Will quantum brute force attacks break cyber security encryption?
The short answer is yes, the long answer is yes, but not for a long time. It will be highly dependent on the level of encryption placed on the data and the key length.
Much of the confusion with quantum computing – and many other new technologies – is that people view them as a new level or a transition, someone invents quantum computing and suddenly it is super-fast and everywhere. In reality, it functions like a wave that never breaks, building power and changing over time.
The first quantum computers that make it to the market might be fast but will not be fast enough to break the highest level of encryption.
It all really comes down to processing power and maths. There is a calculation as to how much processing power it would take to perform a brute force attack and there is a key length that makes it impractical to do that attack. Currently available encryption methods would still take the currently forecasted quantum computers centuries to break despite their increased speeds.
Using simple numbers, if a computer was capable of 1 calculation a day, you would set the key length to require 100,000 calculations, so it would take 273 years for the computer to break that encryption, assuming it did nothing else for those 273 years.
However, if the computer suddenly can do 2 calculations a day, then suddenly it would only take 137 years. The industry has been comfortable in this pattern because the increase was linear, computers would grow X% more powerful and encryption could be increased by X%. Quantum is a technology that enables exponential growth, so instead of going 1, 2, 3, 4, 5, instead it might go 10, 20, 40, 80.
But, if you make that original number, the number of calculations required to break the key at a high enough amount, you have a large amount of growth in power needed before it becomes practical to break that key.
It’s hard to accurately predict the level of growth as its hard-to-understand what quantum growth in computing speeds might enable in computer research. However, experts believe they can plot the trajectory of the technology and plan for it.
So, there shouldn’t be an immediate threat to cyber security just because quantum computing is available, and experts and companies are putting practices in place to protect data even in a post-quantum world.
But there are still concerns about ‘Harvest Now, Decrypt Later’.