Quantum computers are exponentially more powerful than its classical counterpart, it outperforms the most advanced type of modern digital computers, especially when it comes to random number generation in cryptography. Quantum computers work on quantum bits (qubits) which are different from the classical bits, while, classical bits hold values of either a 0 or a 1, qubits, on the other hand, can be in a superposition of 0 and 1 at the same instance of time. However, the development of quantum computers is both a boon and bane for modern technologies. No wonder in the fact that quantum computers have become the new front for both the business and government sectors. But, as mentioned earlier quantum computers are both an opportunity and a threat, the biggest threat being the fact that quantum computers do threaten encryption. Which is by far one of the most sensitive parts of digital security as it provides privacy to our data, starting from banks to healthcare.
Quantum Computing – Boon or Bane For Modern Technologies?
The standard encryption algorithms that are used in this modern technological era will soon be compromised by quantum computers. It has been surmised that a quantum computer with 4,000 qubits will be able to easily compromise encryption algorithms which are considered to be extremely strong. And, it is been approximated that by 2023 quantum computers with such power will be available, and within a blink of an eye existing cryptography algorithms will no longer be able to secure our data.
Let’s dive in further to see how quantum random number generation works and how quantum computers compromise strong classical encryption algorithms like RSA. RSA, being the standard cryptographic algorithm used on the internet, is a method that is an open secret but, is very hard to crack as it uses two keys for encryption. The public key is open and the client uses that key to encrypt a random session key, the person who intercepts the encrypted key must use the second key which is the private key in order to decrypt it. But, once the session key gets decrypted, the server uses that key to encrypt and decrypt further data with some other faster algorithm. So, in order to have secure communication, the private key must be kept safe.
The idea behind RSA encryption is prime factorization. While multiplying two prime numbers is really easy but a number which is a product of two unknown prime numbers is very hard to factorize. For example, 25980376026529 is a 45 bit cryptographic random number which is a product of two prime numbers 566557 and 45856597. Now, cracking something like this would take at least more than a few months. Based on this aspect, the public key is distributed based on the product of two prime numbers which is used to encrypt the secret message, however, without the knowledge of the prime factors used, the message will not be decrypted or it will be next to impossible to decrypt it.
In 2014, on Amazon EC2 WraithX factorized a 696-bit number
, and it is being surmised that a 1024-bit key using the best available classical computer can be factorized within a few months or years. However, the complexity of prime factorization problem grows exponentially with the key length and since we are using 2048-bit keys we are considered safe. But, the curse of prime factorization complexity was solved by an eminent scientist Peter Shor in 1994, who proposed the famous quantum algorithm called Shor’s algorithm
. In order to understand how Shor’s algorithm works the idea of the RSA algorithm has to be clearly explained.
At Random Quantum
, we bring a revolutionary solution, RQubit that is unbreakable, unpredictable and truly random. It is capable of generating cryptographic random numbers with the ability to truly eliminate the possibility of biasedness, and error containment for complete safety.