Like what you see?

Make sure to click “join” and we’ll keep you updated with any new content

Owl thats trying to tell a message
A tiny snow flake A lil bit bigger snow flake
The TECH Magazine offers a wide range of articles focused on the technology world. You'll be able to enjoy tech news, latest gadget rumors, futuristic tech speculation, 3-D printing, release dates, tutorials, game video reviews and much more. If you are passionate about technology and innovation then our TECH community is most definitely going to be worth your while. Stay connected!

Think your encrypted data is safe? Quantum computers can change that.


Encryption software market is estimated to reach US $ 12.96 billion by 2022, and encryption hardware market, a whopping US $ 413.85 billion! However, quantum computers can make the existing underlying technology irrelevant, and entirely new encryption technology may be needed.

You want your personal and confidential information to be safe from cyber criminals and prying eyes. You have invested in encryption technology, for e.g. you may have got your private and public keys, or you may have got a symmetric key with 56-bit encryption. Additionally, your government, or another regulatory authority in your country might have enforced data encryption standards that every business and organizations must follow, for e.g. Health Insurance Portability and Accountability Act of 1996 (HIPAA) in the USA, or General Data Protection Regulation (GDPR) in the European Union (EU). With all the technology and regulatory frameworks, you are sleeping in peace at night. Excellent! The question is: how long? The answer could cause some concerns to you, and it is: quantum computers could make the current encryption technologies redundant, to a varying degree, within a decade!

Advanced mathematics form the base of current encryption technology:


Encryption is essentially the process to convert plain text into scrambled 'ciphertext', using an unique key. This can be done for data-in-transit, or data-at-rest, i.e. stored in a hard drive. Another algorithm, complementary to the first one, can convert the ciphertext into plain text, and this is called decryption. Decryption requires the unique key that was used during encryption, that unique key holds all the secrecy. You lose your encryption unique key to a hacker, and your sensitive data is now with the cyber criminal!

The fundamental premise of the current encryption technologies is to make it extremely hard for cyber criminals to crack the encryption code, i.e. the computer of the cyber criminal will have to do so much of hard work that it could take it several billion of years to complete. This extraordinarily long time to crack the encryption key is what disincentivizes the cyber criminal, and forms the backbone of the success that the current encryption technologies boast of.

Let's take a look at two leading encryption technologies, with particular focus on the mathematical foundation of the technologies:

  1. When we use public and private key encryption technology, we have two keys, i.e. public, which is shared openly, and the private, which is known only to the user. Another user can send you message your public key, but the message can be decrypted only by you, because you have the private key. The public and private keys are interlinked based on integer factorization. The public key can be easily recreated from the private key, but the opposite is not true. Why? Let's jog back to our school days! Think of the number 3296. If we express this in factorized form, then the expression is 3296 = 2x2x2x2x2x103. Hence, 2 and 103 are the factors for 3296. Today's computers will no doubt calculate this within a short amount of time. However, think of an extraordinarily large number, and today's computers will possibly take several billions of years to complete this calculation. Public key is linked to the private key using this integer factorization, involving really large numbers, thus making it nearly impossible to hack.
  2. Another prominent technology is Advanced Encryption Standard (AES), where there is only one key, however, to find this one key, the hacker has to search an extremely large number of keys. In this technology, when we refer to 56-bit encryption, it actually means that the hacker will need to search 2-to-the-power-of-56, i.e. 72,057,594,037,927,936 keys, to find your own unique encryption key! Today's computers will take an extraordinary long time to search so may keys, making the hacking effort non-viable.

Quantum computers can crack the encryption keys that are hard for today's computers:

by Anujit Kumar Mukhopadhyay
by Anujit Kumar Mukhopadhyay

Today's computers, also called 'classical computers', find it hard to crack today's encryption keys, because of the limitation in their processing powers. This is because today's computers store information in “binary digits”, i.e. “bits”. A bit can only have 0 or 1 at any given point in time, and no other state is possible.

However, another computing technology is coming, called quantum computing. Quantum computers are not yet commercialized, they are at a stage of research, development, experimentation, and refinement.

Instead of 'bits', quantum computers have “Quantum bits” or “qubits”. Qubits can hold a superposition of 0 and 1 states any time. The more qubits there are, higher is the number of states simultaneously held by all the qubits together. The algorithms in the quantum computer are called “Quantum gates”, which are building blocks that simultaneously operate on all possible states of all qubits. Going beyond the realms of theory, this means that the quantum computers can operate much faster that classical computers.

What does it mean for today's encryption technology? A lot, for e.g.:

  1. The integer factorization problem keeping our classical computers busy for the next several billion years can be solved by the quantum computer in just a few days! You will then have to bid goodbye to your private and public encryption keys!
  2. Another algorithm of quantum computer will essentially convert the 56-bit AES encryption to 28-bit, i.e., instead of searching 72,057,594,037,927,936 keys for hacking your AES encryption key, the hacker using a quantum computer will only need to search 268,435,456 keys, a relative cakewalk! There is at least some good news here, because the AES standard can be upgraded to 256-bit, which will mean 128-bit when a quantum computer deals with it, but that's still far better than a 28-bit AES encryption key!

Is your Bitcoin safe from quantum computers?


If you trade in cryptocurrencies, and have read this far, then you know that your encrypted wallets won't be safe when quantum computers arrive. However, what about the Bitcoin and Ethereum protocols, i.e. the underlying blockchains? Are they safe?

Cryptocurrencies are built on blockchain technology, which is a decentralized database, where every computer on the network have a shared version of the entire information on the blockchain, which is also the latest version. Block records, also called 'blocks', are interlinked in a predetermined protocol, and every computer on the network have equal point of authority, everyone can create a new block. Hence, ensuring the correct order of transactions is vital, to maintain data integrity, and the consensus algorithm in blockchain ensures only the record approved by the majority of nodes, i.e. computers on the network, can go into the blockchain. “Miners”, i.e. a combination of special-purpose software, specially designed powerful hardware, and their users, mint new cryptocurrency coins in this blockchain network, and they get rewarded with a fraction of the new coin they mint. It's a competitive environment, and mining a new cryptocurrency coin essentially requires the miner to solve a cryptographic puzzle. The miners not only have to provide the information for the transaction they are trying to create, but also the reference to the last recorded block, and this is called 'proof of work' (POW). Giving reference to the last recorded block is hard, because the miner has to try one number after another, in a competitive environment, and only if the miner can complete this massive number-crunching work at a speed higher than the other miners, the consensus algorithm in the blockchain collectively approves the transaction, and new coin is minted. Since miners operate individually, no one is able to gather the majority of the computing power on the network, and hence the consensus algorithm prevents hacking. However, if a malicious user enters the network with his quantum computer, he can potentially control over 50% of the computing power in the network, due to immensely powerful quantum computer. This user can delete transactions even before they are approved on the blockchain, and create new transactions by simply overpowering the remaining computing power on the network, which is < 50%. There is a good news for the cryptocurrency traders. A group of students in the National University of Singapore have analyzed the projected development of quantum computing, and they conclude that the specially designed hardware currently used for cryptocurrency mining will remain ahead of quantum computers for the next decade. All bets are off after that!

Cryptography experts search for response to quantum computers:

Responsible communities, businesses, organizations and institutions look two-to-three decades ahead and prepare for future. We can see that effort on part of some of the cryptography experts too, in their endeavor to mount a response to the threat that quantum computers pose to encryption, for e.g.:

  • USA-based National Institute for Standards and Technology (NIST) is going through proposals for quantum computer-resistant encryption technologies;
  • Some cryptocurrency developers have taken initiatives to build quantum computer-resistant blockchain network, and The Quantum Resistant Ledger, with their cryptocurrency QRL, is one such answer;
  • The Russian Quantum Center is developing blockchain solution that will withstand quantum computer attack.
This article was originally published on @anujit4blockchain