Professor of Mathematics Nalini Joshi
Imagine the tap of a card that bought you a cup of coffee this morning also let a hacker halfway across the world access your bank account and buy themselves whatever they liked. Now imagine it wasn鈥檛 a one-off glitch, but it happened all the time: imagine the locks that secure our electronic data suddenly stopped working.
This is not a science fiction scenario. It may well become a reality when sufficiently powerful quantum computers come online. These devices will use the strange properties of the quantum world to untangle secrets that would take ordinary computers more than a lifetime to decipher.
We don鈥檛 know when this will happen. However, many people and organisations are already concerned about so-called 鈥溾 attacks, in which cybercriminals or other adversaries steal encrypted data now and store it away for the day when they can decrypt it with a quantum computer.
As the advent of quantum computers grows closer, cryptographers are trying to devise new mathematical schemes to secure data against their hypothetical attacks. The mathematics involved is highly complex 鈥 but the survival of our digital world may depend on it.
The task of cracking much current online security boils down to the mathematical problem of finding two numbers that, when multiplied together, produce a third number. You can think of this third number as a key that unlocks the secret information. As this number gets bigger, the amount of time it takes an ordinary computer to solve the problem becomes longer than our lifetimes.
Future quantum computers, however, should be able to crack these codes much more quickly. So the race is on to find new encryption algorithms that can stand up to a quantum attack.
The US National Institute of Standards and Technology has been听听proposed 鈥渜uantum-proof鈥 encryption algorithms for years, but so far few have withstood scrutiny. (One proposed algorithm, called听, was听听in 2022 with the aid of Australian mathematical software called Magma, developed at the University of Sydney.)
As quantum computers advance, encryption methods will need to keep up.听Hans Pennink/AP/AAP Photos
The race has been hotting up this year. In February, Apple听听the security system for the iMessage platform to protect data that may be harvested for a post-quantum future.
Two weeks ago, scientists in China announced they had听听a new 鈥渆ncryption shield鈥 to protect the听听quantum computer from quantum attacks.
Around the same time, cryptographer Yilei Chen听听he had found a way quantum computers could attack an important class of algorithms based on the mathematics of lattices, which were considered some of the hardest to break. Lattice-based methods are part of Apple鈥檚 new iMessage security, as well as听听for a standard post-quantum encryption algorithm.
A lattice is an arrangement of points in a repeating structure, like the corners of tiles in a bathroom or the atoms in a diamond crystal. The tiles are two dimensional and the atoms in diamond are three dimensional, but mathematically we can make lattices with many more dimensions.
Most lattice-based cryptography is based on a seemingly simple question: if you hide a secret point in such a lattice, how long will it take someone else to find the secret location starting from some other point? This game of hide and seek can underpin many ways to make data more secure.
A variant of the lattice problem called 鈥渓earning with errors鈥 is considered to be too hard to break even on a quantum computer. As the size of the lattice grows, the amount of time it takes to solve is believed to increase exponentially, even for a quantum computer.
The lattice problem 鈥 like the problem of finding the factors of a large number on which so much current encryption depends 鈥 is closely related to a deep open problem in mathematics called the 鈥溾.
Yilei Chen鈥檚 approach suggested quantum computers may be able to solve lattice-based problems more quickly under certain conditions. Experts scrambled to check his results 鈥 and rapidly听. After the error was discovered, Chen published an updated version of his paper describing the flaw.
Despite this discovery, Chen鈥檚 paper has made many cryptographers less confident in the security of lattice-based methods. Some are听听whether Chen鈥檚 ideas can be extended to new pathways for attacking these methods.
Chen鈥檚 paper set off a storm in the small community of cryptographers who are equipped to understand it. However, it received almost no attention in the wider world 鈥 perhaps because so few people understand this kind of work or its implications.
Last year, when the Australian government published a听听to make the country 鈥渁 leader of the global quantum industry鈥 where 鈥渜uantum technologies are integral to a prosperous, fair and inclusive Australia鈥, there was an important omission: it didn鈥檛 mention mathematics at all.
Australia does have many leading experts in quantum computing and quantum information science. However, making the most of quantum computers 鈥 and defending against them 鈥 will require deep mathematical training to produce new knowledge and research.
This article was first published on and written by Professor Nalini Joshi from University of Sydney.
听