Technology & Innovation

A quantum of security

October 11, 2015

Global

October 11, 2015

Global

The advent of quantum computing may put today’s cybersecurity infrastructure in jeopardy

Much of the information we value is kept safe by mathematics; extremely complex mathematics. Modern cryptography employs algorithms that require considerable computing resources to encrypt and decrypt data. Using conventional computers to crack this encryption could take tens or hundreds or even thousands of years using dedicated machinery to crack.

These cryptographic algorithms are at the heart of much modern commerce, securing everything from online purchases and bank transactions to phone calls and emails. They are encrypting signals from satellite and cable TV companies, handling Internet subscription services, and ensuring the integrity of critical services such as GPS. The security of all of this activity depends on the fact that it is prohibitively expensive and time-consuming to crack these cryptographic codes.

Enter the quantum computer. Unlike a conventional computer, in which a bit – the smallest component of memory – has two just two states (0 and 1), a quantum computer employs the phenomenon of quantum superposition, so that a qubit can be 0, 1, or a superposition of those states. A quantum computer solves problems by manipulating the contents of qubits, measuring the result, then collapsing the unobserved superposition into an answer.

Most quantum algorithms give an answer that is only probably correct, but they provide a short cut that can simplify many complex mathematical problems. Unfortunately, this includes the calculations on which the current generation of cryptographic systems is based.

The current generation of quantum computers can only handle a few qubits. But with companies such as Google investing heavily in quantum computing, and rumours of investment from intelligence agencies, it is reasonable to assume that today’s cryptographic algorithms will one day be outgunned.

The quantum computers of tomorrow would be able to crack conventional encryption with relative ease. They are likely to be too expensive for the average criminal trying to interfere with credit card transactions and the like, for the near future at least. But when it comes to more valuable digital assets, such as commercially sensitive intellectual property, businesses may need to consider the possibility of nation state actors using quantum computing to crack their encryption.

New cryptographic methods will therefore be needed, sooner or later. Various techniques, known collectively as “post quantum” cryptography, incorporate mathematical calculations that would tax future quantum computers, and some are already in widespread use.

Of course, quantum computing can be applied to strengthening information security, as well as breaking it. Perhaps the most radical approach would be to use the phenomenon of quantum entanglement, in which geographically distant particles share the same quantum state. Recent experiments have transmitted a small amount of data over a kilometer or so using quantum entanglement, instantaneously and without any physical connection. This could pave the way for data transmission that cannot be intercepted.

It is early days yet. But just as quantum physics has turned our understanding of the universe on its head, quantum computing could completely change the way we produce, store, and secure information. Given the extent to which information technology is now embedded into every walk of life, the consequences could be truly revolutionary.

Can we upgrade the world’s cyber security infrastructure in time to meet the challenges of quantum computing? Share your thoughts on the , sponsored by Dassault Systèmes.

 

The views and opinions expressed in this article are those of the authors and do not necessarily reflect the views of The Economist Intelligence Unit Limited (EIU) or any other member of The Economist Group. The Economist Group (including the EIU) cannot accept any responsibility or liability for reliance by any person on this article or any of the information, opinions or conclusions set out in the article.

Enjoy in-depth insights and expert analysis - subscribe to our Perspectives newsletter, delivered every week