Numerous challenges will come in the year 2030, but there is one such challenge you might have never considered. To understand this challenge, we must consult a report published by NASA and Google jointly in 2015. They declared in this report that their Quantum Computer called "1097 Qubit D-Wave" will be one of the most powerful computers the world will ever witness. The classical computers will never be able to compete with it after its launching in the world by 2030. It will be 100 million times more powerful than the computers in our homes. A problem a Quantum Computer solves in a second will take ten thousand years to be solved on a Classical Computer. One can't imagine the significant power of the Quantum Computer that is about to launch.
At present, companies have launched different variants of Quantum Computer, but it will be a complete wonder for the world. The world is becoming increasingly concerned about the potential threat known as the dilemma of quantum computers in 2030.
The process known as Year to Quantum "Y2Q" is coming in 2030. The biggest threat to humans today is Data Security because we have secured our precious and secret data with the help of cryptography codes including passwords, credit card numbers, etc. This kind of data can't be seen by anyone as it is hidden and locked with cryptography's help before sending from one place to another. But a computer with the power to process data of ten thousand years in a second can easily break these codes.
Bruno Huttner, Co-Chairman of the Quantum-Safe Security Working Group at the Cloud Security Alliance, coined the term "Y2Q," drawing a parallel to the 2000 crisis known as Y2K. As we transitioned from 1999 to 2000, there were widespread fears that banks might default due to software limitations that didn't account for the new date format. Concerns also arose about potential flight crashes and other issues, causing significant anxiety about the possible scenarios that Y2K could create. The transition occurred smoothly because extensive research was done to ensure its success.
Y2Q is expected to arrive in April 2030. This date is anticipated, and it is believed that quantum computers will be capable of breaking the encryption of all the data stored on conventional computers. This transition may occur within the next 10 to 20 years. The company that successfully launches the first quantum computer will have the potential to hack into all classical computing systems.
In our increasingly digital world, this shift could lead to numerous security issues. To address these concerns, a working group known as the National Institute of Standards and Technology (NIST) is in place to facilitate a smooth transition. As we move from classical computers to the first quantum computers, it will be NIST's responsibility to ensure that the data from conventional systems is protected during this critical period.
This company has developed four algorithms for data protection. The first algorithm is called Crystals-Kyber, which utilizes a public encryption technique. The remaining three algorithms are based on digital signatures. A common feature among all four algorithms is their reliance on a fundamental concept known as lattices, which are used for encoding and encryption. In algebra, a lattice is an abstract structure that plays a crucial role in these processes. The complexity of breaking these codes makes them highly secure.
When discussing algorithms and encryption, it's important to note that humans have been creating methods to keep their messages secret for a long time. Julius Caesar, a Roman general and statesman, needed a way to send confidential messages to his distant soldiers. He used a simple technique known as the Caesar Substitution algorithm, which involved a shift of three positions in the alphabet.
In 1974, an undergraduate student named Ralph Merkle from the University of California, Berkeley, proposed a revolutionary idea: instead of sending a key along with a coded message, we should encode messages in such a way that they can be decoded without sending the key. Initially, people ridiculed this concept, but over time, his work gained recognition and appreciation. He named his algorithm the Rivest-Shamir-Adleman (RSA) algorithm, which allows data to be encrypted using a public key accessible to everyone. Only individuals who possess the corresponding private key can decode the message.
Lattice structures are widely used in encryption and are considered one of the most secure types of structures. Designing a lattice is relatively simple, making it easy to encode data. However, decoding a lattice can be quite challenging.
When a point in such a lattice is selected, it decodes the entire letter based on its parameters and places it in a different position. As a result, it becomes extremely difficult for a computer to locate the new position of that point. This complexity makes lattice decoding a challenging task.
When using Lattice structures, two important factors must be carefully considered. First, the complexity of the encryption technique needs to be assessed; that is, we must determine whether it is easy for a computer to decode. Second, we should evaluate how much information can be transmitted from one location to another.
In this context, Lattice structures are attractive because they do not require high computational power and allow for efficient data transmission. However, with the advent of Quantum Computers on April 14, 2030, it will become much easier to break these codes.
The National Institute of Standards and Technology has proactively transitioned classical computers to utilize these algorithms, which are known as Quantum Resistant Encryptions. These powerful algorithms, referred to as Post-Quantum Encryptions, include Lattice-based techniques. If Quantum Computers can successfully decode Lattice structures, these algorithms will become ineffective, and our data will be accessible to anyone. Advanced computers will then have the capability to predict Lattice structures and pinpoint the specific locations that encrypt our data.
We must prepare to secure our data; otherwise, all information, whether related to defense, commercial interests, or sensitive secrets, will remain unprotected.