Disclaimer: Iâm not a cryptography expert. Iâm a software engineer who builds things. What I share here comes from my personal research, not deep cryptography expertise.
Think of encryption like securing your valuables. We lock things up because we donât want strangers looking at our personal stuff or stealing whatâs important to us. Just like you wouldnât leave your wallet on a park bench or your passport on the bus, you donât want to leave your private information out in the open. There are two main ways we do this:
- Using the same key (like your house key) to lock and unlock something. This is what we call AES encryption.
Advanced Encryption Standard (AES) turns your data into scrambled text using a secret password, and only someone with that same password can unscramble it. Think of it like a special lock on a safe - you need the exact same key to lock and unlock it.
- Using different keys (like a mailbox where anyone can put mail in, but only you can open it). This is what we call RSA and ECC encryption.
RSA (RivestâShamirâAdleman) and ECC (Elliptic Curve Cryptography) encryption use two different keys - a public key that anyone can use to encrypt messages (like dropping mail in a mailbox), and a private key that only the owner can use to decrypt them (like having the only key to open the mailbox). This is why theyâre called public-key cryptography systems.
Quantum computers are really good at solving certain types of math puzzles. Itâs like they have a superpower for finding patterns.
So, whatâs the fuss about? Well, the mailbox-style encryption (RSA and ECC) relies on math puzzles which quantum computers could potentially crack using Shorâs algorithm.
Shorâs algorithm is a quantum algorithm for finding the prime factors of an integer.
The house-key style encryption (AES) is different. It doesnât rely on those same math puzzles. Even with a quantum computer, breaking into AES-encrypted data would be like trying every possible combination on a lock with trillions of trillions of possibilities. Even quantum computers canât check all those combinations in any reasonable amount of time.
The locks on your front door (AES encryption) are still strong against quantum computers. But the locks on your mailbox (RSA/ECC encryption) might need an upgrade.
Security experts are already working on new mailbox-style locks that even quantum computers canât break. Theyâre called âpost-quantumâ or âquantum-resistantâ algorithms. Itâs like designing a new kind of mailbox that uses completely different mechanics to stay secure.
Imagine if locksmiths knew that a new tool for breaking certain locks was coming in a few years. Thatâs where we are with quantum computers. Weâre not waiting until the last minute - weâre already building better locks.
What often gets missed
Symmetric encryption algorithms like AES are largely quantum-resistant already. They just need larger key sizes - think of it like adding a few extra pins to an already secure lock. Itâs a simple upgrade to something thatâs already working well.
Quantum computers are not some magic wand that breaks all encryption. Think of them more like a specialized lock pick - theyâre really good at breaking certain types of locks, but completely useless against others.
Itâs similar to how a master key might open all the doors in a hotel, but it wonât help you unlock your bike chain or open your garage door. Sure, quantum computers are incredibly powerful at solving certain math problems, but many of our everyday security systems use completely different methods that quantum computers canât crack.
The headlines about quantum computers âbreaking encryptionâ miss this ESSENTIAL detail. Just because they can potentially crack one type of lock doesnât mean all our security is doomed. In fact, most of the encryption protecting your daily life is already quantum-proof.