Is a quantum-cryptography apocalypse imminent?
Will quantum computers crack cryptographic codes and cause a global security disaster? You might certainly get that impression from a lot of news coverage, the latest of which reports new estimates that it might be 20 times easier to crack such codes than previously thought.
Cryptography underpins the security of almost everything in cyberspace, from wifi to banking to digital currencies such as bitcoin. Whereas it was previously estimated that it would take a quantum computer with 20 million qubits (quantum bits) eight hours to crack the popular RSA algorithm (named after its inventors, Rivest–Shamir–Adleman), the new estimate reckons this could be done with 1 million qubits.
By weakening cryptography, quantum computing would present a serious threat to our everyday cybersecurity. So is a quantum-cryptography apocalypse imminent?
Get your news from actual experts, straight to your inbox. Sign up to our daily newsletter to receive all The Conversation UK's latest coverage of news and research, from politics and business to the arts and sciences.
Quantum computers exist today but are highly limited in their capabilities. There is no single concept of a quantum computer, with several different design approaches being taken to their development.
There are major technological barriers to be overcome before any of those approaches become useful, but a great deal of money is being spent, so we can expect significant technological improvements in the coming years.
For the most commonly deployed cryptographic tools, quantum computing will have little impact. Symmetric cryptography, which encrypts the bulk of our data today (and does not include the RSA algorithm), can easily be strengthened to protect against quantum computers.
Quantum computing might have more significant impact on public-key cryptography, which is used to set up secure connections online. For example this is used to support online shopping or secure messaging, traditionally using the RSA algorithm, though increasingly an alternative called elliptic curve Diffie-Hellman.
Public key cryptography is also used to create digital signatures such as those used in bitcoin transactions, and uses yet another type of cryptography called the elliptic curve digital signature algorithm.
If a sufficiently powerful and reliable quantum computer ever exists, processes that are currently only theoretical might become capable of breaking those public-key cryptographic tools. RSA algorithms are potentially more vulnerable because of the type of mathematics they use, though the alternatives could be vulnerable too.
Such theoretical processes themselves will inevitably improve over time, as the paper about RSA algorithms is the latest to demonstrate.
What remains extremely uncertain is both the destination and timelines of quantum computing development. We don't really know what quantum computers will ever be capable of doing in practice.
Expert opinion is highly divided on when we can expect serious quantum computing to emerge. A minority seem to believe a breakthrough is imminent. But an equally significant minority think it will never happen. Most experts believe it a future possibility, but prognoses range from between ten and 20 years to well beyond that.
And will such quantum computers be cryptographically relevant? Essentially, nobody knows. Like most of the concerns about quantum computers in this area, the RSA paper is about an attack that may or may not work, and requires a machine that might never be built (the most powerful quantum computers currently have just over 1,000 qubits, and they're still very error prone).
From a cryptographic perspective, however, such quantum computing uncertainty is arguably immaterial. Security involves worst-case thinking and future proofing. So it is wisest to assume that a cryptographically relevant quantum computer might one day exist. Even if one is 20 years away, this is relevant because some data that we encrypt today might still require protection 20 years from now.
Experience also shows that in complex systems such as financial networks, upgrading cryptography can take a long time to complete. We therefore need to act now.
The good news is that most of the hard thinking has already been done. In 2016, the US National Institute for Standards and Technology (Nist) launched an international competition to design new post-quantum cryptographic tools that are believed to be secure against quantum computers.
In 2024, Nist published an initial set of standards that included a post-quantum key exchange mechanism and several post-quantum digital signature schemes. To become secure against a future quantum computer, digital systems need to replace current public-key cryptography with new post-quantum mechanisms. They also need to ensure that existing symmetric cryptography is supported by sufficiently long symmetric keys (many existing systems already are).
Yet my core message is don't panic. Now is the time to evaluate the risks and decide on future courses of action. The UK's National Cyber Security Centre has suggested one such timeline, primarily for large organisations and those supporting critical infrastructure such as industrial control systems.
This envisages 2028 as a deadline for completing a cryptographic inventory and establishing a post-quantum migration plan, with upgrade processes to be completed by 2035. This decade-long timeline suggests that NCSC experts don't see a quantum cryptography apocalypse coming anytime soon.
For the rest of us, we simply wait. In due course, if deemed necessary, the likes of our web browsers, wifi, mobile phones and messaging apps will gradually become post-quantum secure either through security upgrades (never forget to install them) or steady replacement of technology.
We will undoubtedly read more stories about breakthroughs in quantum computing and upcoming cryptography apocalypses as big technology companies compete for the headlines. Cryptographically relevant quantum computing might well arrive one day, most likely far into the future. If and when it does, we'll surely be ready.
This article is republished from The Conversation under a Creative Commons license. Read the original article.
Keith Martin receives funding from EPSRC.

Try Our AI Features
Explore what Daily8 AI can do for you:
Comments
No comments yet...
Related Articles
Yahoo
an hour ago
- Yahoo
How did humans evolve such rotten genetics?
To Shakespeare's Hamlet we humans are 'the paragon of animals'. But recent advances in genetics are suggesting that humans are far from being evolution's greatest achievement. For example, humans have an exceptionally high proportion of fertilised eggs that have the wrong number of chromosomes and one of the highest rates of harmful genetic mutation. In my new book The Evolution of Imperfection I suggest that two features of our biology explain why our genetics are in such a poor state. First, we evolved a lot of our human features when our populations were small and second, we feed our young across a placenta. Get your news from actual experts, straight to your inbox. Sign up to our daily newsletter to receive all The Conversation UK's latest coverage of news and research, from politics and business to the arts and sciences. Our reproduction is notoriously risky for both mother and embryo. For every child born another two fertilised eggs never made it. Most human early embryos have chromosomal problems. For older mothers, these embryos tend to have too many or too few chromosomes due to problems in the process of making eggs with just one copy of each chromosome. Most chromosomally abnormal embryos don't make it to week six so are never a recognised pregnancy. About 15% of recognised pregnancies spontaneously miscarry, usually before week 12, rising to 65% in women over 40. About half of miscarriages are because of chromosomal issues. Other mammals have similar chromosome-number problems but with an error rate of about 1% per chromosome. Cows should have 30 chromosomes in sperm or egg but about 30% of their fertilised eggs have odd chromosome numbers. Humans with 23 chromosomes should have about 23% of fertilised eggs with the wrong number of chromosomes but our rate is higher in part because we presently reproduce late and chromosomal errors escalate with maternal age. Survive that, then gestational diabetes and high blood pressures issues await, most notably pre-eclampsia, potentially lethal to mother and child, affecting about 5% of pregnancies. It is unique to humans. Historically, up until about 1800, childbirth was remarkably dangerous with about 1% maternal mortality risk, largely owing to pre-eclampsia, bleeding and infection. In Japanese macaques by contrast, despite offspring also having a large head, maternal mortality isn't seen. Advances in maternal care have seen current UK maternal mortality rates plummet to 0.01%. Many of these problems are contingent on the placenta. Compare us to a kiwi bird that loads its large egg with resources and sits on it, even if it is dead: time and energy wasted. In mammals, if the embryo is not viable, the mother may not even know she had conceived. The high rate of chromosomal issues in our early embryos is a mammalian trait connected to the fact that early termination of a pregnancy lessens the costs, meaning less time wasted holding onto a dead embryo and not giving up the resources that are needed for a viable embryo to grow into a baby. But reduced costs are not enough to explain why chromosomal problems are so common in mammals. During the process of making a fertilisable egg with one copy of each chromosome, a sister cell is produced, called the polar body. It's there to discard half of the chromosomes. It can 'pay' in evolutionary terms for a chromosome to not go to the polar body when it should instead stay behind in the soon to be fertilised egg. It forces redirection of resources to viable offspring. This can explain why chromosomal errors are mostly maternal and why, given their lack of ability to redirect saved energy, other vertebrates don't seem to have embryonic chromosome problems. Our problems with gestational diabetes are a consequence of foetuses releasing chemicals from the placenta into the mother's blood to keep glucose available. The problems with pre-eclampsia are associated with malfunctioning placentas, in part owing to maternal immune rejection of the foetus. Regular unprotected sex can protect women against pre-eclampsia by helping the mother become used to paternal proteins. The fact that pre-eclampsia is human-specific may be related to our exceptionally invasive placenta that burrows deep into the uterine lining, possibly required to build our unusually large brains. Our other peculiarities are predicted by the most influential evolutionary theory of the last 50 years, the nearly-neutral theory. It states that natural selection is less efficient when a species has few individuals. A slightly harmful mutation can be removed from a population if that population is large but can increase in frequency, by chance, if the population is small. Most human-specific features evolved when our population size was around 10,000 in Africa prior to its recent (last 20,000 years) expansion. Minuscule compared to, for example, bacterial populations. This explains why we have such a bloated genome. The main job of DNA is to give instructions to our cells about how to make the proteins vital for life. That is done by just 1% of our DNA but by 85% of that of our gut-dwelling bacteria Escherichia coli. Some of our DNA is required for other reasons, such as controlling which genes get activated and when. Yet only about 10% of our DNA shows any signs of being useful. If you have a small population size, you also have more problems stopping genetical errors like mutations. Although DNA mutations can be beneficial, they are more commonly a curse. They are the basis of genetic diseases, be they complex (such as Crohn's disease and predispositions to cancer), or owing to single gene effects (like cystic fibrosis and Huntington's disease). We have one of the highest mutation rates of all species. Other species with massive populations have mutation rates over three orders of magnitude lower, another prediction of the nearly-neutral theory. A consequence of our high mutation rate is that around 5% of us suffer a 'rare' genetic disease. Modern medicine may help cure our many ailments, but if we can't do anything about our mutation rate, we will still get ill. This article is republished from The Conversation under a Creative Commons license. Read the original article. Laurence D. Hurst is the author of The Evolution of Imperfection, published by Princeton University Press. This was enabled by funding from The Humboldt Foundation and the European Research Council.

Yahoo
2 hours ago
- Yahoo
Russia has been working on creating drones that ‘call home', go undercover and start fires. Here's how they work
Russia launched its largest single drone attack of the war against Ukraine's cities on June 1. The Ukrainian Air Force reported that they faced 472 unmanned one-way attack (OWA) drones overnight. The record may not stand for long. The prior record was on May 26, when Moscow launched some 355 drones. The day before Russia had set a record with 298 Shaheds, which itself surpassed the May 18 tally. Russia's enormous OWA drone attacks came as a surprise to politicians and the general public, but it's the culmination of years of work by the Russia military. Initially purchased from Iran, Russia began building factories in 2023 to assemble and then manufacture Shaheds (Iranian-designed unmanned drones) in Russia. Greater control over production gave Russia the opportunity to expand the number of Shaheds quickly. Get your news from actual experts, straight to your inbox. Sign up to our daily newsletter to receive all The Conversation UK's latest coverage of news and research, from politics and business to the arts and sciences. It also helps them gradually upgrade their drones. Investigations into downed Shaheds show that Russia has been coating the drones in carbon, which resists detection by radar by absorbing incoming waves instead of reflecting them back. They have also been adding SIM cards to transmit data back to Russia through mobile networks. Shaheds also had their warheads upgraded. On May 20 the Ukrainian media reported that Shaheds were using newer incendiary and fragmentation warheads which start fires and spread large volumes of shrapnel respectively to increase their effectiveness. These upgrades were simple in order to keep the cost of the drone, its major advantage over a missile, under control. These drones are both inexpensive and long-range. This means that an attacker such as Russia can launch hundreds every month at targets across Ukraine with little concern about how many are lost along the way. Meanwhile, the defender is stuck figuring out how to shoot all incoming drones down at a reasonable cost indefinitely. The problem is made even more complicated by the fact that air defence systems are sorely needed at the front line to shoot down hostile aircraft, making it a difficult trade-off. Adding to the problem is the recent production of decoy Shaheds. While they carry no warhead and pose little threat by themselves, Ukrainian air defence cannot always tell the decoy from the real thing and still need to shoot them down. In late May, Ukrainian officials told the media that up to 40% of incoming Shaheds were decoys. Consequently, Russia's 472-drone attack reflects all of Russia's innovations so far. These have improved the number of drones that survive, increased lethality, while using decoys alongside armed drones to ensure as many as possible reach their target. Ukraine shoots most incoming Shaheds down. Even the 472-drone attack still had 382 claimed interceptions, a rate of 81%. However, the relatively high interception rate disguises the Shahed's benefits for Russia. Shaheds are cheap by military standards, so launching constant attacks is a disproportionate burden for Ukrainian air defence units. Kyiv has mobilised an enormous amount of resources to protect its cities, from mobile units in trucks to counter-Shahed drones that function like a cheaper anti-aircraft missile. That said, these systems often have short ranges, which means that the savings per interception are somewhat offset by the need to maintain many hundreds of systems across a country as large as Ukraine. Ukraine also has the option of trying to strike Russia's Shahed factories, which they have attempted a few times. Despite Ukraine's evolving air defence, Russia still sees military benefits to constant Shahed attacks. In a study I contributed to last year, we found that Russia's initial OWA drone strategy in 2022 and 2023 did little to force Ukraine to negotiate an end to the war on terms favourable to Russia. That may still be the case now, but the volume of drones and the high tempo of attacks means that Russian strategy could well be aimed at systematically exhausting Ukrainian air defence. As Ukraine grapples with unpredictable US military support, Kyiv is more vulnerable to running out of ammunition for its more advanced air defence systems. This means that constant Shahed attacks make it more difficult for Ukraine to stop incoming missiles, which carry much larger warheads. Of course, Ukraine has its own versions of the Shahed, which it uses to routinely launch strikes against Russian military and oil facilities. Less is known about Ukraine's OWA drones, but they often use many similar features to Shaheds such as satellite navigation. Read more: For Russia's Vladimir Putin, using Shaheds is not all about military benefit. Politically, he has increasingly used Shahed attacks to project a sense of power to his domestic audiences. On May 9, Russia paraded Shaheds through Moscow's streets as part of its annual Victory Day celebrations, which had not been done in years past. Ukraine has begun employing its own OWA drones as part of the 'Spiderweb' operation to attack military and oil infrastructure across Russia. Russia's 472-drone attack is unlikely to remain its largest attack for long. Putin has shown a determination to expand the scale and tempo of its drone campaign and resist Ukaine's calls for a permanent 'ceasefire in the sky', but this week Ukraine's drone strategy has shown that prolonging the drone war can also have serious and unexpected effects for Moscow. So long as the conflict continues, Ukraine's defenders will find themselves facing more, and better, drones aimed at their cities. But increasingly it looks like Russia must worry about Ukraine's drone capabilities too. This article is republished from The Conversation under a Creative Commons license. Read the original article. Marcel Plichta works for Grey Dynamics Ltd. as an intelligence instructor.
Yahoo
2 hours ago
- Yahoo
RSA Announces New Windows Desktop Login and Entra ID Passwordless Solutions
LAS VEGAS, June 04, 2025--(BUSINESS WIRE)--RSA, the security-first identity leader, announced new innovations that expand RSA's complete passwordless solutions, including support for Microsoft Entra ID-joined desktops and legacy, RADIUS-based environments at Identiverse today. These innovations help organizations accelerate deployment of phishing-resistant passwordless solutions across their entire environment, reducing risks, modernizing authentication, and driving efficiency. Available as part of RSA® ID Plus, the only complete passwordless identity security platform, new passwordless features include: Passwordless support for Windows Desktop Login and Entra ID: ID Plus now supports mobile passkeys and QR codes to complete Windows log-in. ID Plus will add Entra ID support in July. One-step enrollment process: Starting in July, users will be able to enroll new RSA mobile passkeys and other RSA MFA methods via a one-step enrollment process that eliminates delays and reduces help desk support costs. Code matching for RADIUS: Organizations operating in RADIUS environments can now deploy code matching to reduce the risk of prompt bombing and ensure legacy architecture stays operational. These new passwordless enhancements are fortified by deep security innovations that extend organizations' defenses and protect against post-passwordless threats. The newly-announced RSA Help Desk Live Verify (patent pending), only available through ID Plus, uses passwordless bi-directional identity verification to stop help desk scams like the recent attacks on Marks & Spencer, Christian Dior, Co-Op, and MGM Resorts. RSA Mobile Lock secures the authentication process itself by scanning devices for app tampering, malware, sideloading, jailbreaking, and AiTM attacks. "Not all passwordless is created equal: government agencies, finance, energy and healthcare providers, and other security-first organizations need a passwordless solution for all users, environments, and devices," said RSA CEO Rohit Ghai. "Moreover, to defend against emerging threats, organizations must integrate passwordless into an identity security platform that provides full visibility into user access while constantly assessing identity security posture. Cyberattacks start wherever organizations' security capabilities end, which is why high-security organizations rely on RSA for a complete identity security platform that stops phishing, malware help desk scams, ransomware, and other attacks before they start." Identiverse attendees are invited to demo these new solutions at booth #342. Resources: Book a meeting with RSA at Identiverse RSA Governance & Lifecycle Advanced Dashboards solution brief RSA passwordless solution brief RSA Mobile Lock data sheet Try RSA ID Plus About RSA RSA provides mission-critical cybersecurity solutions that protect the world's most security-sensitive organizations. The RSA Unified Identity Platform provides true passwordless identity security, risk-based access, automated identity intelligence, and comprehensive identity governance across cloud, hybrid, and on-premises environments. More than 9,000 high-security organizations trust RSA to manage more than 60 million identities, detect threats, secure access, and enable compliance. For additional information, visit our website to contact sales, find a partner, or learn more about RSA. View source version on Contacts teamrsa@