Quantum Computing
Quantum computers leverage quantum mechanics to solve certain mathematical problems exponentially faster than classical computers. Algorithms like Shor’s could render widely used cryptographic methods such as RSA and Elliptic Curve Cryptography obsolete. Experts suggest that the first quantum-enabled cryptographic breaches might occur as early as 2030 posing a serious threat to global information infrastructure.
Almost everything you do on a computer today relies on cryptography from protecting emails and medical records to safeguarding financial transactions and critical infrastructure. Modern encryption methods like 2048-bit public keys are incredibly secure but their robustness could be shattered by the advent of large-scale quantum computing.
To counter this researchers and organizations are developing quantum-safe or post-quantum cryptography (PQC) algorithms that resist attacks from both classical and quantum computers. The U.S. National Institute of Standards and Technology (NIST) has taken a leading role in standardizing these next-generation cryptographic solutions releasing its first three post-quantum cryptography standards in August 2024. While symmetric cryptographic algorithms can largely withstand quantum threats with minor adjustments public-key cryptography demands a complete overhaul to remain secure.
Quantum-safe cryptography secures sensitive data, access and communications for the era of quantum computing.
Post-Quantum Cryptography (PQC) and Standardization Efforts
Recognizing the urgency of the quantum threat the National Institute of Standards and Technology (NIST) initiated a global effort to standardize post-quantum cryptographic (PQC) algorithms. After a multi year evaluation process NIST announced its first set of post quantum cryptographic standards in August 2024 by selecting algorithms designed to withstand both classical and quantum attacks.
NIST’s Selected Algorithms for PQC
NIST has chosen three primary algorithms for standardization:
- CRYSTALS Kyber– A key encapsulation mechanism (KEM) for secure communication.
- CRYSTALS Dilithium – A digital signature algorithm providing authentication.
- SPHINCS+ – A stateless hash-based signature scheme for enhanced security
But before diving deep into it let’s explore Quantum safe Cryptographic approaches.
Quantum-Safe Cryptographic Approaches
The field of post-quantum cryptography (PQC) explores various approaches to building quantum-resistant encryption methods:
1. Lattice-Based Cryptography
Lattice-based cryptography is a major area of post-quantum cryptography relying on the difficulty of problems related to mathematical structures called lattices. A lattice is a regular arrangement of points in space. These problems include finding the shortest vector (SVP) or the closest vector (CVP) within the lattice. A prominent example is the Learning With Errors (LWE) problem.
How it Works?
-
Key Generation:
- Choose a random matrix A (size m x n).
- Choose a secret vector s.
- Choose a small noise vector e.
- Compute the public key b = A * s + e.
- The secret key is s, and the public key is (A, b).
-
Encryption:
- To encrypt a message m, represent it as a vector.
- Choose a random vector r.
- Compute u = AT * r.
- Compute v = bT * r + m.
- The ciphertext is (u, v).
-
Decryption:
- Compute v - sT * u.
- This removes the noise and recovers the message m.
Example:
Let’s use a very simplified (and insecure) example to show the principles (using modulo 5 arithmetic for simplicity).
-
Key Generation:
A =
[[2, 1], [4, 3]]
s =[3, 1]
e =[1, 2]
b =[4, 2] (modulo 5)
-
Encryption:
m =
[1, 0]
r =[1, 2]
u =[0, 2] (modulo 5)
v =[4, 4] (modulo 5)
-
Decryption :
v =
b^T * r + m
b^T * r =2 (mod 5)
v =2 + m + noise
[4, 4] =2 + [1, 0] + [1, 4] (noise)
[4, 4] - 2 =[2, 4]
[2, 4] - [1, 4] (noise) =[1, 0]
Result:
m' = [1, 0]
Therefore, the correct decryption recovers the original message m = [1, 0].
Why it’s Secure?
The security of LWE is based on the conjecture that it is difficult to solve even for quantum computers. While related to NP-hard problems the quantum resistance of LWE isn’t simply due to NP-hardness (as some NP-hard problems might be solvable by quantum computers). Rather, the specific structure of lattice problems and LWE makes them resistant to known quantum algorithms like Shor’s algorithm. Practical cryptographic schemes often use variants like Module-LWE (MLWE) for improved efficiency.
2. Hash-Based Cryptography
Hash-based cryptography avoids number-theoretic problems (like factoring or discrete logarithms) that quantum computers might be able to solve. Instead, it leverages the one-wayness and collision resistance of cryptographic hash functions. A prominent example is SPHINCS+, a post-quantum signature scheme.
How it Works?
- Secret Key: You choose a random secret value S.
- Public Key: You apply a cryptographic hash function H multiple times to S. For example:
- H(S)
- H(H(S))
- H(H(H(S)))
- and so on, a certain number of times. The final result is your public key PK.
- Signing: To sign a message M, you use your secret key S and some of the intermediate hash values (parts of the “hash chain”) to create a signature. The process involves hashing the message M combined with portions of the hash chain.
- Verification: Someone with your public key PK can verify the signature. They recompute the hashes using the provided parts of the hash chain and the message M. If the final hash matches the published public key PK, the signature is valid.
Example:
Let’s imagine a very simplified hash function H(x) = x² mod 100. (This is not cryptographically secure, but just for understanding).
- S (secret) = 3
- PK = H(H(H(S))) = H(H(9 mod 100)) = H(81 mod 100) = 6561 mod 100 = 61. So, PK = 61.
Now signing and verification would involve using S and some intermediate hash values (in a more complex scheme) along with the message. The point is that given 61 it’s hard to find 3 (even in this example it would take some trial and error). A real cryptographic hash function makes this computationally infeasible.
Why it’s Secure:
- One-Wayness: It’s computationally infeasible to go from the public key PK (the final hash) back to the secret key S because of the one-way property of the hash function.
- Collision Resistance: It’s extremely difficult to find two different messages that hash to the same value. This prevents someone from forging a signature for a different message.
3. Code-Based Cryptography
The McEliece cryptosystem uses the difficulty of decoding a randomly perturbed linear code. While decoding a general linear code is known to be NP-hard. Decoding specific structured codes (like Goppa codes) can be done efficiently. The system hides the structure of a good code by disguising it as a general hard-to-decode code.
How it Works?
-
Secret Key: Choose a secret Goppa code (a type of error-correcting code with efficient decoding algorithms).
- Generate a generator matrix G for this Goppa code.
- Select a random invertible matrix S.
- Select a random permutation matrix P.
-
Public Key: Compute the public key as PK = SGP. This disguises the structure of the Goppa code.
-
Encryption: To encrypt a message m, represent it as a binary vector.
- Generate a random error vector e with a specific weight (number of 1s).
- Compute the ciphertext as c = mPK + e.
-
Decryption: The receiver knowing S, G, and P, can:
- Compute c’ = cP⁻¹ = mSG + eP⁻¹.
- Compute c’’ = S⁻¹c’ = mG + S⁻¹eP⁻¹.
- Use the efficient decoding algorithm for the Goppa code (represented by G) to recover m.
- Multiply by S to get the original message.
Example:
Let’s use a very simplified (and insecure) example to show the principles:
-
Secret Key: Goppa code (simplified): Let’s say our Goppa code allows us to correct one error.
- G (generator matrix, very small for simplicity): [[1, 0, 1], [0, 1, 1]]
- S (invertible matrix): [[1, 1], [0, 1]]
- P (permutation matrix): [[0, 1, 0], [0, 0, 1], [1, 0, 0]]
-
Public Key: PK = SGP: [[1, 1, 0], [1, 1, 1]]
-
Encryption: Message m = [1, 0]
- Error e = [0, 0, 1]
- Ciphertext c = mPK + e: [1, 1, 0] + [0, 0, 1] = [1, 1, 1]
-
Decryption:
- c’ = cP⁻¹: [1, 1, 1]
- c’’ = S⁻¹c’: [0, 1, 1]
- Using the Goppa code’s decoding we can recover m = [1, 0].
Why Secure?
- NP-Hardness: Decoding a general linear code is NP-hard. This means that finding a general solution is computationally infeasible for large codes.
- Goppa Code Structure: The public key PK hides the structure of the efficient Goppa code. Only someone with the secret key can efficiently decode the ciphertext.
- Random Perturbation: The random matrices S and P “perturb” the Goppa code, making it appear as a random, general linear code further increasing the difficulty for an attacker.
- Resistance to Quantum Attacks: While quantum computers can solve some NP-hard problems there are no known efficient quantum algorithms that can break the McEliece cryptosystem. Therefore it is considered quantum resistant.
Now we have explored the Quantum Safe Cryptographic Approaches let’s dive deep into the NIST selected Algorithms & try to understand their working principles mathematically.
CRYSTALS-Kyber (Key Encapsulation Mechanism):
- Kyber is based on the Module Learning With Errors (MLWE) problem over rings. This involves operations with matrices and vectors of polynomials.
- The security parameters (matrix dimensions, polynomial coefficients) are crucial and must be chosen carefully to maintain adequate security margins.
- Kyber is known for its relatively efficient key generation, encapsulation and decapsulation processes. This makes it a practical choice for many applications.
- The use of polynomial rings and operations within them is a core part of Kyber’s design. This adds complexity compared to simple integer-based cryptography.
- The careful addition and management of “noise” (error polynomials) is essential for Kyber’s security. Improper noise distributions or magnitudes can weaken the system.
- Kyber was selected by NIST for standardization indicating its strong security and performance properties.
Concept :
- Imagine a scenario where you have a “noisy” system of linear equations but instead of numbers the coefficients and variables are polynomials.
- The secret key involves a set of these polynomial vectors.
- The public key is derived by multiplying these secret vectors with random polynomial matrices and adding “noise” (small error polynomials).
- Encryption involves using the public key to create another noisy system of polynomial equations.
- Decryption relies on the ability to “decode” the message by removing the noise which is computationally difficult without the secret key.
- It is very hard to recreate the original secret key from the public key because of the noise that is added.
Example (Modulo 5 Polynomials)
(Simplified example for understanding purpose)
-
Polynomial Ring:
- Coefficients:
{0, 1, 2, 3, 4}
- Example Polynomials:
2x + 1, 3x² + 4x + 2
- Coefficients:
-
Secret Key (s):
- s =
[x + 2, 3x + 1]
- s =
-
Public Key Generation:
- Random Matrix (A): A =
[[2x, x + 1], [4, 3x]]
- Noise Vector (e):
e = [1, 2x]
- Public Key (b):
b = A \* s + e
- b =
[[2x, x + 1], [4, 3x]] \* [x + 2, 3x + 1] + [1, 2x]
- b =
[4x² + 2x + 1, 2x² + 3x + 2]
(simplified result)
- Random Matrix (A): A =
-
Encryption (Simplified):
- Message (m):
m = x
- Random Vector (r):
r = [1, x]
- u = AT * r
- u =
[[2x, 4], [x+1, 3x]] \* [1, x]
- u =
[2x+4x, x+1+3x²]
- u =
[4x+2x, 3x²+x+1]
- v = bT * r + m
- v =
[4x² + 2x + 1, 2x² + 3x + 2] \* [1, x] + x
- v =
4x²+2x+1 + x(2x³+3x²+2x) + x
- v =
4x²+2x+1 + 2x³+3x²+2x + x
- v =
2x³+7x²+5x+1
- v =
2x³+2x²+1 (modulo 5)
- Ciphertext:
(u, v) = ([4x+2x, 3x²+x+1], 2x³+2x²+1)
- Message (m):
-
Decryption:
- We know:
v = b<sup>T</sup> \* r + m, and b = A \* s + e.
- Therefore:
v = (A \* s + e)<sup>T</sup> \* r + m
- v = (sT * AT + eT) * r + m
- v = sT * u + eT * r + m
- To recover m, compute: m = v - sT * u - eT * r
- m = (2x³+2x²+1) - [x+2, 3x+1] * [4x+2x, 3x²+x+1] - [1, 2x] * [1, x]
- We know:
By performing polynomial multiplications and subtractions (modulo 5) the goal is to cancel the noise (eT * r) and retrieve the original message (m). The “noise” (e) is crucial. It makes it difficult to recover the secret key (s) from the public key (b). The operations are performed in a polynomial ring which adds complexity.
Notes
- This example uses tiny parameters and modulo 5 (for understanding purpose).
- It employs simplified polynomial math to show the core idea.
- It uses basic noise vectors and encryption/decryption (not cryptographically sound).
- This example only shows the very basic idea of how MLWE is used.
Key Math Concepts
- Lattice theory
- Polynomial rings
- Module theory
CRYSTALS-Dilithium (Digital Signature Algorithm)**
- Dilithium provides digital signatures based on the Module-Short-Integer-Solution (MSIS) problem another lattice-based problem.This offers strong authentication capabilities in a post-quantum environment.
- The security of Dilithium rests on the assumption that finding short vectors in certain lattices is computationally difficult.
- Dilithium is designed to be efficient for signature generation and verification making it suitable for various applications.
- Understanding the MSIS problem and the underlying lattice structures is essential for evaluating Dilithium’s security.
- Dilithium relies on cryptographic hash functions for message integrity and randomness. The choice of hash function is crucial for overall security.
- Dilithium was also selected by NIST for standardization confirming its robustness and suitability for widespread use.
Concept
- Imagine a high-dimensional grid (lattice).
- Secret key: “short” vectors within this lattice.
- Public key: derived from the secret vectors.
- Signing: finding a new short vector related to the hashed message.
- Verification: checking if the signature vector is short and consistent with the public key and message.
Example
(Simplified example for understanding purpose)
-
Vectors and matrices of small integers modulo a small prime.
-
Secret Key:
s1 = [1, -1]
s2 = [0, 2]
-
Public Key:
- Random matrix
A = [[3, 1], [2, 4]]
. - Public key
t = A * s1 + s2 = [[3, 1], [2, 4]] * [1, -1] + [0, 2] = [2, 0]
.
- Random matrix
-
Signing (Very Simplified):
- Hashed message leads to
y = [1, 1]
. - Find short vector
z
such thatz * A
is close toy
. - Random vector
r = [1, 0]
. z = r + s1 = [2, -1]
. (Signature)
- Hashed message leads to
-
Verification (Very Simplified):
z * A = [2, -1] * [[3, 1], [2, 4]] = [4, -2]
.- Check if
[4, -2]
is related to the message and public key.
Notes
- This example uses tiny vectors and small matrices (for understanding purpose).
- It employs basic integer math to show the MSIS concept.
- It uses simplified “short” vectors and a basic signing/verification process (not cryptographically sound).
- This example only shows the very basic idea of how lattice-based signatures work.
Key Math Concepts
- Lattice theory
- Linear algebra
- Hash functions
- Modular Arithmetic.
- Norms.
These algorithms are based on mathematical problems believed to be resistant to quantum attacks, ensuring long-term security in a post-quantum world
SPHINCS+ (Hash-Based Signature Scheme)
- SPHINCS+ is unique in that it relies solely on the security of cryptographic hash functions. This makes it resistant to quantum attacks without depending on number-theoretic assumptions.
- It’s a stateless signature scheme meaning it doesn’t require maintaining internal state between signature generations. This simplifies implementation and reduces the risk of security vulnerabilities related to state management.
- SPHINCS+ uses Merkle trees to efficiently compress and verify signatures. Understanding how Merkle trees work is crucial for understanding the scheme’s operation.
- The security of SPHINCS+ is directly tied to the strength of the underlying hash function. It’s designed to be flexible and can be instantiated with different hash functions (e.g., SHAKE256).
- SPHINCS+ provides forward security meaning that even if a secret key is compromised previously generated signatures remain valid.
- Signature generation can be computationally expensive particularly for large messages. Verification is relatively efficient.
- SPHINCS+ was selected by NIST for standardization highlighting its robustness and security properties.
Concept
- Tree-like structure with hash values at each node (Merkle tree).
- Secret key: initial random values.
- Public key: root of the hash tree.
- Signing: revealing branches of the hash tree for verification.
- Security: relies on one-wayness and collision resistance of hash functions.
Example
-
Let’s use a very simple (and insecure) hash function for understanding purpose:
H(x) = x^2 mod 10
. -
Secret Key:
- Initial values:
S1 = 3
,S2 = 5
.
- Initial values:
-
Public Key:
- Build a simplified Merkle tree:
Node1 = H(S1) = 9
Node2 = H(S2) = 5
Root (Public Key) = H(Node1 + Node2) = H(14) = 4
- Build a simplified Merkle tree:
-
Signing (Very Simplified):
- To sign a message reveal parts of the path to the root.
- Let’s say the signing process needs to reveal
S1
. The signature will containS1
and any other needed information to verify the path to the root. - Signature =
(3, Node2)
-
Verification (Very Simplified):
- Given the signature
(3, 5)
and the public key(4)
, verify: H(3) = 9
H(5) = 5
H(9 + 5) = H(14) = 4
(Matches the public key).
- Given the signature
Key Math Concepts
- Cryptographic hash functions (one-way, collision-resistant)
- Merkle trees (for efficient verification)
- One-way functions (essential for security)
Notes
- Real SPHINCS+ uses cryptographically secure hash functions (e.g., SHAKE256).
- It employs complex Merkle tree structures for security.
- It uses techniques to prevent key reuse and provide forward security.
- This example only shows the very basic idea of how hash chains are used.
Mathematical Comparison: NIST Quantum-Safe vs. Traditional Cryptographic Algorithms
To understand the impact of post-quantum cryptography (PQC), we can compare NIST-selected quantum-safe algorithms against traditional cryptographic methods based on key factors. This includes key size, which affects storage and transmission efficiency, signature size and efficiency, which influence authentication performance, computational cost, determining encryption and decryption speed, and security level, measuring resistance against both classical and quantum attacks. Below, we break down these aspects to highlight the differences and advantages of quantum-safe cryptographic algorithms.
1. Key Size Comparison
Key size determines how difficult it is to break an encryption scheme. Classical algorithms rely on the difficulty of factoring large numbers or discrete logarithm problems which quantum algorithms like Shor’s can break efficiently.
Algorithm | Key Size (bytes) |
---|---|
RSA-3072 | 384 |
ECC P-256 | 32 |
X25519 (ECDH) | 32 |
AES-256 | 32 |
CRYSTALS-Kyber-512 | 800 |
CRYSTALS-Kyber-768 | 1,184 |
CRYSTALS-Kyber-1024 | 1,568 |
- Kyber (NIST PQC standard) requires significantly larger key sizes than RSA/ECC but remains efficient due to lattice-based optimizations.
- Kyber-512 (~800 bytes) is considered equivalent to RSA-3072 (~384 bytes) in security but offers post-quantum resilience.
2. Signature Size & Efficiency
Digital signatures are crucial for authentication. Quantum-safe signatures are generally larger than traditional ones but offer better security.
Algorithm | Public Key (bytes) | Signature (bytes) |
---|---|---|
ECDSA P-256 | 64 | 64 |
RSA-3072 | 384 | 384 |
CRYSTALS-Dilithium-5 | 2,528 | 4,595 |
SPHINCS+-256s | 2,128 | 29,000 |
- Dilithium provides strong post-quantum security with moderate key and signature sizes.
- SPHINCS+ has a very large signature size (up to 29 KB) but offers strong security using hash-based cryptography.
3. Computational Cost (Encryption & Decryption Complexity)
Let’s compare the time complexity of encryption and decryption operations.
Algorithm | Encryption Complexity | Decryption Complexity |
---|---|---|
RSA-3072 | 𝑂(𝑛³) | 𝑂(𝑛³) |
ECC P-256 | 𝑂(𝑛²) | 𝑂(𝑛²) |
Kyber-512 | 𝑂(𝑛 log 𝑛) | 𝑂(𝑛 log 𝑛) |
Dilithium-2 | 𝑂(𝑛²) | 𝑂(𝑛²) |
SPHINCS+ | 𝑂(𝑛² log 𝑛) | 𝑂(𝑛² log 𝑛) |
- Kyber has significantly better performance than RSA due to its lattice-based optimizations (𝑂(𝑛 log 𝑛)).
- Dilithium is more efficient than RSA but slower than ECC.
- SPHINCS+ is slower than both due to its hash-tree structure.
4. Security Level Against Quantum Attacks
Let’s evaluate how traditional cryptographic security degrades under Shor’s Algorithm.
Algorithm | Security Against Classical Attacks (bits) | Security Against Quantum Attacks (bits) |
---|---|---|
RSA-2048 | 112 | 0 (Shor’s Algorithm Breaks It) |
ECC P-256 | 128 | 0 (Shor’s Algorithm Breaks It) |
Kyber-512 | 128 | 128 |
Kyber-768 | 192 | 192 |
Kyber-1024 | 256 | 256 |
Dilithium-2 | 128 | 128 |
SPHINCS+ | 128 | 128 |
- RSA and ECC drop to 0-bit security against quantum attacks making them completely insecure.
- Kyber, Dilithium and SPHINCS+ maintain their security levels as they are designed to resist quantum threats.
- SPHINCS+ uses hash-based cryptography which remains secure even against quantum attacks.
5. Computational Effort to Break Cryptographic Algorithms
Breaking encryption relies on the number of operations required to solve the underlying mathematical problems. Classical cryptography is based on integer factorization (RSA), discrete logarithms (ECC), and hash functions. Quantum computers particularly Shor’s algorithm significantly reduce the time required for factorization and logarithm-based schemes.
Classical vs. Quantum Attack Complexity
Algorithm | Security Basis | Classical Attack Complexity | Quantum Attack Complexity (Shor’s) |
---|---|---|---|
RSA-2048 | Integer Factorization | ( O(2^{112}) ) (General Number Field Sieve) | ( O(n^3) ) (~8,000 Qubits needed) |
ECC P-256 | Discrete Logarithm | ( O(2^{128}) ) (Pollard’s Rho) | ( O(n^3) ) (~2,500 Qubits needed) |
Kyber-512 | Lattice-Based (LWE) | ( O(2^{128}) ) | ( O(2^{128}) ) (Quantum advantage negligible) |
Kyber-768 | LWE | ( O(2^{192}) ) | ( O(2^{192}) ) (Quantum advantage negligible) |
Kyber-1024 | LWE | ( O(2^{256}) ) | ( O(2^{256}) ) (Quantum advantage negligible) |
Dilithium-2 | LWE | ( O(2^{128}) ) | ( O(2^{128}) ) (Quantum advantage negligible) |
SPHINCS+ | Hash-Based (XMSS) | ( O(2^{128}) ) | ( O(2^{128}) ) (Quantum advantage negligible) |
- RSA-2048 and ECC P-256 are completely broken by Shor’s algorithm with a sufficiently powerful quantum computer.
- Kyber and Dilithium remain quantum-resistant because lattice-based problems are currently not known to be efficiently solvable by quantum algorithms.
- SPHINCS+ is based on hash functions, which remain resistant to quantum attacks but it has higher computational cost compared to lattice-based schemes.
6. Simulation of Computational Effort
To demonstrate how much effort it would take to break these cryptographic schemes let’s compare their estimated decryption times on different types of computing models.
Time to Break Encryption Using Supercomputers vs. Quantum Computers
Algorithm | Operations Required (Classical) | Time to Break on a Supercomputer (~10¹⁸ ops/sec) | Time to Break with a 1M Qubit Quantum Computer |
---|---|---|---|
RSA-2048 | ( 2^{112} ) (~5 × 10³³ ops) | ~1 billion years | ~10 seconds |
ECC P-256 | ( 2^{128} ) (~3 × 10³⁸ ops) | ~10 trillion years | ~30 seconds |
Kyber-512 | ( 2^{128} ) (~3 × 10³⁸ ops) | ~10 trillion years | ~10 trillion years (not broken) |
Kyber-768 | ( 2^{192} ) (~6 × 10⁵⁷ ops) | ~10²⁸ years | ~10²⁸ years (not broken) |
Kyber-1024 | ( 2^{256} ) (~1 × 10⁷⁷ ops) | ~10⁴⁵ years | ~10⁴⁵ years (not broken) |
SPHINCS+ | ( 2^{128} ) (~3 × 10³⁸ ops) | ~10 trillion years | ~10 trillion years (not broken) |
- Breaking RSA-2048 on a classical supercomputer takes about a billion years, while a 1M-qubit quantum computer can do it in seconds.
- ECC P-256 is similarly vulnerable.
- Kyber and Dilithium remain secure because their security relies on lattice-based problems, which remain resistant to quantum speedup.
- SPHINCS+ remains secure due to its hash-based structure, but its verification time is slower than lattice-based alternatives.
7. Energy Cost of Breaking Cryptography
Breaking cryptographic systems isn’t just about time it also requires vast amounts of energy.Let’s estimate the energy cost of breaking encryption using today’s most advanced supercomputers and potential future quantum computers.
Energy Consumption Estimates (in Megawatt-Hours)
Algorithm | Classical Computing Energy Cost (ExaFlop Supercomputer) | Quantum Computing Energy Cost (Assuming 1M-Qubit Machine) |
---|---|---|
RSA-2048 | ~500 Terawatt-hours (TWh) | ~10 Megawatt-hours (MWh) |
ECC P-256 | ~1,000 Terawatt-hours (TWh) | ~50 Megawatt-hours (MWh) |
Kyber-512 | ~1,000 Terawatt-hours (TWh) | ~1,000 Terawatt-hours (TWh) |
Kyber-768 | ~10⁵ TWh | ~10⁵ TWh |
Kyber-1024 | ~10⁷ TWh | ~10⁷ TWh |
SPHINCS+ | ~1,000 Terawatt-hours (TWh) | ~1,000 Terawatt-hours (TWh) |
- RSA and ECC are highly vulnerable because quantum computers require millions of times less energy to break them than classical supercomputers.
- Kyber, Dilithium, and SPHINCS+ remain impractical to break, even with quantum speedups, because their security levels remain high.
8. Summary of Computational and Energy Effort
Algorithm | Classical Security | Quantum Security | Time to Break (Quantum) | Energy to Break (Quantum) |
---|---|---|---|---|
RSA-2048 | 112-bit | 0-bit (Broken) | ~10 seconds | ~10 MWh |
ECC P-256 | 128-bit | 0-bit (Broken) | ~30 seconds | ~50 MWh |
Kyber-512 | 128-bit | 128-bit | 10 trillion years | ~10⁵ TWh |
Kyber-768 | 192-bit | 192-bit | 10²⁸ years | ~10⁷ TWh |
Kyber-1024 | 256-bit | 256-bit | 10⁴⁵ years | ~10¹⁰ TWh |
SPHINCS+ | 128-bit | 128-bit | 10 trillion years | ~10⁵ TWh |
Final Takeaways
- Quantum computers completely break RSA and ECC encryption within seconds.
- Kyber, Dilithium, and SPHINCS+ remain highly secure, even against quantum attacks.
- The computational cost and energy needed to break post-quantum cryptography (PQC) make them infeasible to attack, ensuring long-term security.
- This analysis highlights why governments and enterprises are transitioning to PQC to secure data against future threats.
Conclusion
The dawn of quantum computing casts a long shadow over our current cryptographic infrastructure. As we’ve explored traditional algorithms like RSA and ECC cornerstones of modern security face imminent vulnerability. The NIST’s selection of CRYSTALS-Kyber CRYSTALS-Dilithium and SPHINCS+ marks a pivotal shift towards quantum-resistant solutions paving the way for a secure digital future.
These new algorithms while offering robust protection against quantum threats present their own set of challenges. Larger key and signature sizes and varying computational costs require careful consideration and optimization. The transition to PQC is not merely a matter of swapping algorithms.It necessitates a comprehensive overhaul of existing systems, protocols and standards.
Citations
https://csrc.nist.gov/News/2024/postquantum-cryptography-fips-approved
https://en.wikipedia.org/wiki/Post-quantum_cryptography
https://pq-crystals.org/kyber/
https://pq-crystals.org/dilithium/
https://www.redhat.com/en/blog/post-quantum-cryptography-lattice-based-cryptography
https://www.redhat.com/en/blog/post-quantum-cryptography-hash-based-signatures
https://www.redhat.com/en/blog/post-quantum-cryptography-code-based-cryptography
Some of the Mathematical computation examples in this blog post are written with the help of AI.
Image Courtesy : Generated using AI (Adobe Firefly)