Skip to content
Atish Joottun edited this page Jun 28, 2024 · 8 revisions

Analysis of Post-Quantum Readiness in any Countries.

Background of This Project

This project was made possible due to the contribution of Cyberstorm Mauritius and The Univerity of Mauritius.

Quantum computing is a type of computing that relies on science of Quantum Physics to operate. They make use of Quantum Entanglement and Quantum Superposition to store and process data. Comparing a Quantum computer against a classical computer, the difference is like night and day. For tasks like factorisation, optimisation, and quantum simulation, a Quantum computer is extremely fast compare to a classical computer.

Computer Security

In computer security, Encryption is what protects our online data. Encrpytion is a method to turn meaningful data into unreadable lines of characters. Below is an example of SHA-256, an encryption algorithm.

Initial Message

Helllo, World!

SHA-256 HASH

924c155d886c76b9b6980033bfbe01921aa0b0b6b7090b144c2e57e800d5187e

Here is a blog that explains the encryption SHA-256 - By SSLDragon.

Given enough time and resources, any algorithm can be broken. Currently, the most powerful classical encryption is AES 256-bit encryption. It is currently unbroken. brute forcing such algorithm will take millions of years. Using classical computing however, will only need either seconds or minutes.

Refer to this paper for more information about how quantum computing can affect cryptography.

Current Issue

Even thought quantum computers is theoretically this powerful, the current version of it is not powerful enough to be considered one. However, we still need to take into considerations about issues that can be caused by quantum computers. Currently most cryptography algorithms used are not resiliant against quantum computing. So, a hacker can just capture packets of data and store them and then later on decrypt them when a powerful enough quantum computer is available.

This vulnerability is called Store-Now-Decrypt-Later.

Post-Quantum Algorithms

There are algorithms that can resist a quantum computing. Algorithms like:

  • NTRU Prime
  • Kyber
  • FLACON
  • SPHINCS+
  • CRYSTALS-Dilithium

These are just a few of them.

They are designed with one main goal, to be extremely hard to crack specially when using quantum computing.

KEY NOTE

PQ Encryption is encryption made with post quantum algorithms. Classical Encryption is encryption made with non-quantum algorithms algorithms that are currently in use.

TLS Packets

A packet size using classical encryption compared to one that uses PQ Encryption is smaller in size and can be sent in one single packets, unlike PQ which requires 2 or more packets.

This can arise a few issues such as Protocol Ossification. Protocol ossification is an issue where a misconfigured middlebox, such as a firewall will drop packets or will flat out rejects it. It mostly has to do with it sets of rules for filtering.

Our Aim

Our aim is to provide a framework that will help countries to check or if we have already scan them, can see and analyse this results.

Author of WIKI-page: