Back
About RSIS
Introduction
Building the Foundations
Welcome Message
Board of Governors
Staff Profiles
Executive Deputy Chairman’s Office
Dean’s Office
Management
Distinguished Fellows
Faculty and Research
Associate Research Fellows, Senior Analysts and Research Analysts
Visiting Fellows
Adjunct Fellows
Administrative Staff
Honours and Awards for RSIS Staff and Students
RSIS Endowment Fund
Endowed Professorships
Career Opportunities
Getting to RSIS
Research
Research Centres
Centre for Multilateralism Studies (CMS)
Centre for Non-Traditional Security Studies (NTS Centre)
Centre of Excellence for National Security
Institute of Defence and Strategic Studies (IDSS)
International Centre for Political Violence and Terrorism Research (ICPVTR)
Research Programmes
National Security Studies Programme (NSSP)
Social Cohesion Research Programme (SCRP)
Studies in Inter-Religious Relations in Plural Societies (SRP) Programme
Other Research
Future Issues and Technology Cluster
Research@RSIS
Science and Technology Studies Programme (STSP) (2017-2020)
Graduate Education
Graduate Programmes Office
Exchange Partners and Programmes
How to Apply
Financial Assistance
Meet the Admissions Team: Information Sessions and other events
RSIS Alumni
Outreach
Global Networks
About Global Networks
RSIS Alumni
Executive Education
About Executive Education
SRP Executive Programme
Terrorism Analyst Training Course (TATC)
International Programmes
About International Programmes
Asia-Pacific Programme for Senior Military Officers (APPSMO)
Asia-Pacific Programme for Senior National Security Officers (APPSNO)
International Conference on Cohesive Societies (ICCS)
International Strategy Forum-Asia (ISF-Asia)
Publications
RSIS Publications
Annual Reviews
Books
Bulletins and Newsletters
RSIS Commentary Series
Counter Terrorist Trends and Analyses
Commemorative / Event Reports
Future Issues
IDSS Papers
Interreligious Relations
Monographs
NTS Insight
Policy Reports
Working Papers
External Publications
Authored Books
Journal Articles
Edited Books
Chapters in Edited Books
Policy Reports
Working Papers
Op-Eds
Glossary of Abbreviations
Policy-relevant Articles Given RSIS Award
RSIS Publications for the Year
External Publications for the Year
Media
Cohesive Societies
Sustainable Security
Other Resource Pages
News Releases
Speeches
Video/Audio Channel
External Podcasts
Events
Contact Us
S. Rajaratnam School of International Studies Think Tank and Graduate School Ponder The Improbable Since 1966
Nanyang Technological University Nanyang Technological University
  • About RSIS
      IntroductionBuilding the FoundationsWelcome MessageBoard of GovernorsHonours and Awards for RSIS Staff and StudentsRSIS Endowment FundEndowed ProfessorshipsCareer OpportunitiesGetting to RSIS
      Staff ProfilesExecutive Deputy Chairman’s OfficeDean’s OfficeManagementDistinguished FellowsFaculty and ResearchAssociate Research Fellows, Senior Analysts and Research AnalystsVisiting FellowsAdjunct FellowsAdministrative Staff
  • Research
      Research CentresCentre for Multilateralism Studies (CMS)Centre for Non-Traditional Security Studies (NTS Centre)Centre of Excellence for National SecurityInstitute of Defence and Strategic Studies (IDSS)International Centre for Political Violence and Terrorism Research (ICPVTR)
      Research ProgrammesNational Security Studies Programme (NSSP)Social Cohesion Research Programme (SCRP)Studies in Inter-Religious Relations in Plural Societies (SRP) Programme
      Other ResearchFuture Issues and Technology ClusterResearch@RSISScience and Technology Studies Programme (STSP) (2017-2020)
  • Graduate Education
      Graduate Programmes OfficeExchange Partners and ProgrammesHow to ApplyFinancial AssistanceMeet the Admissions Team: Information Sessions and other eventsRSIS Alumni
  • Outreach
      Global NetworksAbout Global NetworksRSIS Alumni
      Executive EducationAbout Executive EducationSRP Executive ProgrammeTerrorism Analyst Training Course (TATC)
      International ProgrammesAbout International ProgrammesAsia-Pacific Programme for Senior Military Officers (APPSMO)Asia-Pacific Programme for Senior National Security Officers (APPSNO)International Conference on Cohesive Societies (ICCS)International Strategy Forum-Asia (ISF-Asia)
  • Publications
      RSIS PublicationsAnnual ReviewsBooksBulletins and NewslettersRSIS Commentary SeriesCounter Terrorist Trends and AnalysesCommemorative / Event ReportsFuture IssuesIDSS PapersInterreligious RelationsMonographsNTS InsightPolicy ReportsWorking Papers
      External PublicationsAuthored BooksJournal ArticlesEdited BooksChapters in Edited BooksPolicy ReportsWorking PapersOp-Eds
      Glossary of AbbreviationsPolicy-relevant Articles Given RSIS AwardRSIS Publications for the YearExternal Publications for the Year
  • Media
      Cohesive SocietiesSustainable SecurityOther Resource PagesNews ReleasesSpeechesVideo/Audio ChannelExternal Podcasts
  • Events
  • Contact Us
    • Connect with Us

      rsis.ntu
      rsis_ntu
      rsisntu
      rsisvideocast
      school/rsis-ntu
      rsis.sg
      rsissg
      RSIS
      RSS
      Subscribe to RSIS Publications
      Subscribe to RSIS Events

      Getting to RSIS

      Nanyang Technological University
      Block S4, Level B3,
      50 Nanyang Avenue,
      Singapore 639798

      Click here for direction to RSIS

      Get in Touch

    Connect
    Search
    • RSIS
    • Publication
    • RSIS Publications
    • Rethinking the ‘Quantum Apocalypse’
    • Annual Reviews
    • Books
    • Bulletins and Newsletters
    • RSIS Commentary Series
    • Counter Terrorist Trends and Analyses
    • Commemorative / Event Reports
    • Future Issues
    • IDSS Papers
    • Interreligious Relations
    • Monographs
    • NTS Insight
    • Policy Reports
    • Working Papers

    CO22050 | Rethinking the ‘Quantum Apocalypse’
    Shantanu Sharma, Manoj Harjani

    20 May 2022

    download pdf

    SYNOPSIS

    Proponents of an imminent “quantum apocalypse” – where quantum computers are sufficiently powerful to render current data encryption methods vulnerable – must reckon with the significant obstacles facing quantum computing. The issue ahead for policymakers will be to ensure a timely and sustainable transition to quantum-resistant encryption.

    A close up view of the IBM Q quantum computer
    A close-up view of the IBM Q quantum computer. The processor is in the silver-coloured cylinder. Quantum computers are many times more powerful than current ‘classical’ computers.— CNET

    COMMENTARY

    EARLIER THIS year, the White House issued a memorandum mandating American government agencies transition relevant systems to quantum-resistant encryption. In a similar vein, the European Union allocated €11 million in 2022 to fund research on transitioning to quantum-resistant encryption.

    Other countries are following suit. These efforts are motivated by the potential threat posed by quantum computers to current encryption methods that are widely deployed to secure data within communication protocols, authentication frameworks, and digital signing mechanisms.

    Reassessing the Quantum Supremacy Race

    Quantum computers harness the principles of quantum mechanics to perform calculations with qubits, in contrast to “classical” computers that rely on bits. With qubits, data can be represented by 0s and 1s at the same time, whereas bits are binary and can only represent data as 0 or 1. This allows quantum computers to solve certain types of computational problems more efficiently than classical computers.

    Current encryption methods rely on the fact that certain computational problems cannot be easily solved by existing classical computers. However, once quantum computers eventually outperform the fastest classical computers for solving these challenging problems efficiently, any data secured by current encryption methods would be rendered vulnerable.

    The timeline for a so-called “quantum apocalypse” therefore depends on a sufficiently powerful quantum computer being developed. To this end, many countries and companies are building increasingly advanced prototypes, leading to what some are describing as a race for “quantum supremacy”, which in turn is raising fears of an imminent quantum apocalypse, potentially within this decade.

    Although the competition to achieve quantum supremacy is an important development, it obscures the reality that merely outperforming classical computers alone is insufficient to cause a quantum apocalypse.

    To break current encryption methods, considerably more powerful quantum computers are needed, and there are significant challenges to overcome as they are difficult to design, build, and operate. This primarily stems from the fact that quantum systems are easily disturbed by even the slightest interactions with their environment, such as a change in temperature.

    Furthermore, a multi-year effort by the US National Institute of Standards and Technology (NIST) is seeking to develop standardised algorithms for quantum-resistant encryption. This is because there are currently several methods proposed that need to be evaluated and proven to be resistant to feasible attacks. NIST’s quantum-resistant encryption algorithms are expected to be finalised between 2022 and 2024 and widely adopted globally.

    Fighting Quantum with Quantum?

    However, having standardised quantum-resistant encryption available does not mean the threat to data secured by current encryption methods is addressed entirely. NIST estimates that between five to 15 years are needed in a best-case scenario before the new quantum-resistant cryptographic standards will be sufficiently adopted.

    This leaves a considerable window for malign actors to carry out cyber-attacks and steal data that could potentially be decrypted by quantum computers in future. A 2021 report by Booz Allen Hamilton argued that organisations should expect theft or interception of data with long-term intelligence value by Chinese actors. Nevertheless, any country developing quantum computers could potentially do the same.

    As a result, some countries are concurrently developing new data protection methods using quantum technology, particularly to protect data with long-term intelligence value. Quantum key distribution (QKD) – which takes advantage of how sensitive quantum systems are to observation and interaction – is theoretically unbreakable even by a quantum computer, since it does not depend on the difficulty of solving a computational problem.

    Several countries have invested in building and operationalising QKD networks, and China’s efforts have been particularly ambitious. In 2016, China launched the world’s first quantum communication satellite, and subsequently integrated this with an extensive ground-based network. Singapore too, has announced a multi-year project to build a National Quantum-Safe Network over the coming three years.

    Like quantum-resistant encryption, however, QKD networks are still nascent and may not be as fool-proof as we think. The US National Security Agency, for example, has highlighted several potential limitations, including increased risks for denial of service, insider threats, and difficulties with validation and needing specialised equipment.

    The Road Ahead

    Technological answers to the quantum apocalypse in the form of quantum-resistant encryption and QKD networks are therefore not a silver bullet. Governments and companies will also have to address various organisational and operational issues that already pose a challenge for implementing traditional cybersecurity.

    There will be a need to take stock of existing systems, assess future needs, and prepare organisations for an eventual transition to suitable countermeasures.

    However, engaging in this process is likely to be out of reach for many smaller organisations, and governments will have to step in, particularly to safeguard companies involved in critical infrastructure and developing sensitive technologies. Furthermore, there will be a need to build the capabilities of information security officers and in-house cybersecurity teams.

    In Singapore’s case, it should build on the success of existing efforts to improve cybersecurity to get a head-start on managing the threat from a quantum apocalypse. Initiatives such as Cyber Security Agency of Singapore’s Cybersecurity Labelling Scheme, as well as initiatives for certifications and to promote the use of pre-approved solutions, could be expanded accordingly in tandem with focused engagement for strategically significant companies.

    Indeed, Singapore’s future as a digital nation and as a key player in quantum technology could well depend on its ability to achieve this transition. Investing in preparing organisations to secure their networks and systems using quantum-resistant encryption or QKD will arguably be as important as continuing to invest in advanced research and new quantum technology applications.

    About the Authors

    Shantanu Sharma is a Senior Analyst with the Centre of Excellence for National Security (CENS) and Manoj Harjani a Research Fellow with the Future Issues and Technology (FIT) research cluster at the S. Rajaratnam School of International Studies (RSIS), Nanyang Technological University (NTU), Singapore.

    Categories: RSIS Commentary Series / Country and Region Studies / Cybersecurity, Biosecurity and Nuclear Safety / Singapore and Homeland Security / East Asia and Asia Pacific / South Asia / Southeast Asia and ASEAN / Global
    comments powered by Disqus

    SYNOPSIS

    Proponents of an imminent “quantum apocalypse” – where quantum computers are sufficiently powerful to render current data encryption methods vulnerable – must reckon with the significant obstacles facing quantum computing. The issue ahead for policymakers will be to ensure a timely and sustainable transition to quantum-resistant encryption.

    A close up view of the IBM Q quantum computer
    A close-up view of the IBM Q quantum computer. The processor is in the silver-coloured cylinder. Quantum computers are many times more powerful than current ‘classical’ computers.— CNET

    COMMENTARY

    EARLIER THIS year, the White House issued a memorandum mandating American government agencies transition relevant systems to quantum-resistant encryption. In a similar vein, the European Union allocated €11 million in 2022 to fund research on transitioning to quantum-resistant encryption.

    Other countries are following suit. These efforts are motivated by the potential threat posed by quantum computers to current encryption methods that are widely deployed to secure data within communication protocols, authentication frameworks, and digital signing mechanisms.

    Reassessing the Quantum Supremacy Race

    Quantum computers harness the principles of quantum mechanics to perform calculations with qubits, in contrast to “classical” computers that rely on bits. With qubits, data can be represented by 0s and 1s at the same time, whereas bits are binary and can only represent data as 0 or 1. This allows quantum computers to solve certain types of computational problems more efficiently than classical computers.

    Current encryption methods rely on the fact that certain computational problems cannot be easily solved by existing classical computers. However, once quantum computers eventually outperform the fastest classical computers for solving these challenging problems efficiently, any data secured by current encryption methods would be rendered vulnerable.

    The timeline for a so-called “quantum apocalypse” therefore depends on a sufficiently powerful quantum computer being developed. To this end, many countries and companies are building increasingly advanced prototypes, leading to what some are describing as a race for “quantum supremacy”, which in turn is raising fears of an imminent quantum apocalypse, potentially within this decade.

    Although the competition to achieve quantum supremacy is an important development, it obscures the reality that merely outperforming classical computers alone is insufficient to cause a quantum apocalypse.

    To break current encryption methods, considerably more powerful quantum computers are needed, and there are significant challenges to overcome as they are difficult to design, build, and operate. This primarily stems from the fact that quantum systems are easily disturbed by even the slightest interactions with their environment, such as a change in temperature.

    Furthermore, a multi-year effort by the US National Institute of Standards and Technology (NIST) is seeking to develop standardised algorithms for quantum-resistant encryption. This is because there are currently several methods proposed that need to be evaluated and proven to be resistant to feasible attacks. NIST’s quantum-resistant encryption algorithms are expected to be finalised between 2022 and 2024 and widely adopted globally.

    Fighting Quantum with Quantum?

    However, having standardised quantum-resistant encryption available does not mean the threat to data secured by current encryption methods is addressed entirely. NIST estimates that between five to 15 years are needed in a best-case scenario before the new quantum-resistant cryptographic standards will be sufficiently adopted.

    This leaves a considerable window for malign actors to carry out cyber-attacks and steal data that could potentially be decrypted by quantum computers in future. A 2021 report by Booz Allen Hamilton argued that organisations should expect theft or interception of data with long-term intelligence value by Chinese actors. Nevertheless, any country developing quantum computers could potentially do the same.

    As a result, some countries are concurrently developing new data protection methods using quantum technology, particularly to protect data with long-term intelligence value. Quantum key distribution (QKD) – which takes advantage of how sensitive quantum systems are to observation and interaction – is theoretically unbreakable even by a quantum computer, since it does not depend on the difficulty of solving a computational problem.

    Several countries have invested in building and operationalising QKD networks, and China’s efforts have been particularly ambitious. In 2016, China launched the world’s first quantum communication satellite, and subsequently integrated this with an extensive ground-based network. Singapore too, has announced a multi-year project to build a National Quantum-Safe Network over the coming three years.

    Like quantum-resistant encryption, however, QKD networks are still nascent and may not be as fool-proof as we think. The US National Security Agency, for example, has highlighted several potential limitations, including increased risks for denial of service, insider threats, and difficulties with validation and needing specialised equipment.

    The Road Ahead

    Technological answers to the quantum apocalypse in the form of quantum-resistant encryption and QKD networks are therefore not a silver bullet. Governments and companies will also have to address various organisational and operational issues that already pose a challenge for implementing traditional cybersecurity.

    There will be a need to take stock of existing systems, assess future needs, and prepare organisations for an eventual transition to suitable countermeasures.

    However, engaging in this process is likely to be out of reach for many smaller organisations, and governments will have to step in, particularly to safeguard companies involved in critical infrastructure and developing sensitive technologies. Furthermore, there will be a need to build the capabilities of information security officers and in-house cybersecurity teams.

    In Singapore’s case, it should build on the success of existing efforts to improve cybersecurity to get a head-start on managing the threat from a quantum apocalypse. Initiatives such as Cyber Security Agency of Singapore’s Cybersecurity Labelling Scheme, as well as initiatives for certifications and to promote the use of pre-approved solutions, could be expanded accordingly in tandem with focused engagement for strategically significant companies.

    Indeed, Singapore’s future as a digital nation and as a key player in quantum technology could well depend on its ability to achieve this transition. Investing in preparing organisations to secure their networks and systems using quantum-resistant encryption or QKD will arguably be as important as continuing to invest in advanced research and new quantum technology applications.

    About the Authors

    Shantanu Sharma is a Senior Analyst with the Centre of Excellence for National Security (CENS) and Manoj Harjani a Research Fellow with the Future Issues and Technology (FIT) research cluster at the S. Rajaratnam School of International Studies (RSIS), Nanyang Technological University (NTU), Singapore.

    Categories: RSIS Commentary Series / Country and Region Studies / Cybersecurity, Biosecurity and Nuclear Safety / Singapore and Homeland Security

    Popular Links

    About RSISResearch ProgrammesGraduate EducationPublicationsEventsAdmissionsCareersVideo/Audio ChannelRSIS Intranet

    Connect with Us

    rsis.ntu
    rsis_ntu
    rsisntu
    rsisvideocast
    school/rsis-ntu
    rsis.sg
    rsissg
    RSIS
    RSS
    Subscribe to RSIS Publications
    Subscribe to RSIS Events

    Getting to RSIS

    Nanyang Technological University
    Block S4, Level B3,
    50 Nanyang Avenue,
    Singapore 639798

    Click here for direction to RSIS

    Get in Touch

      Copyright © S. Rajaratnam School of International Studies. All rights reserved.
      Privacy Statement / Terms of Use
      Help us improve

        Rate your experience with this website
        123456
        Not satisfiedVery satisfied
        What did you like?
        0/255 characters
        What can be improved?
        0/255 characters
        Your email
        Please enter a valid email.
        Thank you for your feedback.
        This site uses cookies to offer you a better browsing experience. By continuing, you are agreeing to the use of cookies on your device as described in our privacy policy. Learn more
        OK
        Latest Book
        more info