'The dark side' of quantum computers14 September 2017
The era of fully fledged quantum computers threatens to destroy internet security as we know it. Researchers are in a race against time to prepare new cryptographic techniques before the arrival of quantum computers, as cryptographers Tanja Lange (Eindhoven University of Technology) and Daniel J. Bernstein (University of Illinois at Chicago, USA) describe in the journal Nature. In their publication they analyze the options available for this so-called post-quantum cryptography.
The expectation is that quantum computers will be built some time after 2025. Such computers make use of quantum-mechanical properties and can therefore solve some particular problems much faster than our current computers. This will be useful for calculating models for weather forecasts or developing new medicine.
However, these operations also affect protection of data using RSA and ECC. With today's technologies these systems will not be broken in a hundred years but a quantum computer will break these within days if not hours.
Without protection a lot of sensitive information will be out in the open, even data from years back. "An attacker can record our secure communication today and break it with a quantum computer years later. All of today's secrets will be lost," warns Tanja Lange, professor of Cryptology at Eindhoven University of Technology. This concerns private data, bank and health records, but also state secrets.
Lange saw the importance of alternative systems already back in 2006 and is busy with creating awareness and developing new systems. "Fairly recently we're seeing an uptake of post-quantum cryptography in the security agencies, e.g., the NSA, and companies start demanding solutions."
Lange leads the research consortium PQCRYPTO consisting of eleven universities and companies. PQCRYPTO started in 2015 with 3.9 million euro funding from the European Commission to develop new cryptographic techniques. "This might seem like a lot of money, but is a factor of 100 less than what goes into building quantum computers," says Lange.
She cautions that it is important to strengthen research in cryptography. "Bringing cryptographic techniques to the end user takes often another fifteen to twenty years, after development and standardization."
In their Nature publication Lange and Bernstein explain that a certain quantum algorithm, namely Shor's algorithm, breaks all cryptographic techniques that are currently used to establish secure connections on the Internet. Candidates for post-quantum cryptography can roughly be categorized into two types: they are either very well understood and confidence-inspiring but require a lot of bandwidth or they are more convenient to use but provide more questionable security.
The publication appears in an issue of Nature with special attention to topics related to quantum computers: from different candidates of elementary building blocks of quantum computers till, e.g., the development of new algorithms. The journal invited Lange to write the article on post-quantum cryptography.
Source: TU/e press team
The quality of education seems to have slipped at TU/e. In the latest Dutch-language guide to universities (Keuzegids Universiteiten), Eindhoven's university has dropped from third place in the overall ranking to seventh place in the course of a year. "It's understandable but it's not good," says President of the Executive Board Jan Mengelers, "and it is all the more reason to push on with introducing an upper limit on student intake to our programs. This is a result of the strong growth in student numbers."
Eindhoven's iGEM team has arrived in Boston. In the coming days, the students will participate in the Giant Jamboree, competing with nearly three hundred teams from all over the world. Their competition entry is their project GUPPI, in which they propose encapsulating tumors in a gel to prevent them growing and spreading.
As well as professors, from now on associate professors (UHD-1) at TU/e may also confer doctoral degrees on PhD candidates. Sixty associate professors were awarded the right to confer doctoral degrees at the start of this academic year after the move was approved by the Upper House of Parliament in the Netherlands shortly before the summer recess. “We couldn't wait to introduce this here.”
Before you google yet another one of my invented diseases and subsequently begin to question the title of this story, let me tell you this. With a new academic year having begun and a shiny new batch of freshmen accompanying it, the university is full of people suffering from the so-called octopus syndrome.