Hitachi Group Global Network




Middle East and Africa



Do Quantum Computers Mean the End of HTTPS?
You are here: Home \ Cryptography \ Do Quantum Computers Mean the End of HTTPS?
Do Quantum Computers Mean the End of HTTPS
Posted on Wednesday, July 20th, 2016 by

In my previous article, “5 things you should know about HTTPS encryption“, I explained how HTTPS can fail to encrypt your web connection when web servers are not well configured and end up not using the 2048-bit prime key. As mentioned, this setup nowadays turns out to be the only secure one, compared to the use of weaker prime keys which are potentially vulnerable (the 512 prime key or the 1024 prime key). The security guaranteed by the 2048 prime key lies in the fact that most performing computers would spend thousands of years before being able to try out all the combinations necessary at decrypting the encrypted connections.
This is still valid today but might not be valid in the future when quantum computers could be common and used for malicious purpose.


Quantum computers are computation systems that make use of quantum phenomena to perform operations on data. Because of the properties of quantum bits (qubits), these machines have the ability to perform demanding operations on a very small number of bits compared to the number used by common digital system spread nowadays. While quantum computers will have huge benefits in multiple research areas, they could be maliciously used to solve complex problems that are at the base of modern cryptography.

Even though quantum computers are still small and experimental machines, Google considered this hypothesis and announced in an article posted in July 7th, 2016 (“Experimenting with Post-Quantum Cryptography”) to be working on a new cryptography algorithm called “post-quantum cryptography”. The project must guarantee that future connections would stay encrypted as now, and assure that any internet communication of today could not be retrospectively decrypted in 20-40 years, when large quantum computers could be built. At the base of this new algorithm, there is the adoption of the Ring Learning with Errors (RLWE) computational problem. Because of the presumed difficulty of solving the RLWE problem even on a quantum computer, RLWE-based cryptography may form the fundamental base for public key cryptography in the future just as the integer factorization and discrete algorithm problems have served as the base for public key cryptography since the early 1980s.

To be continued…

Nicandro Scarabeo
About author:
In his position as Senior Product Manager at Hitachi Systems Security, Nicandro Scarabeo has initiated and consolidated collaborations with universities from Italy, France and Canada. Having joined Above Security in 2010, he currently leads the company’s research unit with the goal of applying methods to correlate primary sensor security data, extracting knowledge from high volumes of security-related-data, introducing new sources of information for security analysis purposes and identifying methods to evaluate the performance of the system. Nicandro Scarabeo completed his Ph.D. at the University of Cassino and Southern Lazio, Italy, in the Department of Electrical and Information Engineering in March 2016. He obtained his Master’s degree from the Mobile Communication Engineering Department at Aalborg University, Denmark.

Latest Webinars | Watch Now


The Next Generation of Managed Security, in collaboration with PCM.

Watch Now

Reporting Data Privacy Obligations to the Board: A Practical Approach to Ongoing Compliance, in collaboration with Nymity.

Watch Now


Recent Videos

What is Penetration Testing?

What is a Vulnerability Assessment?

What is a Control Assessment?