Everyone in the IT field is interested in how big a threat quantum computers are to cryptography and how to deal with the problem. This series of articles tries to explain this problem in a popular way.
Dr. Michael Mosca published a simple equation around 2015 describing data protection. If I need to
protect data for a certain period of time, the attack time ( Z ) must be greater than the sum
of the time needed to ensure data protection ( X ) and the time to switch to another algorithm
( Y ). If the attack time is shorter, the attacker has a chance to obtain data or key material.
All of this has significant implications for security.
What does it look like in reality? How long does the attack take and how demanding is it
on classical digital or upcoming quantum computers? Is it a cryptographic, theoretical or
practical threat? These are questions that probably bother everyone whose work touches
on computer science and security. If it is a cryptographic threat, it is usually just
a mathematical curiosity. In the case of a theoretical threat, such a threat may be realized
at some point in the future. Finally, a practical threat means that this attack is or
will be possible to realize.
This document tries to explain the basic features in an understandable way, which can lead
to oversimplification. I also use the classic explanation of the algorithms here so that
they can be easier to imagine, and the attack calculations are also based on this version.
At the same time, the whole procedure explains why it is important to have control over
your assets and protect them accordingly. This also means quickly and easily changing
the cryptography settings in all the systems you use.
Even in computer science, it is appropriate to follow the motto of Vegetius: "Si vis pacem,
para bellum", i.e. "If you want peace, prepare for war". Security is currently
a very turbulent area with a large number of warlords trying to capitalize on any opportunity.
This is exactly the reason why it is necessary to approach this material with a certain
skepticism and caution, development may cause it to become obsolete soon. In such a case,
the comments written here would not necessarily lead to an expansion of knowledge, but to
a wrong decision. Quantum computers will come, the question is when and how powerful they
will be. The operating temperatures listed here may change with new technology, which
significantly changes the power requirements. Similarly, changes may occur at other
levels with similar impacts.
Current asymmetric algorithms are based on one-way operations. It is very easy to perform
such an operation in one direction, but extremely difficult or impossible to perform
it in the opposite direction. Current algorithms are therefore considered invincible
by digital computers. More precisely, at the current level of knowledge, we do not know
how to attack such an algorithm. The question is, what does invincible actually mean?
Is it possible to somehow describe such an attack and compare it to the events taking
place around us? And how do the upcoming quantum computers fit into this?
Until 2030, we will still use the RSA, DH, ECDH algorithms for key agreement. If nothing
changes, by 2035 we will use the ECDSA algorithms for digital signature algorithms,
the RSA and DSA algorithms are already excluded from this list. However, this article
will not describe the weaknesses, it will focus on the conditions of such an attack.
The goal is to provide an approximate time, energy and memory requirements of the attack
to determine the size of the threat. Unfortunately, the calculations are very approximate,
they do not consider the problems of current technologies with the size of available
memory, cache miss, branching, as well as the impacts of developments in mathematics,
physics, material sciences and other important fields. The article is intended only
as a warning about the likely impacts. So this is an optimistic approach, reality can
always surprise us.
The advent of quantum computers is relegating the aforementioned algorithms to a later
stage. Instead of RSA, DH, ECDH, Krystal Cyber is coming, standardized as FIPS 203 ML-KEM,
and in the near future HQC, which should be the FIPS 207 HQC-KEM standard. The postquantum
key exchange algorithms should be deployed by 2030. Instead of RSA, DSA and ECDSA,
Krystal Dilithium is standardized as FIPS 204 ML-DSA, SPHINCS+ is standardized
as FIPS 205 SHL-DSA or the upcoming Falcon, which should be standardized as FIPS 206 FN-DSA.
Replacement algorithms for digital signatures should be implemented by 2035. In connection
with the transition, a suitable approach issue is crypto-agility, i.e. the ability
to flexibly change the cryptography used, but this issue is not part of this article.
From the list of current algorithms, only RSA is based on the factorization problem,
while other algorithms are usually based on the discrete logarithm problem (DLP). But
what does this mean? Factoring a number means finding prime factors. In the case of
the RSA algorithm, a large n-bit number is created based on two large primes, the mutual
relationship of the primes used provides information for creating a private key and
subsequently a public key. Thanks to this, both encryption and decryption of the content
are possible. In contrast, the discrete logarithm is built on a different problem. If
we work with modular operations (actually the remainder after division), the number
range is limited by the divisor. The divisor itself must be only a prime number from
among very specific ones. In such a number range, it is easy to create a power, but it
is extremely challenging to find the corresponding square root based on the knowledge
of the power. And since this problem is used in both DH algorithms and, with some
modification, in ECDH algorithms, it is extremely difficult to break the codes mentioned.
So how difficult is it in reality?
To be continued in The RSA Algorithm and the Factorization Problem
1. Introductory Provisions
1.1. These General Terms and Conditions are, unless otherwise agreed in writing in the contract, an integral part of all contracts relating to training organised or provided by the trainer, Jan Dušátko, IČ 434 797 66, DIČ 7208253041, with location Pod Harfou 938/58, Praha 9 (next as a „lector“).2. Creation of a contract by signing up for a course
2.1. Application means unilateral action of the client addressed to the trainer through a data box with identification euxesuf, e-mailu with address register@cryptosession.cz or register@cryptosession.info, internet pages cryptosession.cz, cryptosession.info or contact phone +420 602 427 840.3. Termination of the contract by cancellation of the application
3.1. The application may be cancelled by the ordering party via e-mail or via a data mailbox.4. Price and payment terms
4.1. By sending the application, the ordering party accepts the contract price (hereinafter referred to as the participation fee) indicated for the course.5. Training conditions
5.1. The trainer is obliged to inform the client 14 days in advance of the location and time of the training, including the start and end dates of the daily programme.6. Complaints
6.1. If the participant is grossly dissatisfied with the course, the trainer is informed of this information.7. Copyright of the provided materials
7.1. The training materials provided by the trainer in the course of the training meet the characteristics of a copyrighted work in accordance with Czech Act No 121/2000 Coll.8. Liability
8.1. The trainer does not assume responsibility for any shortcomings in the services of any third party that he uses in the training.9. Validity of the Terms
9.1 These General Terms and Conditions shall be valid and effective from 1 October 2024.Consent to the collection and processing of personal data
According to Regulation (EU) No 2016/679 of the European Parliament and of the Council on the protection of individuals with regard to the processing of personal data and on the free movement of such data and repealing Directive 95/46/EC (General Data Protection Regulation, hereinafter referred to as "the Regulation"), the processor xxx (hereinafter referred to as "the Controller") processes personal data. Individual personal data that are part of the processing during specific activities at this web presentation and in the course of trade are also broken down.Information about the records of access to the web presentation
This website does not collect any cookies. The site does not use any analytical scripts of third parties (social networks, cloud providers). For these reasons, an option is also offered for displaying the map in the form of a link, where the primary source is OpenStreet and alternatives then the frequently used Maps of Seznam, a.s., or Google Maps of Google LLC Inc. The use of any of these sources is entirely at the discretion of the users of this site. The administrator is not responsible for the collection of data carried out by these companies, does not provide them with data about users and does not cooperate on the collection of data.Information about contacting the operator of the site
The form for contacting the operator of the site (administrator) contains the following personal data: name, surname, e-mail. These data are intended only for this communication, corresponding to the address of the user and are kept for the time necessary to fulfil the purpose, up to a maximum of one year, unless the user determines otherwise.Information about the order form
In case of an interest in the order form, the form contains more data, i.e. name, surname, e-mail and contact details for the organisation. These data are intended only for this communication, corresponding to the address of the user and are kept for one year, unless the user determines otherwise. In the event that a business relationship is concluded on the basis of this order, only the information required by Czech law on the basis of business relations (company name and address, bank account number, type of course and its price) will continue to be kept by the administrator.Information about the course completion document
Within the course, a course completion document is issued by the processor. This document contains the following data: student's name and surname, the name and date of the course completion and the employer's name. The information is subsequently used for the creation of a linear hash tree (non-modifiable record). This database contains only information about the provided names and company names, which may or may not correspond to reality and is maintained by the processor for possible re-issuance or verification of the document's issuance.Rights of the personal data subject
The customer or visitor of this website has the possibility to request information about the processing of personal data, the right to request access to personal data, or the right to request the correction or deletion of any data held about him. In the case of deletion, this requirement cannot be fulfilled only if it is not data strictly necessary in the course of business. The customer or visitor of this website also has the right to obtain explanations regarding the processing of his personal data if he finds out or believes that the processing is carried out in violation of the protection of his private and personal life or in violation of applicable legislation, and the right to request removal of the resulting situation and to ensure the correction.