Podcast
Root Causes 435: The PQC "Q Day" Is Not That Simple


Hosted by
Tim Callan
Chief Compliance Officer
Jason Soroko
Fellow
Original broadcast date
October 25, 2024
The PQC community likes to debate when crypto relevant quantum computers will be available, which is sometimes called "Q day." In this episode we explain how radically oversimplified this concept is and dive into the nuances of what a "cryptographically relevant quantum computer" really will be.
Podcast Transcript
And they can vary dramatically in terms of when they are. So then you go, well, all that's fine and dandy, but that's also not helpful, Tim. So what are we going to do in the real world? I think we want to ask this question when does cryptographic relevance occur because it's a big difference between, is it five years from now, or is it 30 years from now? Extremely important. A lot of decisions are made differently based on the answer to that question. What you probably have to do to do that, and I don't think I've seen this ever done, is you have to sort of agree on some benchmarks. You got to say, we're going to say for this encryption, it can be broken in this amount of time. And we're going to agree - whatever it is, a week - and we're going to agree that that doesn't apply to every circumstance, but what it does is it gets us to the point where it can start to have a meaningful conversation. So I can say, well, when does cryptographic relevance occur if we have a predefined definition we're all going to agree on and then you could go and have the debates and talk to the things and maybe it's in 2027 and maybe it's in 2037 and we fight about that. But at least we have a way to try to put a peg in the calendar, of course, by when we think this is going to happen.
So in other words, if we really are talking about Shor's algorithm and its application, then quantum computers exist right now, but they don't have enough stable qubits to be able to solve the current, say, RSA-2048, within a reasonable amount of time. But if you follow Professor Mosca’s ideas which has followed perfectly well, even though you see these technical journalism articles that talk about, oh my god, gigantic leap in the number of quantum stable quantum bits. Well if you actually plot it on a chart, it's linear, just the way Professor Mosca said. Therefore, that means we probably won't have this Eureka unless there is truly a difference in the way engineering is done. But if you just follow the linearity, there's an inevitability that there will be a sufficient number of qubits for Shor’s algorithm within a certain amount of time, and so therefore that's the way that the stake in the ground has been made over time. What I would say, though, is from a pragmatic standpoint, and I love the way Bruno Couillard, on our podcast, talked about this. He said, when the panic button is hit, then the people who are most risk averse - we're talking about militaries. We're talking about big finance, government. Those people are gonna be like - -
Setting aside all of the weaselly things you and I just said about matters on the value of the secret and the size of the encryption and all that stuff. At the end of the day, if we could sort of normalize all that, then we could have a meaningful investigation of saying, okay, this normalized benchmark, whatever it is, is that coming in 10 years? Is it coming in 20 years? Or five years or whatever? And that would help to get at a very important question that’s real immaterial that really matters, which is, how quickly is the march toward crypto relevancy occurring. And, we could have useful conversations about that. The problem I have now is, you do a survey of a bunch of experts, and something comes back, and it's all over the map in terms of when we hit cryptographic relevancy. But then I say, I don't see anything in this research to indicate that we're talking apples to apples.
Professor Mosca himself, right, his probabilities kind of peak around 2030 timeframe. I don't think he's changed that. I'd love to talk with him and see whether or not what his current thinking is, but I think we keep asking him the same question, he might give us the same answer. 2030. He has come up with his own criteria about why, why that is. But I think that we need a wider - because we don't have agreement. We don't really have full agreement on it, but then again, I think that let's talk truly pragmatically. Like let's make a decision without having all the information first.
And that is, let's take Professor Mosca seriously, and a lot of other people who circle around that same date, who've thought about this very deeply. And I think that you and I talk a lot about certificate agility. We talk about that as the first steps in becoming crypto agile. And so therefore, with 90 day coming, 90 day certificates coming, and, mississuance events that have caused all kinds of pain recently, I think that certificate agility, if you're not doing that, you're not taking your cryptography seriously. Period. And so if you're going to take it seriously, and you do that, you've already taken the first steps towards crypto agility. But what does it mean in the real world? And I think, I think, this is just a thought, before we can really do the hard work - and we're not going to do that in this podcast - but let's do the hard work eventually as an industry of saying, what are the criteria that we can all agree upon. But I think what we have to face is this. Whether your risk continuum is, oh my God, if it's cracked in 100 years, that's unacceptable risk to me. Or most of us aren't going to wait till it takes five minutes to crack RSA-2048.
So there's that continuum. But I would say this. Bruno Couillard, who was on the podcast - and I keep bringing this up because it's a somewhat simple and profound statement that he said, in that it's probably going to take several years, three, four years, before we kind of walk out of the problem once the panic buttons hit.
So from a pragmatic, truly pragmatic standpoint, let's assume a button is hit. Well, I don't think you have to deprecate on day one. It'd be nice if you were ready ahead of time. But in reality, most people aren't. And so therefore there's gonna be three, four years before we really all truly, as all industries, have our act together. So therefore Bruno said this, and I'm going to repeat it, because it's very, very relevant to what we're talking about in this subject. That is, we're going to live for three, four years where some systems are not fully secure. Not secure.
And so you're going to have systems that are not secure from a cryptographic standpoint for that long because they're running classic algorithms. And until everything can be swapped out, these systems are gonna be unsecure, but at least perhaps on day one, when panic button is hit, it's like, okay, well, what are the crown jewels I'm dealing with here, and is my risk continuum on the stuff that's not secure okay to be in this insecure gray zone, because it takes current quantum computers, 100 years to break 2048.
Well, then you're not too worried on day one. But, I bet you by year four, after that panic buttons hit, you're starting to worry really badly, and you might see that curve inflection point shift so that, yeah, now it's five minutes for a quantum computer to break everything, because stable qubits are just moving along.
Here's the elephant in the room, Tim, that I'm going to add to this as well, just as part of the party of confusion to all of this.

