What is “quantum”, really?
The emperor's new (quantum) clothes: cutting through the quantum hype
It’s hard to move in security circles today without hearing someone pontificating about “quantum”. Maybe you keep hearing how all cryptography and security of the internet will be devastated by a quantum computer.
Believe me, I hate adding noise to an already blaring chorus — but when so much quantum stuff I hear is just wrong or fear-mongering, I truly feel a sense of duty to take out some of the hype and junk before someone acts on bad advice in good faith.
I know, there are about 100,000 blogs out there on quantum, so why is this one different? Mainly because I’m not going to retread old ground. Instead, I will provide clarity on the lesser-explained elements, arm you with some facts to challenge quantum hobbyists, and give you a solid grounding in quantum vocabulary and standards.
So if you’re interested, read on. I’ll never miss a chance to talk about quantum-safe cryptography and standards! After this, you should know:
Quantum computing is an entire field unto itself, and not something we can define in simple terms. The good news is that we can define quantum-safe cryptography! QSC refers to algorithms that cannot be cracked or weakened by a quantum computer (QC).
Today, quantum-safe cryptography encompasses two types post-quantum cryptography and quantum key distribution. (For more on terminology and distinctions, do check out this excellent proposed standard on the subject.)
There’s one important distinction I have to make: When I talk about “quantum”, I’m almost surely talking about post-quantum cryptography (PQC). When other people talk about “quantum”, they sometimes mean quantum key distribution (QKD). So let’s clear up this point:
If that doesn’t make sense, don’t worry because I’m not going to discuss it further except to say…
Quantum-safe cryptography (QSC) encompasses both PQC and QKD. So how do you know which one to choose — better yet, which squad should you support?
Like most technologists, I greatly favour PQC. Why? Well, the security aspects of PQC are better-researched. Importantly, we also have the infrastructure to support PQC today.
In contrast, QKD requires bespoke hardware. To be deployed at scale and in support of the traffic volume that the internet requires, QKD requires all kinds of new networks to be built, with lots and lots of relay nodes to tackle the geographic and distance limitations. And, even if we did have all that, QKD also can’t do authentication — that’s a hard no from me.
So whilst QKD is pretty cool, it’s not suitable for many reasons, and I greatly prefer PQC. As for the rest of us…does everyone prefer PQC? Well, let’s look at standards.
Luckily, whenever there are emerging and developing technologies like quantum cryptography, there are standards! The National Institute of Standards and Technology (NIST) has been creating standards for all sorts of technologies, including quantum-safe cryptography, for ages and ages.
Yes, NIST published SP 800-208 in December 2019, aimed at the niche use case of long-lasting embedded systems that need occasional firmware updates. And, since June 2022, one key encapsulation mechanism and three signature algorithms have been standardised (as we’ll cover shortly).
However, these latter algorithms are still not implemented in protocol standards, or even de facto large libraries — wait until they are. If you do this yourself, you’re likely to make a mistake. This mistake very likely will:
So, it’s crucial to wait for well-researched, international standards and implementations.
Since 2017, NIST has led a process to solicit, evaluate, and standardise quantum-resistant public-key cryptographic algorithms.
A long-running joke is that the whole NIST post-quantum process was designed to keep cryptographers (like me!) in business. We had done pretty well with ubiquitous encryption, efficient and small elliptic curve key exchanges and signatures, AES and SHA3. What was left to do?
Design against a theoretical quantum attack, of course!
Most quantum-safe schemes are based on 1 of 5 underlying hard problems (each class of hard problems is analogous to the difficulty of factoring a large modulus). Quantum-safe algorithms are grouped by these underlying hard problems, as follows:
So far, NIST has finalised four algorithms in its standardisation process:
The eagle-eyed among you will note that 3 of those 4 are all based on lattices, which limits your choice if you’re not a fan of lattices. (Thankfully, I am a fan.) But if you’re not, don’t fear! NIST put these algorithms. with different underlying hard problems, into a group for further research:
This “further research” group turned out to be a great idea, because SIKE was broken shortly afterwards. This validates that these algorithms did require further study before being standardised.
Until standards and implementations are available, you could do some things that are good for both cybersecurity and any potential quantum threat, such as:
This is good security practice anyway, and will be helpful, should you ever need to migrate to a post-quantum solution — once standards have been set, of course.
There are people in this world who are legit cryptographers; that’s their job title, they live and breathe cryptography, devouring academic papers, research, implementations and number theory.
And then there are people who know what public-key cryptography is as it relates to certificates on the internet. Nothing wrong with that. Just remember that cryptography is a profession, like civil engineering, and the same way you wouldn’t build bridges if you have a passing interest in civil engineering, nor should you be advising on cryptography because you can describe RSA.
So, no matter how enthusiastic you or your staff are: don’t roll your own cryptography, do use tested implementations, and always wait for standards that have been thoroughly researched.
In the meantime, here’s a superposition joke for you: Schrödinger’s cat walks into a bar, and doesn’t. (…And that is why no-one makes jokes about quantum physics. 😜)
Test time! You should be able to tell me now:
See an error or have a suggestion? Please let us know by emailing ssg-blogs@splunk.com.
This posting does not necessarily represent Splunk's position, strategies or opinion.
The Splunk platform removes the barriers between data and action, empowering observability, IT and security teams to ensure their organizations are secure, resilient and innovative.
Founded in 2003, Splunk is a global company — with over 7,500 employees, Splunkers have received over 1,020 patents to date and availability in 21 regions around the world — and offers an open, extensible data platform that supports shared data across any environment so that all teams in an organization can get end-to-end visibility, with context, for every interaction and business process. Build a strong data foundation with Splunk.