LowEndBox - Cheap VPS, Hosting and Dedicated Server Deals

The Post-Quantum Era Begins in 2029

Qubit years, the “post quantum era” has been like fusion power: always 10 years in the future.

But now the timeline seems to be closing in.  A recent post by a cryptography engineer and a statement by CloudFlare indicated that cryptography systems could be vulnerable as soon as 2029.

Superwhat?

For those who are unfamiliar, in the classical computing model that we’ve all been using for decades, information is stored as bits that are either 0 or 1, like a row of tidy little light switches. A quantum computer, though, uses qubits, which can be 0, 1, or a weird in-between state called a superposition where it’s effectively both at once until you measure it. On top of that, qubits can be entangled, meaning the state of one instantly relates to another no matter the distance.

No, I don’t completely understand how it all works.  Maybe you took more physics than I did.  But the main point is that it opens up all kinds of different ways to attack problems.  It’s still extremely finicky at the moment.  Scaling up to large numbers of qubits – which is where you can do things that clasiccal computing can’t – has proving challenging.  Don’t expect to buy a quantum computing laptop any time soon.  But scientists are making steady progress.

Why It Matters

One of the big implications for quantum computing is that, with enough qubits, you can factor large numbers effortlessly.  This has huge implications for cryptography.  The mathematics that underlines most of modern computing is based on public key encryption, which is based on prime numbers.

In public key encryption, you take two very large prime numbers (p and q) and multiply them together (to give n).  n here is easy to compute, but extraordinarily hard to reverse.  The world is given n as part of a public key, while p and q are kept secret. Because factoring n back into us is computationally infeasible for sufficiently large values, a user can safely encrypt a message using the public key derived from n, knowing that only someone who secretly knows p or q can efficiently compute the private key and reverse the process. In essence, this is a one-way trapdoor: easy to combine, practically impossible to separate, and that asymmetry is what allows secure communication between strangers.

But what if it was trivial to factor very large prime numbers?  Then the whole system collapses.

Post-Quantum Computing

For some years, work has been underway to move to post-quantum systems, which make avert this problem by using different underlying mathematics.  Indeed, OpenSSH will now give a warning if you connect to a server using a quantum-vulnerable system:

WARNING: connection is not using a post‑quantum key exchange algorithm. This session may be vulnerable to “store now, decrypt later” attacks. The server may need to be upgraded. See https://www.openssh.org/pq.html

OK, so we’re all moving to post-quantum systems, so problem averted, right?

Not quite.

The danger is in what’s called “store now, decrypt later”.  If you have large quantities of storage (say, in a massive datacenter in Utah), you can store tons of encrypted traffic that flies by on the network.  Then at some point in the future – say, 2029 – you can decrypt it all.

Sure, a lot of it will be useless.  An authorization token that expired 10 years ago doesn’t do anyone any good.  But a PGP-encrypted message?  Could be interesting.  After all, one of the biggest cryptography stories of the 20th century yielded actionable intelligence for 40 years after transmission.

So What Should You Do?

That PGP-encrypted email you sent in 2010 is probably a lost cause.  As the government will probably be able to soon learn about that RealDoll you ordered online in 2015.

But you should be using exclusively using post-quantum crytpography where you can.  The good news is that OpenSSH is ready.  The bad news is that your web browser is not.  When you login to Amazon, check social media, or move money at your bank, you’re not using post-quantum systems.  You’re still safe against hackers – for now – and work is being done to implement PQC.  But it’s going to take some time.

In fact, current estimates for a complete switchover to PQC are “late 2020s”.  Which sounds like 2029.

Welcome to the race for privacy.

No Comments

    Leave a Reply

    Some notes on commenting on LowEndBox:

    • Do not use LowEndBox for support issues. Go to your hosting provider and issue a ticket there. Coming here saying "my VPS is down, what do I do?!" will only have your comments removed.
    • Akismet is used for spam detection. Some comments may be held temporarily for manual approval.
    • Use <pre>...</pre> to quote the output from your terminal/console, or consider using a pastebin service.

    Your email address will not be published. Required fields are marked *