Solving Quantum Cryptography
Based on PBS Space Time's video on YouTube. If you like this content, support the original creators by watching, liking and subscribing to their content.
Shor’s algorithm threatens RSA because it can factor prime products by exploiting periodicity, undermining the one-way function RSA depends on.
Briefing
Quantum computers don’t yet threaten everyday encryption—but they’re on track to. The core risk comes from Shor’s algorithm, which can factor large numbers far faster than any known classical method. Since widely used public-key systems rely on the difficulty of factoring products of primes, a sufficiently powerful, fault-tolerant quantum computer would be able to recover secret keys that protect email, online purchases, and logins.
For now, the threat is mostly theoretical in practice. Current quantum hardware remains limited to under 100 qubits, and no system has factored numbers larger than 21 using Shor’s algorithm. Still, the trajectory matters: once quantum machines reach the scale needed for prime factoring at real-world key sizes—thousands of qubits and strong fault tolerance—RSA-style security would fail. That’s why the push for “post-quantum cryptography” has moved from academic discussion to standards work.
The transcript breaks down why prime factoring is uniquely vulnerable. Factoring can be framed as a one-way function: multiplying primes is easy, reversing the process is hard. Classical computers brute-force factors using methods like trial division, but Shor’s algorithm exploits a hidden mathematical structure called “periodicity.” By using quantum superposition and interference, the algorithm amplifies information about the period of a modular arithmetic sequence. Once that period is extracted, the original prime factors can be determined.
Quantum parallelism doesn’t magically hand over the correct factors directly—measurement yields only one outcome. Instead, Shor’s method encodes the relevant periodic structure into the quantum states and then uses interference to suppress incorrect periods while boosting the correct one. That period-finding step is the exploitable quality that turns factoring from an intractable problem into one that scales much more favorably on a quantum computer.
Post-quantum cryptography aims to replace RSA with encryption schemes built on different hard problems—ones that lack known quantum shortcuts like periodicity. A major effort is a NIST competition run by the National Institute for Standards and Technology, narrowing nearly 70 submissions down to 7 finalists and alternates announced in June, with expectations to select one or two quantum-resistant standards in 2022. One finalist is the McEliece cryptosystem, which bases security on the difficulty of decoding errors in large coded messages. It uses large matrix transformations and intentionally added errors so that, without the secret key, reversing the process is computationally infeasible.
Other finalists include lattice-based systems such as NTRU, CRYSTALS-KYBER, and SABER, which rely on problems like the shortest vector problem. These are attractive because they avoid the periodicity weakness, but they raise practical concerns—especially public key sizes and the need to prove robustness against both classical and quantum attacks.
Even post-quantum cryptography isn’t a guarantee. New algorithms—whether classical or quantum—could eventually undermine today’s assumptions. Still, the transcript frames the situation as a race: quantum computers are likely to arrive, quantum key distribution depends on a quantum internet that may not be ready, and post-quantum schemes may be the most realistic bridge to keep digital security intact.
Cornell Notes
Quantum computers threaten today’s public-key encryption because Shor’s algorithm can factor prime products using period-finding, a structure RSA depends on. That capability would collapse the security of systems like RSA once quantum machines have enough qubits and fault tolerance, even though current devices are far from that scale (under 100 qubits; factoring beyond 21 hasn’t happened). Post-quantum cryptography responds by switching to one-way functions without known quantum exploitable properties such as periodicity. NIST’s competition has narrowed candidates to a small set of finalists, including McEliece (error-decoding hardness) and lattice-based schemes like NTRU, CRYSTALS-KYBER, and SABER (shortest vector-type hardness). The main open question is not just quantum resistance, but whether future breakthroughs—classical or quantum—could still crack these assumptions.
Why does RSA-style encryption become vulnerable if a quantum computer can run Shor’s algorithm?
What is the “periodicity” trick at the heart of Shor’s algorithm?
Why doesn’t quantum superposition automatically guarantee the correct factors when measured?
How does the McEliece cryptosystem avoid the specific weakness that breaks RSA?
Why are lattice-based candidates (NTRU, CRYSTALS-KYBER, SABER) both promising and challenging?
What does NIST’s post-quantum process try to accomplish, and what uncertainty remains?
Review Questions
- How does Shor’s algorithm convert factoring into a period-finding problem, and why is that structure essential?
- Compare the security assumptions behind McEliece and lattice-based schemes: what hard problem does each rely on?
- What practical constraints (e.g., key sizes) could slow adoption of post-quantum cryptography even if the math is secure?
Key Points
- 1
Shor’s algorithm threatens RSA because it can factor prime products by exploiting periodicity, undermining the one-way function RSA depends on.
- 2
Current quantum hardware is still too small to factor numbers beyond 21 using Shor’s algorithm, but future fault-tolerant machines with thousands of qubits would change the security landscape.
- 3
Post-quantum cryptography focuses on replacing prime factoring with different one-way functions that lack known quantum exploitable shortcuts like periodicity.
- 4
NIST’s post-quantum cryptography competition has narrowed nearly 70 submissions to 7 finalists and alternates announced in June, with standards selection expected around 2022.
- 5
McEliece bases security on the hardness of decoding errors in large coded messages using matrix transformations, avoiding RSA’s periodicity vulnerability.
- 6
Lattice-based candidates such as NTRU, CRYSTALS-KYBER, and SABER rely on hard lattice problems (e.g., shortest vector-type difficulty) but face practical issues like large public keys.
- 7
Even post-quantum schemes aren’t guaranteed to remain secure indefinitely; future breakthroughs could still find faster attacks.