Skip to main content
Move the World.
Quantum Hacking

Lead Image © James Thew / Adobe Stock

The potential of quantum computers is seemingly limitless — experts predict the ultra-powerful machines could one day help us do everything from cure diseases to explore new parts of space.

But they could also help hackers gain access to our most private data, cracking encryption that would normally take millions of years to solve, even using supercomputers.

That possibility has some security experts on the hunt for new encryption methods that would withstand quantum hacking — but some see a more immediate threat to data security in a piece of pending U.S. legislation.

Preventing Quantum Hacking

Today, nearly all of our digital data — our emails, text messages, online purchases, etc. — undergoes a process called encryption that makes it unreadable without a special decryption key. This protects your data in transit, in the cloud, and stored on your computer from being stolen or tampered with.

The most commonly used method for encrypting and decrypting all of this data is the Advanced Encryption Standard (AES), which was adopted by the U.S. National Institute of Standards and Technology (NIST) in 2011.

AES encryption is almost impossible for today's classical computers to break, but quantum computers would presumably have the processing power needed for the task.

To get ahead of the problem of quantum hacking, NIST launched a competition in 2016, asking researchers to develop "quantum-proof" encryption methods. In July, it narrowed the field of contestants down to 15 from the original 69.

The agency won't be announcing the winners of the competition until 2022, but several of the remaining candidates take an approach called "lattice-based cryptography," making it a frontrunner in the hunt for a post-quantum encryption standard.

"What NIST thinks is that lattice problems are really hard," Elena Kirshanova, a mathematician and cryptanalysis researcher, told MIT Technology Review. "Although these problems are hard, they seem quite efficient in terms of time to generate keys, time to construct signatures, and also efficient in terms of memory."

Threats to Encryption

It's hard to predict when the threat of quantum hacking might actually come to fruition; the machines may not be ready for years, or perhaps decades — and scientists still have yet to use quantum computers to solve any useful problems at all.

But NIST mathematician Dustin Moody believed there's no time to waste in preparing for it.

"It takes a long time to standardize and get cryptographic algorithms implemented and into products," he told Technology Review. "It can take 10 or 20 years. We need this process done before a quantum computer is done so we're ahead of the game."

But quantum hacking — unraveling encryption — is not the only systemic threat to data security. The EARN IT Act is another.

"The privacy and security of all users will suffer."

Joe Mullin

That bill, which is currently up for vote in the Senate, is ostensibly designed to protect children online, and part of how it would do that is by requiring companies to give law enforcement the ability to break into encrypted data.

Privacy experts argue that creating these "backdoors" — essentially, flaws consciously built into encryption — would render encrypted data vulnerable, not just to "good guys" but "bad guys" as well.

Privacy experts warn that such a mandate would create the kind of systemic vulnerability that only quantum computing or some other kind of technological breakthrough could introduce without it.

"The privacy and security of all users will suffer if U.S. law enforcement is able to achieve its dream of breaking encryption," Joe Mullin, a privacy analyst for the Electronic Frontier Foundation, wrote in March.

We'd love to hear from you! If you have a comment about this article or if you have a tip for a future Freethink story, please email us at [email protected].

Up Next

Coded
It’s Time for Regular Americans to Think Differently About Cybersecurity
It’s Time for Regular Americans to Think Differently About Cybersecurity
Coded
It’s Time for Regular Americans to Think Differently About Cybersecurity
If huge companies and government agencies can't manage the cyber threats, how can ordinary Americans?
By James Poulos

If huge companies and government agencies can't manage the cyber threats, how can ordinary Americans?

Cybersecurity
We’re One Step Closer to a Super-Secure Quantum Internet
We’re One Step Closer to a Super-Secure Quantum Internet
Cybersecurity
We’re One Step Closer to a Super-Secure Quantum Internet
Scientists have successfully entangled photons across a 52-mile-long quantum loop in Chicago, a major milestone along the path to a quantum Internet.

Scientists have successfully entangled photons across a 52-mile-long quantum loop in Chicago, a major milestone along the path to a quantum Internet.

Coded
What We Mean When We Talk About Hacking
What We Mean When We Talk About Hacking
Coded
What We Mean When We Talk About Hacking
We've all heard it before: "I was hacked!" But that can mean a lot of things. We take a look at some of the big ones.
By Mike Riggs

We've all heard it before: "I was hacked!" But that can mean a lot of things. We take a look at some of the big ones.

Coded
The Hackers Exposing Government-Wide Crime and Corruption
The Hackers Exposing Government-Wide Crime and Corruption
Coded
The Hackers Exposing Government-Wide Crime and Corruption
Displaying the power of unique technological abilities combined with dogged investigative journalism
By Michael O'Shea

Displaying the power of unique technological abilities combined with dogged investigative journalism

Hacking for Good
White Hat Hackers are Defending Hospitals From Rising Cyber Attacks
cyber attacks
Hacking for Good
White Hat Hackers are Defending Hospitals From Rising Cyber Attacks
Criminals are exploiting COVID-19 to launch cyber attacks. These volunteers have grouped together to fight back.

Criminals are exploiting COVID-19 to launch cyber attacks. These volunteers have grouped together to fight back.

Coded
Nico Sell Thinks Hackers Can Be a Force for Good
Nico Sell
Coded
Nico Sell Thinks Hackers Can Be a Force for Good
After criminals hijacked the term, Sell is on a mission to change our perception of hackers.
By Michael O'Shea

After criminals hijacked the term, Sell is on a mission to change our perception of hackers.

Coded
Hacker Wins Election As Pirate Party Leader
Hacker Wins Election As Pirate Party Leader
Watch Now
Coded
Hacker Wins Election As Pirate Party Leader
Iceland's Pirate Party is trying to use a hacker mindset to improve their country and the world.
Watch Now

In the wake of the Panama Papers hacking scandal, computer programmer Smári McCarthy decided he needed to apply his "hacking for good" philosophy to politics. As a member of the Pirate Party - a political party formed around the concept of extreme transparency - Smári was elected to Parliament in Iceland and is trying to use a hacker mindset to improve his country and the world.

Coded
Hacker Hero Arrested by FBI
Hacker Hero Arrested by FBI
Watch Now
Coded
Hacker Hero Arrested by FBI
Was MalwareTech just doing research to stop criminal activity or engaging in criminal activity himself?
Watch Now

Why This Hacker Was Arrested The super-secretive hacker known as MalwareTech became famous when he dismantled the WannaCry computer virus, one of the most alarming privacy threats in recent memory. But the praise was cut short when the hacker was arrested by the FBI for creating a virus that gave digital thieves access to people’s banking credentials. Was he just doing research to stop criminal activity or engaging in...

Hacking
Ethical Hacking Challenge: Can You Take Over a Military Satellite?
Ethical Hacking
Hacking
Ethical Hacking Challenge: Can You Take Over a Military Satellite?
The U.S. Air Force is hosting Hack-A-Sat, an ethical hacking competition challenging participants to find security vulnerabilities in satellite systems.

The U.S. Air Force is hosting Hack-A-Sat, an ethical hacking competition challenging participants to find security vulnerabilities in satellite systems.