*More and more often, we hear rather dramatic and movie-like statements about how the quantum era will change many aspects of our life, among which also cryptography and, therefore, security. It often feels like we are about to be thrown in a sci-fi movie in which we will live an extremely high-tech life, surrounded by super intelligent machines and ultra-powerful computers. At the same time, it feels like we have been at the edge of this “brave” new world for quite a bit of time, but never really in it; as if it was just a matter of time – even though we cannot really say how long – before we have to change our perspective on things, get used to different capabilities and the consequences of new and unexpected technological developments. We are definitely starting to ask ourselves how close this future is and how disruptive the consequences of enhanced computational capabilities will be. The world of the future, this high-tech scenario, will of course be influenced and shaped not only by the quantum revolution: many other new and emerging technologies will also play a substantial role, from artificial intelligence to virtual reality. However, if or when quantum computers will become part of our everyday life, the way we do certain things will indeed change. For example, some of the ways in which we secure our communications and data – some of the currently used cryptographic methods – will be broken, putting at risk not just the security of the data of the future, but also the information we encrypt today and we want to remain secret for the next years.*

*In this episode, we will ask our experts in cryptography, Guglielmo Morgari and Edoardo Signorini, to discuss with us the issues faced by current cryptographic schemes with the advent of the quantum revolution. We will try to peek at the future of the security of communications and data. Actually, we will try to understand if, or rather why, that future is already here.*

**Edoardo, Guglielmo, thank you very much for joining us
in this conversation today. It is past the time we wrap our heads around how
new frontiers in quantum computing might affect current cryptographic methods
and practices. Needless to say, the topic of quantum is spreading and a quantum
revolution is definitely on its way in research labs around the world: from
quantum physics to quantum computers to tv series to video games, the topic of
“quantum” is often cited in an ever-increasing set of different scenarios,
taking the perspective of a quantum era a lot closer to our everyday life. **

**After decades of heavy slog and little success,
quantum computing is suddenly buzzing with increasing excitement and,
complementary, with more and more worries. On the one side, quantum computers
will open the door to a variety of fascinating applications: they may be useful
to run complex virtual experiments, to model quantum systems or chemical
reactions, to search huge amount of data, and to read secret messages
communicated over the internet using the current technologies. Needless to say,
the latter is a problem in many ways: voices are quickly raising saying that
current encryption techniques will become useless once quantum computers will
be out there in our world. At the same time, there still seems to be quite a
bit of confusion among the general public regarding the extent to which current
cryptographic methods will become useless, why that is the case, to what extent
we should start worrying about it, and what the cryptographic community is
doing about it. But before we start with the “heavy” stuff, we have a first
very general question for you. In approaching the issues that quantum computers
pose for cryptography and considering that we are definitely not experts in the
field, where would you start from? **

First of all, thank you for having us here. You are right: it is undoubtfully very important to discuss the issues raised by the development of quantum computers for currently used cryptographic techniques to shed some light on the extent to which current encryption will became useless, which algorithms will be broken, what scenarios will become problematic, and what the cryptographic research community is doing about these issues. And it is important to discuss these issues not just within the cryptographic scientific community. As it is for many other fields of research, being able to communicate outside your own inner circle in a way that is compatible and suitable for laypeople, is fundamental to build awareness and to get the correct message through.

So, where to start? To answer at least some of the most common questions about what happens at the intersection of quantum computers and cryptography, we might want to build the way up to the solutions that are being developed starting from the outline of where the problems come from. You might have already heard of quantum and post quantum cryptography: the two branches of cryptographic research that are actively trying to develop innovative solutions. The first builds on the principles of quantum physics and is moving towards solutions such as Quantum Key Distribution systems; the latter focuses on new mathematical solutions to define quantum-resistant cryptographic schemes. In order to understand the kind of solutions that the two branches offer, we ought to dive a little deeper into the problems they are out to solve.

That said, post-quantum and quantum cryptography are quite hard to explain without a little bit of background. One of the most complicated things when approaching quantum and post-quantum cryptography is that, in order to give even a schematic outline of the issues and theories, we need to deal with a variety of different notions and perspectives: from quantum mechanics all the way to quantum computers to quantum cryptography, the same principles and concepts give rise to very different applications and fields of research, definitely “entangled” but not equivalent. We will try to take you to the core of the problems first, and then to the different kinds of solutions.

For the sake of clarity, allow us one initial disclaimer: we mentioned the two main areas of research where people are currently working on possible answers to the problems we will be raising shortly. As our goal here is to start from identifying the issues that current cryptographic schemes will face with the advent of quantum computers, and since this line of discussion will mostly lead us down a path focused on the mathematical aspects of cryptography, we will initially draw concepts mostly from the subfield of post-quantum cryptography. We are pointing this out here so that, throughout our discussion, we do not forget that the other branch, quantum cryptography, is as active and as important.

**Thank you for this introduction. It is good to have a
sense of direction, especially given how complicated and multifaceted the topic
of quantum is. Coming from a non-technical background, we more than often have
a hard time getting some things straight. Hence, before we dive into all the
possible issues that cryptography will have to deal with, we wanted to ask you
if you could give us a brief introduction on what quantum computers are. So,
next question: where do quantum computers come from and what makes them so
different from classical computers? **

Let’s start from the very beginning: to understand
what a quantum computer is, it might be useful to briefly introduce the notion
of *quantum* in the first place. Quantum mechanics, or quantum physics, is
the science dealing with the behavior of matter and light at the submicroscopic
level, hence on the atomic and subatomic scale, where the laws of classical
mechanics do not allow us to describe the wacky behavior of photons, electrons
and other particles. The behavior of these particles is very different from
what we are used to experience and observe in our everyday life, making it hard
to properly describe it with classical methods. For example, a first issue
arises when we try to measure these physical entities. How can we do that? Here
is where the notion of quantum comes handy. We can define a quantum as the
minimum amount or unit of such a physical entity, the magnitude of which can
take on only discrete values consisting of integer multiples of one quantum. Easy,
right? Well, there is more. A quantum is
not something we can directly experience; hence, it becomes even more complicated
to give a simple explanation of it. An example might help us. Think about light:
the photon is the quantum of light and it determines the energy that can be
carried by light as a function of its wavelength. As we will see, one of the
interesting aspects of the quantum are its properties. We are not telling you
this to bore you, but because having a general take on some of the core
principles underlying quantum physics can be very helpful when we move on to
more crypto-related issues later on, as for example what a qubit or Quantum Key
Distribution are and how they work.

So, why are these theoretical notions of any interest to us? Because technology is now becoming better and better at skillfully manipulating quantum phenomena, leading the way to applications that have quite a magical taste, such as the quantum computer. Even though, in many ways, fully-developed quantum computers are still a matter of research and intense debates, the concept behind quantum computers was put forward already in the 80s, when Feynman and Deutsch, pioneers in the field of quantum physics, realized that, in order to study quantum phenomena, it would have been useful and advantageous to simulate them. Now think about this: in a classical computer, information is codified in bits. Each bit is a single piece of information that can exist in two states – either 1 or 0. Hence, information is stored and processed as a combination of 0s and 1s in a sequential way, essentially doing things one after the other. This principle underlying classical computing enables our machines to do amazing things and to be very fast, but they are still bounded to the structure of the bits. This becomes quite problematic when we want to simulate phenomena that respond to quite a different logic, such as quantum phenomena. Hence, the original idea was to come up with a more efficient way to simulate quantum phenomena, a way that could be closer to the logics of quantum physics and that essentially implicated to rethink the very principles underlying the processing of information. This, roughly speaking, was the offspring of the concept behind the quantum computer, which, however, remained just a concept for quite a while, mostly considered an exercise in style or regarded as some sort of mythical creature.

**Sorry to interrupt you, but this last observation
sounds rather interesting. How can there be so much fuss about something that
was still recently considered as a mythical creature? How did we get where we
are at now? **

Well, on the one side, the quantum computer is still a mythical creature in the sense that we cannot go out and buy one, but, on the other side, quantum computer prototypes are definitely already here. We were saying before that the concept behind quantum computers rests on a different notion of information processing compared to the one implemented on classical computers – which, again, work with 0s and 1s. Not too long ago, starting from the principles of quantum physics, researchers developed what we could call a “new” bit: the quantum bit, or qubit. And here’s where the actual revolution is. The qubit is the basic unit of quantum information. Now, the difference with the classical bit is that quantum mechanics allows the qubit to be in a coherent superposition of state 1 and state 0 simultaneously: quantum properties are used to represent and structure data, and quantum mechanisms can be devised and built to perform operations with this data.

What does this mean in practice? If we ought to simplify a little, it means that computers using qubits can store way more information using less energy than classical computers. In principle, given that the qubit is not either in the 0 state or in the 1 state, but can assume infinitely many superposition of the two states, you could encode information of infinite length in it. This in principle. The problem is that a measurement or observation of a qubit would inevitably destroy its coherence and irrevocably disturb the superposition state. Nonetheless, it is clear that the concept behind information processing based on quantum physics is very different from the classical one and it allows to manage much more information at once. Instead of analyzing each unit of information sequentially, superposition in the qubits allows to process information in parallel. Therefore, for example, the time it takes to crunch data is significantly reduced.

This gives us a very general overview on what quantum computers are and on the principles on which they operate. Besides the interest for quantum computing and quantum computers from the technical point of view, the importance of quantum computers lies in what they can do and, consequently, in what they will allow us to do. There will be tasks in which quantum computers might not have a real advantage over classical computers and, hence, little will change; other tasks will become much faster; and other tasks that were impossible before will become possible thanks to quantum-enabled computations. Especially this last aspect, i.e. that quantum computers will turn some of the impossible problems possible, is what is raising a well-justified fuss.

**Qubits that store great amount of information, greatly
enhanced computational power that will open to new frontiers and applications,
unsolvable problems that all of a sudden become solvable, seem to be some of the
key features of the new quantum era. As you can imagine, this last aspect –
unsolvable problems that become solvable – is extremely fascinating and triggers
everyone’s imagination. What you often read in blogs or similar sources is that
quantum computers will be able to solve problems that are impossible or would
take a traditional computer an impractical amount of time – like several times
the age of the entire universe – to solve. Well, besides the indisputable
enchantment of unsolvable problems becoming solvable, we would like to dive a
little deeper in what this means and what the practical consequences would be
in our everyday life. But before we go down that road, we still have an open
question about the state of the art of quantum computers. **

**If we are getting it right, quantum computers, or at
least quantum computers that can solve currently unsolvable problems, are yet
to come. Can you tell us something about where we are at now in terms of
actually producing a quantum computer? Provocatively, when will we be able to
buy one?**

This might not be an easy question to answer, because the answer depends on how exactly we pose the question and, if we ought to summarize a very general answer, much is still a matter of time, in many different ways. It depends on what we mean when we ask if quantum computers are already here: if, for example, we are referring to a possible quantum advantage or to the quantum supremacy. It also depends on whether we are referring to full-fledged, almost off-the-shelf quantum computers, which are definitely not here yet, or to prototypes that are much more than simple toys, and that are definitely already here.

On the one side, technologically advanced governments, like the United States or China, are considerably investing in quantum computers as they would give them substantial technological advantage. On the other side, Google, IBM and a handful of startups are racing to create the next generation of supercomputers and interesting results are already on the way. Big players in the ICT industry, like D-Wave, Google, IBM, Microsoft, all have their prototype of quantum computer. We are definitely witnessing a rapid acceleration in both research and delivered results. For example, IBM has made available online to everyone a quantum simulator by means of which it is possible to test quantum algorithms on your computer and it is also possible to run those algorithms in cloud on an IBM quantum computer to check and verify the results. There are also firms providing other interesting services related to quantum computing: for example, Atos provides simulators of different versions of quantum computers based on different physical models. You can use these simulators of quantum computers to compare how software and algorithms behave and perform on different models. Needless to say, all this is already incredible. So, in a first way, it is most probably just a matter of time before we develop an even more advanced version of a quantum computer.

On the other side, the question of whether we already
entered the quantum era or not depends on how we describe the quantum era in
the first place. Two common definitions are: we will reach quantum advantage when
a quantum device will solve a problem *faster* that a classical computer.
And this is one thing. Another thing is quantum supremacy: the goal of
demonstrating that a quantum device is able to solve a problem that classical
computers are not able to solve. There are many debates about this distinction and
about where research is positioned at the moment. Anyway, what are these
problems that classical computers cannot solve? What does it mean for classical
computers not to solve a given problem? What
we can say at a very general level is that if we gave enough time to a
classical computer it could actually solve any problem for which a solution
algorithm is known. The issue arises when the time we ought to give to a
classical computer is of hundreds of thousands of years or more. Definitely out
of the human time scale. This is, roughly speaking, what an “unsolvable”
problem is in this context: a problem for which there is yet no algorithm that
can solve it in a reasonable and useful time. So, if we simplify a little, quantum
computers will – thanks to greatly enhanced computational power – reduce the
time it takes to solve certain problems – the quantum advantage – and, in some
cases, will decrease the time it takes by so much that unsolvable problems will
become solvable – the quantum supremacy. In technical terms, quantum computers
might decrease the time it takes to solve hard mathematical problems from non-polynomial
to polynomial, making unsolvable problems solvable. Among these hard problems,
but we will get to it later, there are also those hard problems on which some
of the current cryptographic schemes are based.

Allow us just one quick note on this. As for now, it
does not seem we are yet at the stage of having reached the quantum supremacy
milestone. There was a recent quarrel between Google and IBM on this. In 2019,
Google published a paper on *Nature* in which they demonstrated that their
quantum processor was able to solve a very difficult problem – it was able to
recognize certain statistical regularities in random sequences – in something
like 200 seconds, whereas they claimed that the same calculation would have
taken IBM’s Summit, the world most powerful supercomputer, 10.000 years. IBM
pushed back on the claim saying that its machine could solve the problem in 2.5
days, hence setting a much higher threshold for quantum supremacy.

**Alright, we see what you mean by saying that it is a
matter of time in many different ways. We cannot yet buy a quantum computer, but
it might just be a matter of time. Similarly, it could be a matter of time
before we reach quantum supremacy. On the other side, quantum computers reduce
the time it takes to solve certain problems making them solvable. And even if
there are not here yet, it might be a matter of time before quantum computers
become powerful enough to actually solve these problems. Well, you made the
point very clear: it is not just about whether quantum computers already exist
or not – the answer might not be a clear yes or no – but it is about what
quantum computers can, cannot, or will be able to do on various levels in
various possible applications, one of which is cryptography. **

Yes, it is quite right. Allow us to add just a few observations: in the first place, if and when powerful enough quantum computers will be available, just some cryptographic schemes will be broken, and specifically those which are based on mathematical problems that are computationally hard and for which no efficient solution algorithm on classical computing systems is publicly known today. In the second place, a quantum computer is not just a computer that goes faster, even if – in general – we could say that quantum computers will be faster at solving certain tasks, but a computer that does things radically differently, building on the laws of quantum physics. Now think about this, and we will try to explain it better later: quantum algorithms that could in principle break current cryptographic schemes have been around for over 30 years now but, if you try to run them – with all required adjustments – on a classical computer, they would not really benefit you at all. On the contrary, these algorithms ran on quantum computers will be extremely effective and, with quantum computers becoming progressively less of a mythical creature, the search for cryptographic schemes that could resist quantum attacks has become almost a priority in the cryptographic community, especially after the NSA, in 2015, publicly announced that the time had come to start developing quantum-resistant schemes.

**Thank you so much for your comments on this. We should
now have a general understanding of what quantum computers are, what they will
be able to do, and where research is at right now. **

**Let’s turn to cryptography now. We have already
touched on some of the issues in our conversation so far, but it is time we
crack the books and dive into what happens at the intersection of quantum
computers and cryptography. First things first, some concepts you mentioned are
not so intuitive if you are not of the field: for example, we have briefly
encountered the notion of hard problem earlier in our discussion, but it is not
clear to us yet how they relate to cryptography in the first place. And maybe
even before that, what do you mean when you say that only some
cryptographic schemes will be broken? What kind of cryptographic schemes will
resist and what will be broken? Intuitively, drawing from what you told us
before, it seems that cryptographic methods based on hard mathematical problems
– those “unsolvable” problems that will become solvable with quantum computers –
are the ones that will be broken. Can you start from this to give us a better
idea of how the intersection between quantum computers and cryptography plays
out? **

It’s definitely a good idea to recall some basic distinctions among currently used cryptographic schemes before moving to if they will be broken when powerful enough quantum computers will be available. We will try to keep it simple, and maybe the easiest way to approach the distinction we are here interested in – that between symmetric and asymmetric cryptography – is by means of a quite effective metaphor: that of mail boxes.

Both symmetric and asymmetric cryptography allow us to communicate with another person in a secure way: if our encrypted message is intercepted, it cannot be read by an attacker or, more generally, an unauthorized third person. So, both schemes have the same goal but carry it out in different ways and are grounded on different mathematical solutions. Symmetric cryptography works more or less like this: imagine we both have the key to a lock and I want to send you a secret letter. What I will do is to simply put the letter in the mail box which is locked with our lock and we will both be able to open the box and read the letter. This translates quite straightforwardly in classic cryptography using a symmetric key, where the same key – the secret that is shared between the parties – is used for both encryption and decryption. This method is very efficient but it has one main problem: how do we exchange the key in a safe way? Even intuitively, if we both have the key to open a certain lock, we have had to exchange it in a way that is itself secure. This fact highly limits the possible application of symmetric cryptography. For example, if we had to meet somewhere to exchange the key, we can easily see how that would be impossible if you wanted to exchange a key to establish a secure communication to buy something online from an Australian vendor. In such case, we clearly want the information we share during the communication with the vendor to be secure, our credit card number for instance, but it is likely that we did not have the chance to exchange the secret key before. How can we solve the problem of exchanging the key in a secure way?

Public-key cryptography, also called asymmetric cryptography, allows us to exchange the secret key in a secure way. In principle, asymmetric cryptographic schemes would also work by themselves as a method to secure our communication; but, as they are generally slower than symmetric schemes, what we usually do is that we exchange the key by means of asymmetric schemes and then we use that key to communicate using symmetric encryption.

Here is how asymmetric cryptography works at a very general level: in asymmetric schemes, that were invented around the 70s, the receiver has two keys, a private and a public one. One of the main differences with symmetric schemes is that in public-key cryptography, the key that is used to encrypt is different from the one that is used to decrypt. Let us try to make it a little clearer with an example: I have a public and a private key; the public key is, of course, public, in the sense that whoever wants to send me a message can do it by using that key to encrypt it; but I am the only one who can decrypt those messages because I am the only one who has the private key corresponding to that public key. So, the public key is my mail box; whoever wants to send me a message can put it in my mail box; but I am the only one who can open it, because I am the only one who has the key. The mail box is the public key because I tell everyone who wants to send me a message to put it in there. The key to open the mail box and take the messages out is the private key, since I am the only one who has it.

Hence, as we were mentioning before, we can use this scheme to exchange the secret key, and then we can turn to symmetric encryption. We could simplify this concept by saying that we first share the key in a secure way by means of asymmetric cryptography; someone goes to your mail box and puts a key in it. A key of which he or she has a copy. Of course, we have also to make sure, in a nutshell, that the right person is putting the right key in the right mail box, so that we do not end up giving our secret key to the wrong person. Very broadly speaking, this is what authentication methods are for. Well, at this point, when I then go there and take the key out of the mail box, we can start communicating in a secure way using symmetric encryption.

Just a brief clarification: the metaphor of the mail box covers just one possible way in which we exchange the key – for instance, the one on which RSA is based. Other asymmetric cryptographic schemes use slightly different methods. Although just a partial explanation, the metaphor we introduced you to is nonetheless a good starting point to get somewhat comfortable with the principles behind asymmetric cryptography.

Now, back to the point, can you guess which one of the two kinds of cryptographic schemes will be broken by quantum computers?

**Well, actually we know an answer – but just in a very
dogmatic way – in the sense that it is known that asymmetric cryptography is
the one that will be broken. And what we mean when we say we know it in a very
dogmatic way is that we have no idea why that would be the case. But, if we
ought to make an educated guess, it might be here that hard mathematical
problems come into play.**

Correct, the answer is in the math. The math behind symmetric and asymmetric cryptography is quite different. Public-key cryptography is based on those computationally hard problems we were talking about before. We just skimmed over the notion, so let us go a little deeper into the definition. But we will first narrow our scope down to those computationally hard problems that are of interest for asymmetric cryptography. There are many other kinds of computationally hard problems, but discussing them all would take us far beyond our scope.

The
kind of hard problems on which asymmetric cryptography is based are those for
which is very hard to find a solution, but for which it is easy to verify that
a certain solution is correct. Now, if you think about it, this is also how
asymmetric cryptography works: it is easy to do an operation in one direction (putting
the letter in the mail box, verifying a given solution, encrypting a message),
but it is hard to do it in the other direction (opening the mail box, finding a
solution, decrypting a message). Asymmetric cryptography is based on this logic:
i.e. on the assumption that the *integer-factorization problem* and the *discrete-logarithm
problem* are hard to solve. As for the first, the integer-factorization
problem, if I give you two numbers and ask you to multiply them – let’s say,
521*547 – you might have to use pen and paper, but you will be able to come up
with the solution rather quickly – 284.987. But if I give you a number –let’s
say 746.789 – and I ask you to tell me which numbers, when multiplied, give you
that precise result, you will see that that calculation is not as easy as the
first. And the same applies to computers operating on very large numbers: if
you give a computer a number larger than 1024 bits, the computer is not able to
factorize it, or at least it is not able to do it in a reasonable amount of
time. This problem is at the basis of the RSA scheme. Similarly, the
discrete-logarithm problem, another problem that is easy to solve in one
direction and difficult in the other, is at the basis of elliptic curve
cryptography and of the Diffie-Hellman for key exchange.

The security of these cryptographic schemes is based on the assumption that the mathematical problems underlying them are hard to solve. But again, a hard problem of this kind is difficult not in the sense that it is by no means solvable – think about factorization, if you try all values up to the square root of your number you will eventually find the right ones; it is difficult in the sense that, for now, even if you had an algorithm that could solve them, it would take so long to find the solution that it would be out of scale with your needs. Technically speaking, the time to solve these problems is not-polynomial with regard to the size of the input. If you are an attacker and you want to break RSA with conventional existing algorithms, it would take you thousands of billions of years to actually break it. You can easily see how this kind of attack will essentially lead to nothing. The assumption according to which the integer-factorization and discrete-logarithm are hard to solve has proven to be reliable over recent decades, in case traditional computing systems are used.

But now that quantum computers are, or at least it is
possible they are, on their way, things are likely to change. You are just
about to ask us why. Well, quantum algorithms that could potentially break
asymmetric encryption schemes have been around for over 30 years now. As it was
– it is – not possible to run them on quantum computers, they remained marginalized
and underrated. But now that we might be closer to quantum computers than we think,
these algorithms are indeed becoming a problem.
Especially Schor’s algorithm, once quantum computers will be large
enough, will break currently used asymmetric cryptographic schemes as it will
reduce the time it takes to solve both the integer-factorization and the
discrete-logarithm problem from non-polynomial to polynomial, from hard to
easy. The result is that cryptographic schemes based on these once-hard
problems will be structurally broken and the exchanged key will be just
useless. For symmetric cryptography, the situation is slightly different as
Grover’s algorithm for quantum computers reduces the equivalent security of the
algorithm to half of the length of the key. An algorithm that has a key on 128
bits is expected to have a complexity of attack of 2^{128}. With Grover’s
algorithm on a quantum computer its complexity is expected be reduced to 2^{64}.
From a cryptographic point of view, this is in principle devastating, as it
means to have a security that is reduced from 128 bits to 64 bits, which makes
the attackmore than a trillion time faster than before. As dramatic
as it might sound, the solution is easy: we just double to original key, from
128 to 256 bits. And we are already implementing and adopting symmetric schemes
with keys of 256 bits, so we will be good on that side. The real issue is with
asymmetric cryptography.

**So, you are basically telling us that asymmetric
cryptographic schemes based on these hard problems will become breakable once
quantum computers will be large enough to implement quantum algorithms, such as
Schor’s algorithm, as it will dramatically reduce the time it takes to solve
such problems. But, at the current state of the art, asymmetric cryptography is
secure in the sense that, at the moment and as long as quantum computers are
what they are now, encryption schemes based on such problems can still keep our
information and communication secure. **

This is not exactly how you should think about it. Well, you are not inherently wrong, but there are some more considerations to make in order to have a more realistic view of the actual threats and the extent of the possible threats that would follow the implementation of larger quantum computers.

First of all, when dealing with security issues, on the one side, it is of course important to think about the issues of today; but, on the other side, it is even more important, and extremely more complicated, to think about the possible issues of tomorrow and to build the right security frameworks to always be ahead of time. If you wait for a threat to be in place before thinking about how to protect yourself from it, it is highly likely that you will not have the right solution at the right time. The time to build a dam is not when the flood wave is arriving. Ideally, we should be able to read the threat of a flood wave well in advance so to allow the time to build the dam and hence to prevent the catastrophic effects of a massive flood. And this is true for almost all issues related to threats: one of the most difficult jobs in security is to come up with ways of dealing with the unknown and the unexpected. But it becomes even more important when research in a given field takes time to come up with well-defined, and especially broadly accepted, results. Research in cryptography takes time: it takes time to develop and standardize quantum resistant asymmetric cryptographic schemes; it takes time for cryptoanalysis to corroborate possible solutions; it takes time for a certain quantum-resistant solution to be broadly implemented. When you have to build a dam to prevent a flood, you might have to study the landscape and adjust the construction of the dam accordingly. Well, in the case of cryptography, it is more like if you had a river that eventually will flood and you cannot simply build a dam: you must come up with a totally different way of containing the flood. So, as the level of water in the river increases – research in quantum computers is moving quickly – you should come up with a solution – quantum and post-quantum cryptography – well before the flood happens, to have the time to implement it and save your village from being wiped out. So, out of metaphor, we have to think that, in order to be ready by the time full-fledged quantum computers will be around and asymmetric schemes will be broken, we have to research solutions well ahead. As we were mentioning at the beginning, quantum and post-quantum cryptography are actively working towards possible solutions.

Especially research in post-quantum cryptography was recently boosted by an initiative of the National Institute of Standards and Technologies. We already mentioned it: in 2015, the NSA publicly announced that it was time to start thinking about quantum-resistant asymmetric schemes. In 2017, the NIST launched a call for proposals to develop and standardize post-quantum cryptographic schemes. We are now at the second round of this call, and it is unlikely that the NIST would close it within three years. Hence, the standardization of post-quantum cryptography might take longer than it might take quantum computers to be fully developed. Let’s suppose that quantum computers able to break current asymmetric encryption schemes will be ready in 10 years from now; well, it might take us longer than that to have a cryptographic solution that is – so to say – up and running by that time.

Why is this important? Why do we necessarily have to
be ahead of time, especially when it comes to developing cryptographic methods
that will resist quantum attacks? Well, on the one side, as we already said, it
takes time to do research and to come up with a reliable solution; and it also
takes time to broadly apply that solution. On the other side, besides being an
active and fascinating field of research, cryptography is a very practical
matter with applications that are different in different scenarios. So, if you
think about your private communications, as your private text messages, then in
that case, you do not really need to worry about quantum computers and quantum
attacks yet. But there are sensible data about individuals – let’s say,
information about your genetic code – that will still be the same in 30 years
and, as we will still be alive, will still be sensitive information that need
to remain protected. As that information is for now encrypted with asymmetric
cryptography, an attacker who will have a quantum computer, in 10, 20 or even
30 years, will be able to access that information. Now, you might argue that it
is unlikely that quantum computer will become widespread enough to be a problem
for individuals and their data. That is arguable as there is for sure someone
out there that is recording data and that one day may be interested in
decrypting them. But even if it turns out you are right and no one would use
quantum computers for these kinds of attacks, there are scenarios in which
quantum attacks will be extremely likely: for instance, quantum computers may
be used by state actors, or state-affiliated groups, to find out information
about another countries. Think about national secrets that need to remain
unintelligible for the next 10 years to say the least. Well, if we do not come
up with reliable solutions soon – post-quantum cryptographic schemes that will
resist quantum attacks – information that are encrypted using today’s schemes
may become readable in the near future. Ideally, we should be ready to
implement quantum-resistant cryptography, quantum and post-quantum solutions,
well before quantum computers become an actual threat to information and
communication. Chances are we might already be late. We might even push our
considerations a little bit further: actually, all the information that has
ever been encrypted using asymmetric cryptography will eventually be exposed
once quantum computers will be able to solve those unsolvable problem on which
asymmetric cryptography is based. This is even more problematic than the
scenarios we were discussing before, as we cannot really do much about the
information that has already been encrypted. However, what we can do is to
focus on finding and implementing quantum-resistant solutions to secure
information that is yet to be protected.
To conclude, as far as cryptography is concerned, it is not really a
question about *when* we will enter the quantum era – in the sense that full-fledged quantum
computers will be available and we will meet the quantum supremacy milestone –
but rather a matter of being ready to properly face quantum attacks considerably
before the quantum era actually begins, so to protect both the data that we
will generated from that time on as well as the data that we encrypt today and
for which protection needs to be guaranteed over the years or decades.

**Well, this definitely changes our perspective on
things in a way we never thought of before. On the one side, as it is often
argued, “the net never forgets”: the data that we are producing, sending over
the internet, and that is stored somewhere, may become available and be
disclosed well beyond what we are generally used to think of. Not even to
mention those segments of our society for which protection of data over
extended periods of time is crucial and a matter of national security. But, as
you were explaining us, the delicate aspect is that the longer we wait to
reshape our protections against quantum attacks, the more likely it is that our
data will be eventually exposed. It is not an easy concept to summarize, but it
seems like that, when it comes to understanding the challenges that the quantum
era poses to cryptography, the future is actually already here: the solutions
that will protect our data once quantum computers will be available are the
quest of today. We should not wait for current cryptographic schemes to be
broken to feel the urge to find a remedy. Quantum and post-quantum
cryptographic solutions need to be in place before the quantum era actually
begins. In the ****words**** of
Catherine Bessant, chief operation and technology officer at Bank of America,
“The risk of today is interesting, the risk of tomorrow is what is most
important”.**

**Once more, we want to thank Guglielmo and Edoardo for
the enlightening conversation and the precious comments on the challenges that
cryptography is facing with the advent of the quantum revolution. But that is
not all. In the upcoming episodes we will ask our experts about new methods in
quantum and post-quantum cryptography, diving deeper into how research is
shaping the present and the future of data and communication protection. **

## Recent Comments