Researchers Hone Cryptographic Algorithms to Stand Against Powerful Quantum Threat

October 19, 2022

October 19, 2022 — As the race to develop large-scale, reliable quantum computers gains speed, fortification efforts are ramping up to protect digital systems from a technology that could utterly obliterate their security. Commonwealth Cyber Initiative researchers at Virginia Tech and George Mason University are developing security protocols to fend off cyberattacks — both from today’s computers and from quantum computers coming down the pike.

CCI researcher Travis Morrison, assistant professor of mathematics, explores several different families of mathematical algorithms in post-quantum cryptography. Credit: Kelly Izlar, Virginia Tech.

In the interest of “prudence,” the U.S. National Institute of Standards and Technology (NIST) called upon the world’s cryptographers to craft and scrutinize encryption techniques that could resist attacks from powerful quantum computers. Six years later, in July 2022, NIST announced its first finalists, and Commonwealth Cyber Initiative researchers from Virginia Tech are among those who are working to make the selected algorithms more efficient and secure.

Prudent Protocols

Sensitive data like personal identifying information, online bank accounts, and medical records ­ as well as government and military communications are protected by cryptography — algorithms that safeguard data through encryption. Quantum computers can solve certain problems much faster than classical computers, thus sweeping aside the cryptosystems currently in place.

But what is the rationale for mounting a defense against a technology that’s still in development?

“First of all, we need to have techniques ready to prevent attacks before they become real-world problems. People are working on quantum computers as we speak, and they are making progress,” said Jason LeGrow, assistant professor of mathematics and Commonwealth Cyber Initiative fellow. “We need to be thinking about future-proofing our privacy. We don’t want the messages we send now to be compromised when someone has the means to decrypt them using more powerful technology than is available now.”

Authenticity, Integrity, and Encryption

Cryptography is the science of secret messages — but it’s not just about keeping information secret; it also verifies the authenticity of the person who sent the message and preserves message integrity so no one can tamper with it, said Travis Morrison, assistant professor in the Virginia Tech Department of Mathematics in the College of Science.

Different cryptographic protocols perform different jobs. The cryptographic algorithms selected by NIST are designed for two main cryptographic tasks: digital signatures, used for identity authentication and data integrity, and public-key encryption, which allows two parties to have a secure conversation without ever meeting each other.

“Take Amazon or Microsoft: Anybody or everybody wants to communicate with them, and they can’t do a new cryptosystem for each person,” said William Mahaney, a Commonwealth Cyber Initiative graduate researcher in math working with Morrison.

In public-key cryptography, a user has a public key and a private key. Sharing the public key doesn’t divulge the private key, but the two are mathematically linked. It is theoretically possible to tease out the private key from the public key.

(From left) Travis Morrison, William Mahaney, Nic Swanson, Gretchen Matthews, Jason LeGrow, and Chi Nguyen. Credit: Steven Mackay, Virginia Tech.

“One way to think about it is if you mix salt and sand — very easy to do, very difficult to undo. They are linked in the mixture,” said Gretchen Matthews, math professor and director of the Commonwealth Cyber Initiative. “Could you separate them? Yes, but it would take a long time.”

When it comes to the currently deployed cryptosystems, a “long time” is usually good enough.

“It’s not that this problem is impossible,” said Morrison. “We all factored in grade school. But if the key is long enough, then the amount of time it would take to factor is on the order of the age of the universe. This is what classical public-key cryptography bases its security on — that the problem is hard or takes a long time to solve.”

It’s also all about having the right tools for the job; a Bunsen burner makes separating salt from sand easy. With a quantum computer, most public-key cryptosystem problems become trivial.

The Threat and Wonder of Quantum Computation

“Quantum computers are dangerous to some cryptosystems because, in a matter of hours or days, they can solve the underlying math problems that would have taken more than a lifetime before,” said Mahaney, who is also the Julian Chin Ph.D. Fellow in Cybersecurity.

Classical computers deal in bits — 0s and 1s, this or that, yes or no, said Matthews.

“But when we consider quantum bits, a whole spectrum of possibilities opens up between 0 and 1,” said Matthews. Based on quantum mechanics, quantum computers behave in fundamentally different ways so that algorithms for certain types of computations are incredibly fast.

Post-Quantum Protection

“Post-quantum cryptographic systems are protocols that run on ordinary computer, but which we believe are secure even when an attacker has a quantum computer,” said LeGrow. You can run them on your cell phone, according to Morrison.

There are multiple subfields in mainstream post-quantum cryptography, said LeGrow, and experts in each subfield devise algorithms based on different mathematical frameworks. The families of algorithms have their respective strengths and weaknesses.

Code-based cryptography, which is in Matthews’ field of expertise, is the oldest scheme under consideration. These protocols are slower than some of the other systems, but researchers have had more time to scrutinize them for vulnerabilities.

Lattice-based systems, which Mahaney and Morrison are exploring, are faster but have large key sizes compared with current systems – not ideal for memory and bandwidth.

Isogeny-based schemes, which LeGrow and Morrison study, are at the other extreme, offering very small keys but running slower than other post-quantum schemes on average.

The NIST process aimed to define a suite of post-quantum cryptographic standards that use varied approaches for encryption and could serve as a toolbox of algorithms for different situations. The submissions were public so that the global cryptanalysis community could vet each one. Once an algorithm was submitted, “cryptanalysts would use every trick they could to break it,” said Mahaney. They swarmed and burrowed into every cranny of the system, sniffed out weakness in implementation or code, even in some cases how a computer or a network is set up – because if they didn’t find the cracks at this point, a hacker would later, when it could reveal private, proprietary, or classified information.

The NIST candidate pool was winnowed down until July, when NIST released the four initial candidates selected for standardization and announced a follow-up round for two remaining candidates — all from an original list of 82.

Among the schemes selected for standardization is a digital signature protocol known as FALCON. Morrison and Mahaney focus on algorithms to optimize the FALCON cryptosystems, which will be released as a full standard in the coming months. In collaboration with Krzysztof Gaj, a Commonwealth Cyber Initiative researcher from George Mason University, they are also looking at how susceptible these schemes are to side-channel attacks that take advantage of information leakage through timing, power consumption, and electromagnetic radiation.

Both candidates in the follow-up round are code-based algorithms, and Matthews and her team are developing families of codes with the goal of speeding up the algorithms without sacrificing security. Morrison’s and Matthews’ projects are both supported by the Commonwealth Cyber Initiative in Southwest Virginia.

As the NIST process comes to a close, an energized field of post-quantum cryptography continues to generate new techniques and algorithms for a wide array of security applications that will safeguard information today and in a quantum future.


Source: Kelly Izlar, Virginia Tech

 

Subscribe to HPCwire's Weekly Update!

Be the most informed person in the room! Stay ahead of the tech trends with industry updates delivered to you every week!

2024 Winter Classic: Meet the Roadrunners

May 4, 2024

This is the other team from the University of New Mexico. I mistakenly thought that one of their team members was going to make history by being the first competitor to compete for two different schools – but I was wro Read more…

2024 Winter Classic: Meet Channel Islands “A”

May 3, 2024

This is the second team from California State University, Channel Islands – or maybe it’s the first team? Not sure, but I do know they have two teams total, and this is one of them. As you’ll see in the video in Read more…

Intersect360 Research Takes a Deep Dive into the HPC-AI Market in New Report

May 3, 2024

A new report out of analyst firm Intersect360 Research is shedding some new light on just how valuable the HPC and AI market is. Taking both of these technologies as a singular unit, Intersect360 Research found that the Read more…

Hyperion To Provide a Peek at Storage, File System Usage with Global Site Survey

May 3, 2024

Curious how the market for distributed file systems, interconnects, and high-end storage is playing out in 2024? Then you might be interested in the market analysis that Hyperion Research is planning on rolling out over Read more…

2024 Winter Classic: Meet Team Jackson State

May 3, 2024

This is the second time we’re seeing a team from Jackson State university. The team features two veterans of the 2023 Winter Classic, which should help, but it’s also a team whose members are involved in a lot of oth Read more…

2024 Winter Classic: NASA Results Revealed!

May 2, 2024

In this edition of the Winter Classic Studio Update Show we reveal the results from the NASA BTIO Challenge. The benchmark, BTIO, is a subset of the NAS Parallel benchmark and NASA set up a formidable set of milestones, Read more…

Hyperion To Provide a Peek at Storage, File System Usage with Global Site Survey

May 3, 2024

Curious how the market for distributed file systems, interconnects, and high-end storage is playing out in 2024? Then you might be interested in the market anal Read more…

Qubit Watch: Intel Process, IBM’s Heron, APS March Meeting, PsiQuantum Platform, QED-C on Logistics, FS Comparison

May 1, 2024

Intel has long argued that leveraging its semiconductor manufacturing prowess and use of quantum dot qubits will help Intel emerge as a leader in the race to de Read more…

Stanford HAI AI Index Report: Science and Medicine

April 29, 2024

While AI tools are incredibly useful in a variety of industries, they truly shine when applied to solving problems in scientific and medical discovery. Research Read more…

IBM Delivers Qiskit 1.0 and Best Practices for Transitioning to It

April 29, 2024

After spending much of its December Quantum Summit discussing forthcoming quantum software development kit Qiskit 1.0 — the first full version — IBM quietly Read more…

Shutterstock 1748437547

Edge-to-Cloud: Exploring an HPC Expedition in Self-Driving Learning

April 25, 2024

The journey begins as Kate Keahey's wandering path unfolds, leading to improbable events. Keahey, Senior Scientist at Argonne National Laboratory and the Uni Read more…

Quantum Internet: Tsinghua Researchers’ New Memory Framework could be Game-Changer

April 25, 2024

Researchers from the Center for Quantum Information (CQI), Tsinghua University, Beijing, have reported successful development and testing of a new programmable Read more…

Intel’s Silicon Brain System a Blueprint for Future AI Computing Architectures

April 24, 2024

Intel is releasing a whole arsenal of AI chips and systems hoping something will stick in the market. Its latest entry is a neuromorphic system called Hala Poin Read more…

Anders Dam Jensen on HPC Sovereignty, Sustainability, and JU Progress

April 23, 2024

The recent 2024 EuroHPC Summit meeting took place in Antwerp, with attendance substantially up since 2023 to 750 participants. HPCwire asked Intersect360 Resear Read more…

Nvidia H100: Are 550,000 GPUs Enough for This Year?

August 17, 2023

The GPU Squeeze continues to place a premium on Nvidia H100 GPUs. In a recent Financial Times article, Nvidia reports that it expects to ship 550,000 of its lat Read more…

Synopsys Eats Ansys: Does HPC Get Indigestion?

February 8, 2024

Recently, it was announced that Synopsys is buying HPC tool developer Ansys. Started in Pittsburgh, Pa., in 1970 as Swanson Analysis Systems, Inc. (SASI) by John Swanson (and eventually renamed), Ansys serves the CAE (Computer Aided Engineering)/multiphysics engineering simulation market. Read more…

Intel’s Server and PC Chip Development Will Blur After 2025

January 15, 2024

Intel's dealing with much more than chip rivals breathing down its neck; it is simultaneously integrating a bevy of new technologies such as chiplets, artificia Read more…

Comparing NVIDIA A100 and NVIDIA L40S: Which GPU is Ideal for AI and Graphics-Intensive Workloads?

October 30, 2023

With long lead times for the NVIDIA H100 and A100 GPUs, many organizations are looking at the new NVIDIA L40S GPU, which it’s a new GPU optimized for AI and g Read more…

Choosing the Right GPU for LLM Inference and Training

December 11, 2023

Accelerating the training and inference processes of deep learning models is crucial for unleashing their true potential and NVIDIA GPUs have emerged as a game- Read more…

Baidu Exits Quantum, Closely Following Alibaba’s Earlier Move

January 5, 2024

Reuters reported this week that Baidu, China’s giant e-commerce and services provider, is exiting the quantum computing development arena. Reuters reported � Read more…

Shutterstock 1606064203

Meta’s Zuckerberg Puts Its AI Future in the Hands of 600,000 GPUs

January 25, 2024

In under two minutes, Meta's CEO, Mark Zuckerberg, laid out the company's AI plans, which included a plan to build an artificial intelligence system with the eq Read more…

AMD MI3000A

How AMD May Get Across the CUDA Moat

October 5, 2023

When discussing GenAI, the term "GPU" almost always enters the conversation and the topic often moves toward performance and access. Interestingly, the word "GPU" is assumed to mean "Nvidia" products. (As an aside, the popular Nvidia hardware used in GenAI are not technically... Read more…

Leading Solution Providers

Contributors

China Is All In on a RISC-V Future

January 8, 2024

The state of RISC-V in China was discussed in a recent report released by the Jamestown Foundation, a Washington, D.C.-based think tank. The report, entitled "E Read more…

Nvidia’s New Blackwell GPU Can Train AI Models with Trillions of Parameters

March 18, 2024

Nvidia's latest and fastest GPU, codenamed Blackwell, is here and will underpin the company's AI plans this year. The chip offers performance improvements from Read more…

Shutterstock 1285747942

AMD’s Horsepower-packed MI300X GPU Beats Nvidia’s Upcoming H200

December 7, 2023

AMD and Nvidia are locked in an AI performance battle – much like the gaming GPU performance clash the companies have waged for decades. AMD has claimed it Read more…

Eyes on the Quantum Prize – D-Wave Says its Time is Now

January 30, 2024

Early quantum computing pioneer D-Wave again asserted – that at least for D-Wave – the commercial quantum era has begun. Speaking at its first in-person Ana Read more…

The GenAI Datacenter Squeeze Is Here

February 1, 2024

The immediate effect of the GenAI GPU Squeeze was to reduce availability, either direct purchase or cloud access, increase cost, and push demand through the roof. A secondary issue has been developing over the last several years. Even though your organization secured several racks... Read more…

Intel Plans Falcon Shores 2 GPU Supercomputing Chip for 2026  

August 8, 2023

Intel is planning to onboard a new version of the Falcon Shores chip in 2026, which is code-named Falcon Shores 2. The new product was announced by CEO Pat Gel Read more…

GenAI Having Major Impact on Data Culture, Survey Says

February 21, 2024

While 2023 was the year of GenAI, the adoption rates for GenAI did not match expectations. Most organizations are continuing to invest in GenAI but are yet to Read more…

Q&A with Nvidia’s Chief of DGX Systems on the DGX-GB200 Rack-scale System

March 27, 2024

Pictures of Nvidia's new flagship mega-server, the DGX GB200, on the GTC show floor got favorable reactions on social media for the sheer amount of computing po Read more…

  • arrow
  • Click Here for More Headlines
  • arrow
HPCwire