Nobody has built a quantum computer much more powerful than a pocket calculator but that hasn’t stopped people worrying about the implications of the post-quantum computing world. Most worried are the people who rely on cryptographic codes to protect sensitive information. When the first decent-sized quantum computer is switched on, previously secure codes such as the commonly used RSA algorithm will become instantly breakable.
Which is why cryptographers are scurrying about looking for codes that will be secure in the post-quantum world. Today, Hang Dinh at the University of Connecticut and a couple of pals show that cryptographers have been staring at one all along. They say that a little-used code developed by the CalTech mathematician Robert McEliece in 1978 can resist all known attacks by quantum computers.
First, let’s a make a distinction between symmetric and asymmetric codes. Symmetric codes use identical keys for encrypting and decrypting a message. Quantum computers can dramatically speed up an attack against these kinds of codes. However, symmetric codes have some protection. Doubling the size of the key counteracts this speed up. So it is possible for code makers to stay ahead of the breakers, at least in theory. (Although in practice, the safe money would be on the predator in this cat and mouse game. )
Asymmetric codes use different keys for encrypting and decrypting messages. In so-called public key encryption systems such as the popular RSA algorithm, a public key is available to anyone who can use it to encrypt a message. But only those with a private key can decrypt the messages and this, of course, is kept secret.
The security of these systems relies on so-called trap door functions: mathematical steps that are easy to make in one direction but hard to do in the other. The most famous example is multiplication. It is easy to multiply two numbers together to get a third but hard to start with the third number and work out which two generated it, a process called factorisation.
But in 1994, the mathematician Peter Shor dreamt up a quantum algorithm that could factorise much faster than any classical counterpart. Such an algorithm running on a decent quantum computer could break all known public key encryption systems like a 4-year old running amok in Legoland.
Here’s a sense of how it works. The problem of factorisation is to find a number that divides exactly into another. Mathematicians do this using the idea of periodicity: a mathematical object with exactly the right periodicity should divide the number exactly, any others will not.
One way to study periodicity in the classical world is to use fourier analysis, which can break down a signal into its component waves. The quantum analogue to this is the quantum fourier sampling and Shor’s triumph was to find a way to use this idea to find the periodicity of the mathematical object that reveals the factors.
Thanks to Shor, any code that relies on this kind of asymmetry (ie almost all popular public key encryption systems) can be cracked using a quantum fourier attack.
The McEliese cryptosystem is different. It too is asymmetric but its security is based not on factorisation but on a version of a conundrum that mathematicians call the hidden supgroup problem. What Dinh and buddies have shown is that this problem cannot be solved using quantum fourier analysis. In other words it is immune to attack by Shor’s algorithm. In fact, it is immune to any attack based on quantum fourier sampling.
That’s a big deal. It means that anything encoded in this way will be safe when the next generation of quantum computers start chomping away at the more conventional public key cryptosystems. One such system is Entropy, a peer-to-peer communications network designed to resist censorship based on the McEliese cryptosystem.
But Entropy is little used and there are good reasons why others have resisted the McEliese encryption system. The main problem is that both the public and private keys are somewhat unwieldy: a standard public key is a large matrix described by no fewer than 2^19 bits.
That may seem less of a problem now. It’s possible that the McEleise system will suddenly become the focus of much more attention more than 30 years after its invention.
However, it’s worth pointing out that while the new work guanratees safety against all known quantum attacks, it does nothing of the sort for future quantum attacks. It’s perfectly possible that somebody will develop a quantum algorithm that will tear it apart as easily as Shor’s can with the RSA algorithm. “Our results do not rule out other quantum (or classical) attacks,” says Dinh and co.
So s more likely scenario for future research is that crytpographers will renew their efforts in one of the several other directions that are looking fruitful, such as lattice-based algorithms and multivariate cryptography.
Either way, expect to hear a lot more about post quantum cryptography–provided the powers that be allow.
Ref: arxiv.org/abs/1008.2390 : The McEliece Cryptosystem Resists Quantum Fourier Sampling Attacks
The dark secret behind those cute AI-generated animal images
Google Brain has revealed its own image-making AI, called Imagen. But don't expect to see anything that isn't wholesome.
Inside Charm Industrial’s big bet on corn stalks for carbon removal
The startup used plant matter and bio-oil to sequester thousands of tons of carbon. The question now is how reliable, scalable, and economical this approach will prove.
The hype around DeepMind’s new AI model misses what’s actually cool about it
Some worry that the chatter about these tools is doing the whole field a disservice.
How Charm Industrial hopes to use crops to cut steel emissions
The startup believes its bio-oil, once converted into syngas, could help clean up the dirtiest industrial sector.
Get the latest updates from
MIT Technology Review
Discover special offers, top stories, upcoming events, and more.