Contents | |
---|---|
AES is Quantum Toast | Quantum computers can brute force AES now |
AES Quantum Safe Claims | Persistent AES "quantum-safe" claims are false |
No one is talking about it | The Quantum Elephant in the Room |
A Clear and Present Danger | Cyber security and privacy is at risk now |
AES is Quantum Toast
It is quite clear and well understood that a quantum computer can process all possible combinations of qubits at once, unlike classic computers that must process each possible bit combination sequentially.
It is a phenomenal paradigm shift, a multiple exponential increase in quantum computing power over classic computers.
Specifically, a 256 bit classic key register can be replaced with a 256 qubit quantum key register, and:
A quantum computer will process
all possible combinations of 256 qubits at once!
For a classic computer to process 2^256 combinations takes thousands of years as each combination must be tested sequentially. This is the encryption/decryption asymmetry that AES and all classic block encryption relies on for security, fast to encrypt and slow to brute force decrypt.
A 256 qubit key register may be linked to quantum functions that mimic AES decryption. A full AES quantum brute force system is described by the Flatow Algorithm.
AES Quantum Safe Claims
There are persistent claims that AES Quantum Safe 'as long as you use quality keys'.
In light of the above and the Flatow Algorithm it is clear that the quality of the key cannot prevent a quantum brute force crack of AES, or similar classic encryption.
Moreover, the number of qubits required is well within the capacity of current quantum computers.
It is puzzling that the AES Quantum Safe claim persists.
Interestingly the claim originates from manufacturers of quantum computers...
No one is talking about it
There is an understandable agenda to downplay the fact that AES is Quantum Crackable.
Firstly it undermines confidence in classic block encryption in general, and AES in particular, a standard adopted by NIST and governments worldwide.
Secondly, manufacturers and backers of quantum computing do not wish dissemination of the very negative quantum computer threat to cybersecurity.
Awareness is layered near the top of governments and institutions, yet its impact is global:
AES must be replaced in billions of devices, all over the Internet and all software!
This is The Quantum Elephant in the Room - no one is talking about AES quantum vulnerability…
A Clear and Present Danger
It is critical for the cybersecurity profession, IT professionals and directors of companies that handle confidential information to realise:
AES is Quantum Toast Today!
Not at some future time, not when quantum computers become more capable, not when they become 'cryptographically relevant' ... NOW!
Quantum computers have been 'cryptographically relevant' in respect of AES since 2022.
Migration to a Quantum Safe replacement of AES is a major project that must be launched immediately if you have sensitive assets protected and secured by AES or other classic block encryption.