Will your organization be protected the day a quantum computer breaks encryption on the internet?
Computer encryption is vital for protecting users, data, and infrastructure in the digital age. Using traditional computing, even common desktop encryption could take decades for specialized ‘crackers’ to break and government and infrastructure-grade encryption would take billions of times longer. In light of these facts, it may seem that today’s computer cryptography is a rock-solid way to safeguard everything from online passwords to the backbone of the entire internet. Unfortunately, many current cryptographic methods will soon be obsolete. In 2016, the National Institute of Standards and Technology (NIST) predicted that quantum computers will soon be able to break the most popular forms of public key cryptography. The encryption technologies we rely on every day - HTTPS, TLS, WiFi protection, VPNs, cryptocurrencies, PKI, digital certificates, smartcards, and most two-factor authentication - will be virtually useless. . . unless you prepare.
Cryptography Apocalypse is a crucial resource for every IT and InfoSec professional for preparing for the coming quantum-computing revolution. Post-quantum crypto algorithms are already a reality, but implementation will take significant time and computing power. This practical guide helps IT leaders and implementers make the appropriate decisions today to meet the challenges of tomorrow. This important book:
- Gives a simple quantum mechanics primer
- Explains how quantum computing will break current cryptography
- Offers practical advice for preparing for a post-quantum world
- Presents the latest information on new cryptographic methods
- Describes the appropriate steps leaders must take to implement existing solutions to guard against quantum-computer security threats
Cryptography Apocalypse: Preparing for the Day When Quantum Computing Breaks Today's Crypto is a must-have guide for anyone in the InfoSec world who needs to know if their security is ready for the day crypto break and how to fix it.
Table of Contents
Introduction xxi
I Quantum Computing Primer 1
1 Introduction to Quantum Mechanics 3
What is Quantum Mechanics? 3
Quantum is Counterintuitive 4
Quantum Mechanics is Real 5
The Basic Properties of Quantum Mechanics 8
Photons and Quantum Mechanics 8
Photoelectric Effect 9
Wave-Particle Duality 10
Probability Principle 14
Uncertainty Principle 17
Spin States and Charges 20
Quantum Tunneling 20
Superposition 21
Observer Effect 22
No-Cloning Theorem 24
Spooky Entanglement 24
Decoherence 25
Quantum Examples in Our World Today 27
For Additional Information 28
Summary 29
2 Introduction to Quantum Computers 31
How are Quantum Computers Different? 31
Traditional Computers Use Bits 31
Quantum Computers Use Qubits 33
Quantum Computers are Not Ready for Prime Time Yet 37
Quantum Will Reign Supreme Soon 38
Quantum Computers Improve Qubits Using Error Correction 39
Types of Quantum Computers 44
Superconducting Quantum Computers 44
Quantum Annealing Computers 45
Universal Quantum Computers 47
Topological Quantum Computers 49
Microsoft Majorana Fermion Computers 50
Ion Trap Quantum Computers 51
Quantum Computers in the Cloud 53
Non-U.S. Quantum Computers 53
Components of a Quantum Computer 54
Quantum Software 55
Quantum Stack 55
Quantum National Guidance 56
National Policy Guidance 56
Money Grants and Investments 56
Other Quantum Information Science Besides Computers 57
For More Information 58
Summary 58
3 How Can Quantum Computing Break Today’s Cryptography? 59
Cryptography Basics 59
Encryption 59
Integrity Hashing 72
Cryptographic Uses 73
How Quantum Computers Can Break Cryptography 74
Cutting Time 74
Quantum Algorithms 76
What Quantum Can and Can’t Break 79
Still Theoretical 82
Summary 83
4 When Will the Quantum Crypto Break Happen? 85
It Was Always “10 Years from Now” 85
Quantum Crypto Break Factors 86
Is Quantum Mechanics Real? 86
Are Quantum Computers Real? 87
Is Superposition Real? 87
Is Peter Shor’s Algorithm Real? 88
Do We Have Enough Stable Qubits? 88
Quantum Resources and Competition 89
Do We Have Steady Improvement? 89
Expert Opinions 90
When the Quantum Cyber Break Will Happen 90
Timing Scenarios 90
When Should You Prepare? 93
Breakout Scenarios 95
Stays in the Realm of Nation-States for a Long Time 95
Used by Biggest Companies 97
Mass Proliferation 97
Most Likely Breakout Scenario 97
Summary 98
5 What Will a Post-Quantum World Look Like? 99
Broken Applications 99
Weakened Hashes and Symmetric Ciphers 100
Broken Asymmetric Ciphers 103
Weakened and Broken Random Number Generators 103
Weakened or Broken Dependent Applications 104
Quantum Computing 114
Quantum Computers 114
Quantum Processors 115
Quantum Clouds 115
Quantum Cryptography Will Be Used 116
Quantum Perfect Privacy 116
Quantum Networking Arrives 117
Quantum Applications 117
Better Chemicals and Medicines 118
Better Batteries 118
True Artificial Intelligence 119
Supply Chain Management 120
Quantum Finance 120
Improved Risk Management 120
Quantum Marketing 120
Better Weather Prediction 121
Quantum Money 121
Quantum Simulation 122
More Precise Military and Weapons 122
Quantum Teleportation 122
Summary 126
II Preparing for the Quantum Break 127
6 Quantum-Resistant Cryptography 129
NIST Post-Quantum Contest 129
NIST Security Strength Classifications 132
PKE vs. KEM 133
Formal Indistinguishability Assurances 134
Key and Ciphertext Sizes 135
Types of Post-Quantum Algorithms 136
Code-Based Cryptography 136
Hash-Based Cryptography 137
Lattice-Based Cryptography 138
Multivariate Cryptography 140
Supersingular Elliptic Curve Isogeny Cryptography 140
Zero-Knowledge Proof 141
Symmetric Key Quantum Resistance 142
Quantum-Resistant Asymmetric Encryption Ciphers 143
BIKE 145
Classic McEliece 145
CRYSTALS-Kyber 146
FrodoKEM 146
HQC 147
LAC 148
LEDAcrypt 148
NewHope 149
NTRU 149
NTRU Prime 150
NTS-KEM 150
ROLLO 151
Round5 151
RQC 151
SABER 152
SIKE 152
ThreeBears 153
General Observations on PKE and KEM Key and Ciphertext Sizes 155
Quantum-Resistant Digital Signatures 156
CRYSTALS-Dilithium 156
FALCON 157
GeMSS 158
LUOV 158
MQDSS 159
Picnic 159
qTESLA 160
Rainbow 160
SPHINCS+ 161
General Observations on Signature Key and Sizes 162
Caution Advised 164
A Lack of Standards 164
Performance Concerns 165
Lack of Verified Protection 165
For Additional Information 166
Summary 166
7 Quantum Cryptography 167
Quantum RNGs 168
Random is Not Always Random 168
Why is True Randomness So Important? 170
Quantum-Based RNGs 172
Quantum Hashes and Signatures 177
Quantum Hashes 177
Quantum Digital Signatures 178
Quantum Encryption Ciphers 180
Quantum Key Distribution 181
Summary 188
8 Quantum Networking 189
Quantum Network Components 189
Transmission Media 189
Distance vs. Speed 191
Point-to-Point 192
Trusted Repeaters 193
True Quantum Repeaters 194
Quantum Network Protocols 196
Quantum Network Applications 199
More Secure Networks 199
Quantum Computing Cloud 200
Better Time Syncing 200
Prevent Jamming 201
Quantum Internet 202
Other Quantum Networks 203
For More Information 204
Summary 204
9 Preparing Now 207
Four Major Post-Quantum Mitigation Phases 207
Stage 1: Strengthen Current Solutions 207
Stage 2: Move to Quantum-Resistant Solutions 211
Stage 3: Implement Quantum-Hybrid Solutions 213
Stage 4: Implement Fully Quantum Solutions 214
The Six Major Post-Quantum Mitigation Project Steps 214
Step 1: Educate 215
Step 2: Create a Plan 220
Step 3: Collect Data 225
Step 4: Analyze 226
Step 5: Take Action/Remediate 228
Step 6: Review and Improve 230
Summary 230
Appendix: Additional Quantum Resources 231
Index 239