When it comes to technology, revolutionary is a word that gets overused. But if theres one thing in the world of 21st century computing that will deserve being described as such, its a fully functional quantum computer. It's no exaggeration to suggest that quantum computers have the potential to change the world as we know it.
Quantum computers are coming sooner than you might expect, in fact there are already functional, if rudimentary systems that have been developed by giants including IBM, Microsoft and Google along with many others. And you can be sure that the governments of the world are working behind the scenes in a quantum arms race. What we see in public is likely not at the bleeding edge of quantum computing research and development.
The power of a quantum computer, versus that of a classical computeror QC vs PCis they're set to dramatically advance fields as diverse as climate science, biology, and machine learning. But there's another application, and it's a somewhat shady one: espionage.
The governments of the world see quantum computers as a tool to break encryption standards. A fully functioning and stable high qubit quantum machine has the potential to wreak havoc across the internet. Previously secure networks would be vulnerable and public confidence in financial systems could collapse.
Forget Y2K, think Y2Q.
Then there are cryptocurrencies. Quantum computers could pose an existential threat to crypto, but I'll get to that a bit later. First, a crash course in quantum computing.
The functions of a classical computer are based around the use of bits, or binary digits, represented by 1s or 0s. A quantum bit, or a qubit as it's known, can exist as a 1 or 0, or both at the same time.This makes a QC much more adept at seeking answers to problems with a large number of outcomes or possible combinations than a classical computer.
A qubit harnesses the properties of quantum superposition. Via quantum entanglement, a qubit can be linked to other qubits to exponentially increase processing power. In simple terms, a QC is excellent at leveraging probabilities, which means that the answers to complex operations are exponentially faster with more qubits. A QC with enough qubits is capable of certain computations that a classical computer can never realistically solve. In certain cases, a calculation that a quantum computer could complete in mere minutes may take billions of years, or more to solve on even the world's most powerful supercomputer today.
The point at which a quantum computer can outperform a classical computer is called quantum supremacy. Some researchers already claim it has occurred, but any such claim is very specific, and completely impractical in a real world sense. There are also significant challenges to overcome before quantum computing becomes a commercial reality. Qubits are tricky things, to put it mildly, and maintaining coherence and scaling them is an area of ongoing research.
It's likely that we're many years away from practical quantum computers, but with enough stable qubits, there are some genuinely world-changing possibilities within reach. For now, the one I'll focus on is the ability to crack encryption. That might be the number one reason for governments to develop quantum computers.
It goes without saying that there's a need for network security. Military networks, financial systems, critical infrastructure, communications. You name it, it all needs to be secure to maintain confidence in the system. Security is built upon encryption.
Much of the encryption underpinning internet security is based upon prime numbers. As far back as 1994, American mathematician Peter Shor developed what is known as Shor's algorithm. It is used to find the prime factors of an integer. Put simply, this algorithm can be used to break many public key cryptography schemes, including RSA, one of the most widely used, and oldest algorithms for encryption.
I don't mean to be a scaremonger here. A QC capable of breaking a large key RSA encryption is probably years away at best, but the theoretical vulnerability exists, and the time to protect the possibility of an attack against it is now.
The governments of the world are developing post-quantum encryption schemes. US National Institute of Standards and Technology (NIST) is undertaking a multi-year project with the aim of standardizing one or more quantum-resistant public-key cryptographic schemes. If successful, most of the world's networks should transition to security which will appear seamless to the wider public.
In the end, Y2K wasn't the catastrophe that many doomsayers predicted. Hopefully quantum computers vs public key encryption passes with as little impact as Y2K did.
The moral of the story is that it's important not to ignore the threat posed by a QC. If the NSA is taking steps to secure its networks, then others should take the threat seriously too.
Quantum computers present an existential threat to many cryptocurrencies. Bitcoin is the logical example to use. Bitcoins core protocol relies on Elliptic Curve Digital Signature Algorithm (ECDSA) to create a private key and a corresponding public key. A sufficiently powerful QC can derive the private key from the public key. This allows an attacker to access that particular wallet. ECDSA is not easy to crack, but the potential is there and ignoring it is fraught with danger given the notoriously slow pace of blockchain development combined with head-in-the-sand tribalism.
Bitcoins early wallets are particularly vulnerable due to their use of pay to public key (p2pk) addresses, including the Satoshi Nakamoto era wallets. QC sceptics will say that BTC developers can hard fork to a quantum resistant signature scheme, and thats certainly true, but those dormant wallets remain vulnerable. Some estimates put the number of lost bitcoins at up to 25% of the entire supply. That's a lot of BTC.
What if a million bitcoins suddenly appeared on the market? Confidence would plummet and the price of bitcoin would crash. A hundred billion dollars, give or take is a juicy target for a rogue state. North Korea could certainly use the money.
But BTC and other cryptos aren't just about wealth. Their decentralised nature is antithetical to the ideologies and financial sectors of many countries. A country like China might wish to destroy all confidence in crypto, in order to remain in control of its financial sector. Perhaps the US might covertly attack crypto in order to prevent its use by criminals. Russia might.. well, who knows what Russia might do.
Some cryptos have already adopted QC secure signature schemes. Others including Ethereum and Cardano have quantum signatures or protection on their roadmaps.
I want to note again, my aim here isn't to pronounce doom and gloom. Bitcoin and others will survive if they take steps to protect against QCs, it's just that time is definitely ticking along. Cryptocurrencies already face numerous adversaries day after day, and yet it survives.
But it's time to get past the FUD and take quantum computers seriously. Developers need to act now. It might be a year or 10, but If a black swan event occurs, itll be far too late to do anything about it. The later the threat gets taken seriously, the harder it will be to mitigate against it.
No. Don't stress. Most of the legwork is being done behind the scenes and your current passwords and data should remain unaffected as long as the corporate caretakers of it are competent.
You can do things like change your private keys to longer key lengths where possible, but it's pretty safe to say that an adversary with a quantum computer isn't going to be worried about accessing your personal router, banking, or Coinbase password. There's bigger fish in the sea to go after.
The main thing is to be aware of the possible threat. The more people that are aware, the more questions get asked and hopefully answered. With any luck, by the time a fully functional quantum computer sees the light of day, the world will continue just as it always has, while enjoying the benefits they will bring.
In the future, hopefully stories like this one will be long forgotten, much like those Y2K doom and gloom articles were. I want to move on to talk about how a quantum computer can help to solve the really big problems, like clean energy, cures or treatments for things like cancer or diabetes, developing next generation materials, climate simulation or managing an entire city full of self-driving cars. But we all know that the likes of China and the US are after strategic and national security objectives first. And with that in mind, the wider internet and cryptocurrency remains vulnerable.
Follow this link:
Something has to be done about the quantum computer security threat - PC Gamer
- WhatsApp overhauling status tab with encrypted Snapchat Stories-like feature - 9 to 5 Mac [Last Updated On: February 21st, 2017] [Originally Added On: February 21st, 2017]
- GOP demands inquiry into EPA use of encrypted messaging apps - CNET [Last Updated On: February 21st, 2017] [Originally Added On: February 21st, 2017]
- Encryption Apps Help White House Staffers Leakand Maybe Break the Law - WIRED [Last Updated On: February 21st, 2017] [Originally Added On: February 21st, 2017]
- World Wide Web Creator Calls for Internet Decentralization & Encryption - The Data Center Journal [Last Updated On: February 21st, 2017] [Originally Added On: February 21st, 2017]
- What It Means to Have an 'Adult' Conversation on Encryption - Pacific Standard [Last Updated On: February 21st, 2017] [Originally Added On: February 21st, 2017]
- Confide in me! Encryption app leaks sensitive info from Washington DC - SC Magazine UK [Last Updated On: February 21st, 2017] [Originally Added On: February 21st, 2017]
- Gmail v7.2 Prepares to Add Support for S/MIME Enhanced Encryption - XDA Developers (blog) [Last Updated On: February 26th, 2017] [Originally Added On: February 26th, 2017]
- Top 6 Data Encryption Solutions - The Merkle [Last Updated On: February 26th, 2017] [Originally Added On: February 26th, 2017]
- Your Guide to the Encryption Debate - Consumer Reports - ConsumerReports.org [Last Updated On: February 26th, 2017] [Originally Added On: February 26th, 2017]
- Google helps put aging SHA-1 encryption out to pasture - Engadget [Last Updated On: February 26th, 2017] [Originally Added On: February 26th, 2017]
- Decipher your Encryption Challenges - Infosecurity Magazine [Last Updated On: February 28th, 2017] [Originally Added On: February 28th, 2017]
- How the Politics of Encryption Affects Government Adoption - Freedom to Tinker [Last Updated On: February 28th, 2017] [Originally Added On: February 28th, 2017]
- How Encryption Makes Your Sensitive Cloud-Based Data an Asset, Not a Liability - Security Intelligence (blog) [Last Updated On: February 28th, 2017] [Originally Added On: February 28th, 2017]
- Set up VMware VM Encryption for hypervisor-level security - TechTarget [Last Updated On: February 28th, 2017] [Originally Added On: February 28th, 2017]
- How The Media Are Using Encryption Tools To Collect Anonymous Tips - NPR [Last Updated On: February 28th, 2017] [Originally Added On: February 28th, 2017]
- Encryption patent that roiled Newegg is dead on appeal | Ars Technica - Ars Technica [Last Updated On: February 28th, 2017] [Originally Added On: February 28th, 2017]
- Research proposes 'full-journey' email encryption - The Stack [Last Updated On: March 1st, 2017] [Originally Added On: March 1st, 2017]
- Database-as-a-service platform introduces encryption-at-rest - BetaNews [Last Updated On: March 1st, 2017] [Originally Added On: March 1st, 2017]
- Encrypted Messaging Service 'Signal' Adds Video Call Option - Top Tech News [Last Updated On: March 2nd, 2017] [Originally Added On: March 2nd, 2017]
- Germany, France lobby hard for terror-busting encryption backdoors ... - The Register [Last Updated On: March 2nd, 2017] [Originally Added On: March 2nd, 2017]
- How to Send Encrypted Nudes, a Guide for the Discerning Lover - Inverse [Last Updated On: March 2nd, 2017] [Originally Added On: March 2nd, 2017]
- Ironclad Encryption Corporation Announces New Ticker Symbol OTCQB: IRNC - Yahoo Finance [Last Updated On: March 2nd, 2017] [Originally Added On: March 2nd, 2017]
- The Best Email Encryption Software of 2017 | Top Ten Reviews [Last Updated On: March 2nd, 2017] [Originally Added On: March 2nd, 2017]
- No, you shouldn't delete Signal or other encrypted apps - TechCrunch [Last Updated On: March 11th, 2017] [Originally Added On: March 11th, 2017]
- Best encryption software: Top 5 - Computer Business Review [Last Updated On: March 11th, 2017] [Originally Added On: March 11th, 2017]
- Encryption Backdoors, Vault 7, and the Jurassic Park Rule of Internet Security - Just Security [Last Updated On: March 11th, 2017] [Originally Added On: March 11th, 2017]
- That Encrypted Chat App the White House Liked? Full of Holes - WIRED [Last Updated On: March 11th, 2017] [Originally Added On: March 11th, 2017]
- What the CIA WikiLeaks Dump Tells Us: Encryption Works - New York Times [Last Updated On: March 11th, 2017] [Originally Added On: March 11th, 2017]
- Snake-Oil Alert Encryption Does Not Prevent Mass-Snooping - Center for Research on Globalization [Last Updated On: March 11th, 2017] [Originally Added On: March 11th, 2017]
- Customer Letter - Apple [Last Updated On: March 11th, 2017] [Originally Added On: March 11th, 2017]
- Don't Let WikiLeaks Scare You Off of Signal and Other Encrypted Chat Apps - WIRED [Last Updated On: March 12th, 2017] [Originally Added On: March 12th, 2017]
- BT to offer customers encryption service for data - Capacity Media (registration) [Last Updated On: March 12th, 2017] [Originally Added On: March 12th, 2017]
- Encryption - technet.microsoft.com [Last Updated On: March 12th, 2017] [Originally Added On: March 12th, 2017]
- Use FileVault to encrypt the startup disk on ... - Apple Support [Last Updated On: March 12th, 2017] [Originally Added On: March 12th, 2017]
- Viber launches secret chats to go beyond encryption - SlashGear [Last Updated On: March 13th, 2017] [Originally Added On: March 13th, 2017]
- Zix wins 5-vendor email encryption shootout - Network World [Last Updated On: March 13th, 2017] [Originally Added On: March 13th, 2017]
- A lesson from the CIA WikiLeaks dump: Encryption works - The Seattle Times [Last Updated On: March 13th, 2017] [Originally Added On: March 13th, 2017]
- What the CIA WikiLeaks Dump Tells Us: Encryption Works - NewsFactor Network [Last Updated On: March 18th, 2017] [Originally Added On: March 18th, 2017]
- Panicked Secret Service Says It Lost Encrypted Laptop But It's Fine, Everything's Fine - Gizmodo [Last Updated On: March 18th, 2017] [Originally Added On: March 18th, 2017]
- Google Cloud adds new customer-supplied encryption key partners ... - ZDNet [Last Updated On: March 18th, 2017] [Originally Added On: March 18th, 2017]
- Preseeding Full Disk Encryption - Linux Journal [Last Updated On: March 18th, 2017] [Originally Added On: March 18th, 2017]
- Bypassing encryption: 'Lawful hacking' is the next frontier of law enforcement technology - Boston Business Journal [Last Updated On: March 18th, 2017] [Originally Added On: March 18th, 2017]
- SecurityBrief NZ - Gemalto introduces on-prem encryption key solution for 'highly regulated' organisations - SecurityBrief NZ [Last Updated On: March 21st, 2017] [Originally Added On: March 21st, 2017]
- 'Always Be Concerned': US Court Slaps Down Fifth Amendment Defense of Encryption - Sputnik International [Last Updated On: March 21st, 2017] [Originally Added On: March 21st, 2017]
- Quantum Key System Uses Unbreakable Light-Based Encryption to Secure Data - Photonics.com [Last Updated On: March 21st, 2017] [Originally Added On: March 21st, 2017]
- Wikileaks Only Told You Half The Story -- Why Encryption Matters More Than Ever - Forbes [Last Updated On: March 21st, 2017] [Originally Added On: March 21st, 2017]
- EPA Sued For Withholding Info On Encrypted Text Messages | The ... - Daily Caller [Last Updated On: March 22nd, 2017] [Originally Added On: March 22nd, 2017]
- Opinion Data encryption efforts ramp up in face of growing security threats - Information Management [Last Updated On: March 22nd, 2017] [Originally Added On: March 22nd, 2017]
- Bypassing encryption: Lawful hacking is the next frontier of law enforcement technology - Salon [Last Updated On: March 22nd, 2017] [Originally Added On: March 22nd, 2017]
- NeuVector Announces Container Visualization, Encryption, and Security Solution for NGINX Plus - DABCC.com [Last Updated On: March 23rd, 2017] [Originally Added On: March 23rd, 2017]
- Is encryption one of the required HIPAA implementation specifications? - TechTarget [Last Updated On: March 23rd, 2017] [Originally Added On: March 23rd, 2017]
- Paper Spells Out Tech, Legal Options for Encryption Workarounds - Threatpost [Last Updated On: March 23rd, 2017] [Originally Added On: March 23rd, 2017]
- Encryption debate needs to be nuanced, says FBI's Comey - TechTarget [Last Updated On: March 25th, 2017] [Originally Added On: March 25th, 2017]
- Comey Renews Debate Over Encryption - 550 KTSA [Last Updated On: March 25th, 2017] [Originally Added On: March 25th, 2017]
- UK minister says encryption on messaging services is unacceptable - Reuters [Last Updated On: March 28th, 2017] [Originally Added On: March 28th, 2017]
- The why and how of encrypting files on your Android smartphone - Phoenix Sun [Last Updated On: March 28th, 2017] [Originally Added On: March 28th, 2017]
- UK targets WhatsApp encryption after London attack - Yahoo News [Last Updated On: March 28th, 2017] [Originally Added On: March 28th, 2017]
- Critical flaw alert! Stop using JSON encryption | InfoWorld - InfoWorld [Last Updated On: March 28th, 2017] [Originally Added On: March 28th, 2017]
- SecureMyEmail is email encryption for everyone - TechRepublic - TechRepublic [Last Updated On: March 28th, 2017] [Originally Added On: March 28th, 2017]
- Apple iOS 10.3 will introduce encryption which makes it MORE difficult for cops and spooks to crack into ISIS nuts ... - The Sun [Last Updated On: March 29th, 2017] [Originally Added On: March 29th, 2017]
- How to Analyze An Encryption Access Proposal - Freedom to Tinker [Last Updated On: March 29th, 2017] [Originally Added On: March 29th, 2017]
- Questions for the FBI on Encryption Mandates - Freedom to Tinker [Last Updated On: March 29th, 2017] [Originally Added On: March 29th, 2017]
- Justice Department anti-terror chief keeps pressing on encryption - Politico (blog) [Last Updated On: March 29th, 2017] [Originally Added On: March 29th, 2017]
- UK government can force encryption removal, but fears losing, experts say - The Guardian [Last Updated On: March 29th, 2017] [Originally Added On: March 29th, 2017]
- Encryption FAQs [Last Updated On: March 29th, 2017] [Originally Added On: March 29th, 2017]
- Why isn't US military email protected by standard encryption tech? - Naked Security [Last Updated On: April 9th, 2017] [Originally Added On: April 9th, 2017]
- How have ARM TrustZone flaws affected Android encryption? - TechTarget [Last Updated On: April 9th, 2017] [Originally Added On: April 9th, 2017]
- Keeping the enterprise secure in the age of mass encryption - Information Age [Last Updated On: April 9th, 2017] [Originally Added On: April 9th, 2017]
- Lack of encryption led to Dallas siren hack - WFAA [Last Updated On: April 12th, 2017] [Originally Added On: April 12th, 2017]
- Internet Society tells G20 nations: The web must be fully encrypted - The Register [Last Updated On: April 12th, 2017] [Originally Added On: April 12th, 2017]
- Make Encryption Ubiquitous, Says Internet Society - Infosecurity ... - Infosecurity Magazine [Last Updated On: April 12th, 2017] [Originally Added On: April 12th, 2017]
- Can we encrypt the web while giving governments a backdoor to snoop? - SC Magazine UK [Last Updated On: April 12th, 2017] [Originally Added On: April 12th, 2017]
- Why we need to encrypt everything - InfoWorld [Last Updated On: April 12th, 2017] [Originally Added On: April 12th, 2017]
- Hacked Dallas sirens get extra encryption to fend off future attacks - Computerworld [Last Updated On: April 12th, 2017] [Originally Added On: April 12th, 2017]
- SHA-1 Encryption Has Been Broken: Now What? - Forbes [Last Updated On: April 14th, 2017] [Originally Added On: April 14th, 2017]
- Hewlett Packard Enterprise touts encryption tool for federal clients - The Hill [Last Updated On: April 14th, 2017] [Originally Added On: April 14th, 2017]
- Encryption on the Rise in Age of Cloud - Infosecurity Magazine - Infosecurity Magazine [Last Updated On: April 14th, 2017] [Originally Added On: April 14th, 2017]
- Lawmaker Pushes Bill That Requires Encryption by Pennsylvania State Employees - Government Technology [Last Updated On: April 14th, 2017] [Originally Added On: April 14th, 2017]
- Disk encryption - Wikipedia [Last Updated On: April 14th, 2017] [Originally Added On: April 14th, 2017]
- The apps to use if you want to keep your messages private - Recode [Last Updated On: April 15th, 2017] [Originally Added On: April 15th, 2017]