The future of encryption
Cryptographic systems that even quantum computers cannot crack will soon be standard in the USA
Whenever you visit a website, send an email, or do your online banking in the future, in many cases algorithms developed with the participation of researchers at the Max Planck Institute for Security and Privacy in Bochum and the Ruhr University Bochum will be used to protect your data. The American National Institute for Standards and Technology (NIST) has now announced which cryptographic methods it will standardize to protect communications from future quantum computer cyberattacks. Peter Schwabe, Group Leader at the Max Planck Institute for Security and Privacy, was involved in the development of three of the selected procedures. Most online services use the methods standardized by NIST.
For many people – and certainly for many of the world's intelligence services – the quantum computer holds great promise. But online service providers that rely on secure data exchanges also see it as a threat. It is true that quantum computers are still being developed, and it is not yet foreseeable when the first powerful computers of this kind will come into service, but one thing is certain as Peter Schwabe, Research Group Leader at the Max Planck Institute for Security and Privacy and professor at the Radboud University Nijmegen explains: "As soon as the first quantum computers arrive, today's cryptographic protocols, which protect virtually all data traffic, will become obsolete because quantum computers will be able to solve the two mathematical problems on which today's cryptographic methods are based." For example, they will be able to break down any large number into prime factors in an instant. Conventional cryptography relies on prime number factorization because contemporary computers would need tens of thousands of years to do the necessary calculations and would also consume as much energy as the sun sends to the earth in the same period.
Four methods out of 69 were chosen – three with Max Planck participation
A total of 69 international teams from the cryptography community have submitted proposals for new cryptographic techniques to NIST to protect data traffic against quantum computer attacks in the future – they are calling it post-quantum cryptography. After several rounds, NIST has now decided to standardize four of these procedures because, as Eike Kiltz, professor at Ruhr University Bochum and spokesperson for the Bochum Cluster of Excellence Cyber Security in the Age of Large-Scale Adversaries explains: “They will provide better protection for digital communications, because quantum computers would undermine current encryption methods and signature systems. These new algorithms show how important it is for researchers working in basic research to work together with their colleagues in the applied sciences to ensure that our data is securely encrypted in the future."
Two of the selected methods are used for authentication, namely the schemes SPHINCS+ and CRYSTALS-DILITHIUM, in whose development Peter Schwabe was involved: “For authentication, a signature in a so-called digital handshake ensures, for example, that a web browser is actually connected to the server it claims to be.” Peter Schwabe was also part of the team that designed CRYSTALS-KYBER and made this method fit for application. This procedure enables the secure exchange of cryptographical keys for the further communication. Amongst others, Schwabe cooperated closely with Eike Kiltz in the development of CRYSTALS-DILITHIUM and CRYSTALS-KYBER.
Post-quantum cryptography is based on mathematical operations which, given our present state of knowledge, are almost as difficult for quantum computers as they are for conventional computers. For example, both key exchange and authentication procedures use hash functions, i.e., algorithms that derive a small number from a very large input number whereby it is not possible to determine the original number from the small number, which is often called a fingerprint. Such hash functions are a core building block for many primitives and it is possible to construct digital signatures only from hash functions.
The cryptography community is involved in the selection process
During the selection process, NIST verified that the respective methods are secure in principle, and also whether they could be implemented in a secure and efficient manner and will now go on to write standards for the selected processes. These standards will explain the cryptographic basics and how to implement them, and will also formulate guidelines so that, for example, online service providers will be able to integrate them into their applications with comparatively little effort and, more importantly, without opening up loopholes in existing security safeguards.
Some people have reservations about NIST’s work, fearing that the agency could standardize encryption methods at the behest of the NSA, leaving backdoors open for the American intelligence service. As Schwabe admits: "We know for sure that this has happened in one case in the past.” But, he adds, at the time NIST presumably did not do so knowingly and has since admitted that they made a big mistake in doing so. "Unlike the current processes,” says Schwabe, “the process with the backdoor loophole wasn't submitted in an open process by academics, and the crypto community is now more involved in the selection process. So now it is not only NIST that checks the potential security vulnerabilities of the available methods, but also more or less the entire global cryptography community.” And, he continues, "NIST has already twice set up a similar selection process for new cryptography standards twice as they do now for post-quantum cryptography. And the methods that were standardized in these earlier efforts have proven to be very secure and are now used all around the world."
European authorities are likely to adopt the standards selected by NIST
So it is to be expected that the decision taken by NIST will set the standards, at least for the USA and Europe. As Eike Kiltz says: "The new NIST standard will certainly become one of the most influential documents in IT security." Whilst the European authorities are still examining the procedures selected by the NIST, as Schwabe explains, experience has shown that, provided they do not find any security gaps, they will agree with the assessment of their US American colleagues, not least to enable encrypted data exchanges between services and computer programs located in the USA and EU respectively. For Google, Amazon, Apple, and virtually every other company that provides online services, the need to communicate with each other is an incentive to rely on the encryption methods standardized by NIST. "And, if security vulnerabilities do occur, they can then blame NIST," says Schwabe, who thinks that the standardization process could be completed by the end of 2023. But some companies, such as Google and Infineon, are already trialing post-quantum cryptography alongside current standards, which are vulnerable to quantum computer attacks and car manufacturers too are already exploring post-quantum cryptography to ensure that they will still be able to reliably update the software in their current vehicles in 15 or 20 years' time without too much effort. "Our assumption," says Schwabe, "is that more and more services will use the new procedures once they have been standardized." The hope is that the encryption processes that Schwabe and his colleagues have helped to develop will then be able to make web surfing, email traffic, and banking transactions even more secure even before the first quantum computers are available.