Post-quantum cryptography's need is predicated on traditional, established cryptographic problems being quickly solved by a quantum computer. However, quantum computers are still under development, and have yet to demonstrated a large scale test of Shor's algorithm, verifying that a quantum speed-up mechanism is possible, and out-performs a classical computer on such problems. In 2019, a team using the
IBM Q quantum computer could factor the numbers 15 and 21, but
not 35. Other attempts have been made to simulate quantum computers for larger numbers, but the simulations had no quantum advantage (i.e a speed-up over a classical computer). While the
integer factorization,
discrete logarithm, and
elliptic-curve discrete logarithm problems are potentially broken by the proposed quantum speed-up mechanism, none of the cryptography based on these mathematically difficult problems have been proven unsafe, nor mathematically broken outside of Shor's algorithm, or its derivatives. These cryptograpic systems are used worldwide, and have been extensively tested for vulnerabilities for several decades. Additionally, while Shor's algorithm proposes a
polynomial time (i.e. fast) solution, via a quantum period-finding mechanism (i.e. finding a repeating period where the quantum computer tests all possible periods in parallel, then collapsing on correct a solution, or solutions), such a speed-up has never been proven to exist at scale. Mathematicians
Stephen Wolfram and Christopher Wolfram have created simulated models based on Branchial Graphs to mimic quantum mechanics, and by extension can emulate systems utilized by quantum computers. Their research lead Stephen to publicly express mild doubts about the proposed
quantum speed-up mechanism's existence, related to the systematic collapse/unwinding of the entangle quantum states down to a usable, error-corrected solution. That is,
doubts about the mechanism responsible for the
theoretical quantum advantage utilized by future quantum computers, at scale, where a large number of fully entangled qubits are capable of running Shor's Algorithm against a modern classical problem (e.g.
RSA-2048, utilizing
integer factorization). In 2013,
Edward Snowden's NSA leaks confirmed that the largest supercomputers of the time could not break
correctly implemented public key crypto systems. Also, the
NSA had not found a mathematical shortcut, despite being the largest employer of mathematicians in the world. Security analyst and cryptographer,
Bruce Schneier, who had access to the Snowden archive, concluded that the math was never broken. Taken in aggregate, if the above criticisms prove to be true, then the need for
post-quantum cryptography is put into question, along with the need to switch modern business infrastructure onto
less-proven cryptographic schemes. == See also ==