu\/index.php\/wp-json\/wp\/v2\/comments?post=2471"}],"version-history":[{"count":6,"href":"https:\/\/iot-ngin.eu\/index.php\/wp-json\/wp\/v2\/posts\/2471\/revisions"}],"predecessor-version":[{"id":2478,"href":"https:\/\/iot-ngin.eu\/index.php\/wp-json\/wp\/v2\/posts\/2471\/revisions\/2478"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/iot-ngin.eu\/index.php\/wp-json\/wp\/v2\/media\/2475"}],"wp:attachment":[{"href":"https:\/\/iot-ngin.eu\/index.php\/wp-json\/wp\/v2\/media?parent=2471"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/iot-ngin.eu\/index.php\/wp-json\/wp\/v2\/categories?post=2471"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/iot-ngin.eu\/index.php\/wp-json\/wp\/v2\/tags?post=2471"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}