29.06.2020 Views

YSM Issue 87.4

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

FEATURE

cryptography

Q

U A N T U M

C O M P U T I N G

An uncertain future for information security

BY JACOB MARKS

On September 10th, news broke that roughly five million Gmail

accounts had been hacked, and their passwords had been stolen .

This followed on the heels of a cyber attack against Community

Health System, Inc., in which personal data of more than four

million patients was compromised , and came soon after a credit card

theft that affected Home Depot locations all over the world, making

the home improvement store the largest retailer yet to succumb to

computerized security theft.

Every day, it seems,

governments and corporations

fall victim to data leaks caused by

anonymous online crusaders or

foreign terrorist organizations—

leaks which call into question the

efficacy of modern computer

security measures. But quantum

cryptography, the use of

quantum mechanical principles

to make and break codes,

could irrevocably alter the way

cyber crimes are committed

and defended against. If

recent advances in quantum

key distribution come to full

fruition, they could reconfigure

the cybercrime landscape,

and give renewed hope for

information security.

Deriving from the Greek

words kryptos, for ‘hidden’, and graphein, for ‘writing’, cryptography

is defined as the science of writing secret codes . For thousands

of years, the practice has been used to protect state secrets and to

transmit war strategies. The ancient Greeks wrote messages along

cloth wound around sticks of a specific diameter, and the Romans

developed the first substitution cipher, called the Caesar Shift, in

which each letter in a message was shifted forward a certain number

of places. Later ciphers, such as those produced by the Enigma

machines used by German forces in World War II, involved multiple

substitution schemes, or arrangements of the alphabet to encrypt

messages.

But the advent of the computer in the latter half of the twentieth

century spurred a cryptographic revolution couched in a new type of

security By allowing for the electronic transmission of large quantities

of data, the computer introduced the need to securely transmit

information at a distance. In the past, sender and receiver shared

special knowledge about how

the message was encrypted—

such as the diameter of

the stick. But computers

necessitated a cryptosystem

that could securely transmit

information between people

who did not share a previously

agreed upon key.

The solution, public-key

cryptography, makes use of a

one-way problem—something

that is easy to solve in one

direction, but hard to solve

in the other. RSA, one of the

IMAGE COURTESY OF WIKIPEDIA

D-wave: D-Wave Two, pictured above, is the world’s most complex

quantum computer. Created in 2013, D-Wave Two is comprised of 512

qubits, and performs an optimization algorithm orders of magnitude

faster than classical computers.

IMAGE COURTESY OF 33RD SQUARE

most widely-used public key

cryptosystems, is rooted in the

assumption that it is easy for a

computer to multiply two large

prime numbers, but much

harder for it to factor the result

into the two initial primes. However, public key systems like this rely

on the limited computing power of cryptanalysts, or code-breakers.

Although hard to solve, the problem of factorization is certainly

possible, and as computing power has increased, the key length

needed to ensure information security has increased as well. In 2009,

a 768 bit RSA key (an integer represented by a string of 768 0s and

1s), was successfully factored by Thorsten Kleinjung and colleagues

, and some people believe that the 1024 bit RSA keys now in use will

32 Yale Scientific Magazine October 2014 www.yalescientific.org

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!