Everything you need to know about quantum threats and safety.
#1st article on the series of 7 | Reading time 4 minutes
Keywords: Quantum Threats, cryptography(RSA & ECDSA), Blockchain
We live in an era where technology moves at lightning speed, often times unable to keep up with the tech industry (a lot to digest). In this article will try to deep dive on one such topic “Quantum threats and safety”. As quantum computing technology advances, it presents significant challenges against user privacy and data.
Quantum threats: Meaning
What do we mean when we say Quantum threats:
Quantum threats arise from the capabilities of quantum computers to solve complex mathematical problems at unprecedented speeds, particularly through algorithms like Shor's algorithm. This algorithm can factor large numbers efficiently, which is foundational to many encryption methods such as RSA and ECC (Elliptic Curve Cryptography).
Therefore it is safe to say that RSA and ECC are not quantum resistance, and are susceptible to quantum threats.
Nature of Quantum threats: ‘HNDL’
The core foundation of Quantum threat is “Harvest now, Decrypt Later”.
Harvest now, decrypt later attack involves intercepting and storing encrypted data today with the intention of decrypting it in the future when quantum computing capabilities become available. This strategy capitalizes on the anticipated advancements in quantum technology that could fail current encryption methods, such as RSA and ECC.
How HNDL attack works: Process
Data Interception:
- We know that attackers can exploit vulnerabilities in network security to intercept encrypted communications. This can be done through various means, such as man-in-the-middle attacks, phishing schemes, or exploiting weaknesses in protocols that govern data transmission.
Target Selection:
- Cybercriminals are likely focus on high-value targets, including government agencies, financial institutions, and critical infrastructure sectors (e.g., energy and healthcare). The data collected from these entities is likely to have long-term value, making it a prime candidate for HNDL attacks.
Long-Term Data Storage:
- Once the data is harvested, attackers store it securely until quantum computers capable of breaking the encryption are available. This storage can be in the cloud or on physical devices that are not connected to the internet to avoid detection.
Exploiting Weak Encryption:
- Many organizations who still use outdated or weak encryption algorithms that are already vulnerable to current computational techniques. Attackers may prioritize these systems for HNDL attacks, knowing that even with today's technology, they can capture valuable information without immediate decryption.
Waiting for Q-Day:
- As advancements in quantum computing continue, attackers anticipate a future where they can easily decrypt stored data using quantum algorithms like Shor's algorithm. The day when quantum power becomes available to use and will perform the attack on the organization will be known as Q-day.
Potential Vulnerabilities: Blockchain
We now learned that traditional cryptography algorithms such as RSA (Rivest-Shamir-Adleman) and ECDSA(Elliptic Curve Digital Signature Algorithm) which are now being used in the blockchains such as Bitcoin and Ethereum, which generates public key cryptography for securing transactions and validating identities can be exploited using the power of quantum computers which can efficiently factor large numbers and solve discrete logarithm problems, thus potentially revealing private keys from public keys.
Hash Function Compromise:
- Hash functions are integral to blockchain integrity, ensuring that any alteration of transaction data results in a completely different hash value. However, Grover’s algorithm allows quantum computers to search through hash values at a significantly faster rate than classical computers, effectively halving the security of hash functions. This could enable attackers to find collisions or manipulate data without detection.
Exposed Assets:
- A substantial portion of cryptocurrencies is held in wallets with publicly exposed keys. For instance, it is estimated that around 25% of all bitcoins and 65% of ethers reside in addresses with public keys published on the blockchain. These assets are particularly vulnerable if quantum computers become capable of breaking the cryptographic protections that secure them.
Ending Note:
Given these threats it is safe to assume that its about time to prepare for data safety and show resistance against these attacks such as HNDL.
In the next article I will talk about safety measures, blockchain and quantum computing can work together and integrate as a solution which can therefore show Uncrackable properties with DEQUIP.
Using cryptography algorithms like SLH-DSA, I will cover how this works and is quantum resistance.
If you liked the content, consider sharing it with your loved ones.