RAKSHA ANIRVEDA

Page 98

Raksha Anirveda

Security Futurism

Dark Side of Quantum Computers - A Lurking Threat to National Security

Armos uses Quantum Key Distribution (QKD) to provide unconditional protection to data while it is at its most vulnerable–in motion. Using the principles of quantum physics, Armos secures the distribution of symmetric encryption keys

Quantum computing has long promised the next major leap forward in computing power. However, there is a darker side of it having the potential to undermine the foundations of internet privacy and commerce By Sunil Gupta

C

100

ryptosystems are designed to cope with the worst case scenarios: an adversary with infinite computing resources can get access to plaintext/ ciphertext pairs (and thus could study the relationship between each pair) and knows the encryption and decryption algorithms; so can choose plaintext or ciphertext values at will. The only element not accessible to this adversary is the secret key; thus the security of a cryptosystem depends solely on the security of the key. This is a long-standing design philosophy first enunciated by Auguste Kerckhoff in 1883 which states: “The security of a cryptosystem must not depend on keeping secret the cryptoalgorithm. The security depends only on keeping secret the key.” Today’s encryption (secret) keys are highly vulnerable due to many reasons such as weak randomness, advances to CPU power, new attack strategies, emergence of new algorithms such as Shor’s, which when run on quantum computers

www.raksha-anirveda.com

will ultimately render much of today’s encryption unsafe. Some of the recent news and disclosures has shown the stark reality and the ugly face of data security. l Snowden disclosed in 2013 that Government Communications Headquarters (GCHQ), a British agency, has been copying 20 petabytes of data every day off optical fibers around the world under a secret project “Tempora” and had been giving the encrypted data to National Security Agency (NSA). l A Reuters report in 2013 mentioned that NSA paid $10 million to put its backdoor in RSA encryption such that, the

programme had a random number generator, but there were a number of fixed, constant numbers built into the algorithm that could function as a kind of skeleton key. Anyone who knows the right numbers can decipher the resulting crypto text. l Another recent news with an interesting title, ‘The intelligence coup of the “century” shook the world. As per this news, for decades, the CIA and the West German intelligence have been reading the encrypted communications of over 60+ countries, including allies and adversaries for decades. There are also echoes of crypto in the suspicions swirling around modern companies with alleged links to foreign governments. While the bright side of powerful QCs will help solve a lot of problems for humanity and will give a huge boost to discovery of drugs, new materials and space


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.