Person typing on keyboard at computer in dark room.
Généré par l'IA / Generated using AI
π Science and technology π Industry
How quantum technology is changing the world

Cryptography : how to protect critical systems in the quantum era

with Christophe Gaie, Head of the Engineering and Digital Innovation Division at the Prime Minister's Office and Jean Langlois-Berthelot, Doctor of Applied Mathematics and Head of Division in the French Army
On February 19th, 2025 |
4 min reading time
Christophe Gaie
Christophe Gaie
Head of the Engineering and Digital Innovation Division at the Prime Minister's Office
Jean LANGLOIS-BERTHELOT
Jean Langlois-Berthelot
Doctor of Applied Mathematics and Head of Division in the French Army
Key takeaways
  • While quantum computing is a major technological revolution, it also represents an unprecedented threat to digital security.
  • A quantum computer could, in a matter of hours, solve asymmetric encryption algorithms (which secure electronic communications)
    that would take conventional computers thousands of years to solve.
  • The development of such machines could have disastrous consequences for governments (industrial espionage, manipulation of elections, etc.).
  • It is therefore imperative that governments adopt post-quantum cryptography by developing encryption algorithms that are resistant to quantum attacks.
  • To guarantee the security of government services, a thorough assessment of the risks associated with quantum technologies must be carried out.

The advent of quan­tum com­pu­ting repre­sents a major tech­no­lo­gi­cal revo­lu­tion, but also an unpre­ce­den­ted threat to digi­tal secu­ri­ty. First of all, quan­tum com­pu­ting holds great poten­tial in terms of data sto­rage and com­pu­ting power, as well as mul­tiple appli­ca­tions in the fields of simu­la­tion and opti­mi­sa­tion, with revo­lu­tio­na­ry pros­pects in the che­mi­cal, phar­ma­ceu­ti­cal and digi­tal indus­tries for example1. It the­re­fore repre­sents a tech­no­lo­gi­cal break­through that could bring many bene­fits to a socie­ty cur­rent­ly facing major eco­no­mic and socie­tal chal­lenges2.

Asym­me­tric encryp­tion algo­rithms, com­mon­ly used to secure elec­tro­nic com­mu­ni­ca­tions, are par­ti­cu­lar­ly vul­ne­rable. While conven­tio­nal com­pu­ters take thou­sands of years to solve these pro­blems, a quan­tum com­pu­ter could do so in just a few hours, as illus­tra­ted by Shor’s algo­rithm des­cri­bed in 19943, which is capable of fac­to­ring large num­bers expo­nen­tial­ly fas­ter than conven­tio­nal methods. In fact, the fac­to­ri­sa­tion pro­blem posed by cer­tain encryp­tion algo­rithms (in par­ti­cu­lar RSA) can be trans­for­med into a pro­blem of fin­ding a per­iod in a func­tion ; sol­ving this second pro­blem is acce­le­ra­ted by the super­po­si­tion of quan­tum states4. Simi­lar­ly, Gro­ver’s algo­rithm5 threa­tens sym­me­tric encryp­tion mecha­nisms (AES) and hash func­tions (SHA).

The deve­lop­ment of machines capable of exploi­ting this vul­ne­ra­bi­li­ty could have disas­trous conse­quences for govern­ments. These could include acts of indus­trial espio­nage, sabo­tage of cri­ti­cal sys­tems, iden­ti­ty theft and even mani­pu­la­tion of elec­tions, with signi­fi­cant reper­cus­sions for natio­nal secu­ri­ty and social sta­bi­li­ty. Howe­ver, in 2025, quan­tum com­pu­ters are still at the expe­ri­men­tal stage. Only orga­ni­sa­tions with consi­de­rable resources and advan­ced tech­no­lo­gi­cal skills are capable of imple­men­ting these actions6. To put it sim­ply, govern­ments need to pro­tect them­selves against powers capable of deve­lo­ping “nuclear weapons”.

The need for a transition to post-quantum cryptography

To deal with this threat, it is impe­ra­tive that govern­ments anti­ci­pate and imple­ment a stra­te­gy for the tran­si­tion to post-quan­tum cryp­to­gra­phy. This approach involves deve­lo­ping encryp­tion algo­rithms that are resis­tant to quan­tum attacks, the­re­by gua­ran­teeing the secu­ri­ty of com­mu­ni­ca­tions in the era of quan­tum com­pu­ting. These algo­rithms must not be based on dis­crete fac­to­ri­sa­tion or loga­rithm pro­blems, which are vul­ne­rable to quan­tum technology.

The US Natio­nal Ins­ti­tute of Stan­dards and Tech­no­lo­gy (NIST) has selec­ted three of the most secure and effi­cient post-quan­tum algo­rithms fol­lo­wing a rigo­rous selec­tion pro­cess7 :

  • ML-KEM (ori­gi­nal­ly known as Crys­tals-Kyber), desi­gned to secure access to sites via a public channel.
  • ML-DSA (for­mer­ly Crys­tals-Dili­thium), which gene­rates elec­tro­nic signa­ture keys for secure docu­ment exchanges and communications.
  • SLH-DSA (for­mer­ly Sphincs+), which gene­rates smal­ler public elec­tro­nic signa­ture keys.

The ML-KEM and ML-DSA algo­rithms are based on the dif­fi­cul­ty of fin­ding short vec­tors in a struc­tu­red Eucli­dean net­work. Fur­ther­more, as explai­ned in an ANSSI (Agence natio­nale de la sécu­ri­té des sys­tèmes d’in­for­ma­tion) ana­ly­sis note8, there is a pos­si­bi­li­ty that a weak­ness will be dis­co­ve­red, enabling a rapid reso­lu­tion of the cryp­to­gra­phic pro­blem posed. The SLH-DSA algo­rithm is based on the secu­ri­ty of hash functions.

In addi­tion, ANSSI recom­mends the use of hybri­di­sa­tion, which consists of com­bi­ning post-quan­tum asym­me­tric algo­rithms, still under deve­lop­ment, with well-esta­bli­shed and pro­ven tra­di­tio­nal asym­me­tric encryp­tion methods. This com­bi­na­tion offers double pro­tec­tion until post-quan­tum algo­rithms reach a suf­fi­cient level of matu­ri­ty to gua­ran­tee long-term secu­ri­ty on their own.

The tran­si­tion to these new algo­rithms requires a great deal of work and will the­re­fore be gra­dual. It will take seve­ral years to replace all exis­ting sys­tems with secure solu­tions. To achieve this, a signi­fi­cant invest­ment in the cryp­to­gra­phic skills of the staff res­pon­sible for pro­tec­ting sys­tems, data and digi­tal exchanges must be made now, over a mul­ti-year per­iod. Indeed, a later invest­ment is like­ly to gene­rate very high adap­ta­tion efforts in a par­ti­cu­lar­ly constrai­ned time­frame, with high risks vis-à-vis exter­nal entities.

Assessing risks, identifying mitigation measures, obtaining resources and implementing security projects

To gua­ran­tee the secu­ri­ty of state ser­vices, a tho­rough assess­ment of the risks asso­cia­ted with quan­tum tech­no­lo­gies must be car­ried out. This involves not only unders­tan­ding the capa­bi­li­ties of quan­tum com­pu­ters but also asses­sing the poten­tial impact on exis­ting secu­ri­ty sys­tems. In par­ti­cu­lar, it is essen­tial to iden­ti­fy the most sen­si­tive data, pro­cesses and exchanges, so as to focus secu­ri­ty efforts on the most cri­ti­cal points. To do this, the deli­ve­rables of the EBIOS (Expres­sion des Besoins et Iden­ti­fi­ca­tion des Objec­tifs de Sécu­ri­té – Expres­sion of Needs and Iden­ti­fi­ca­tion of Secu­ri­ty Objec­tives) method should be used for the entire infor­ma­tion sys­tem under consi­de­ra­tion9.

Post-quan­tum risk assess­ment requires a glo­bal and coherent approach. It is vital to adapt exis­ting risk ana­lyses, which are based on the EBIOS method, to incor­po­rate the new threats posed by the emer­gence of quan­tum com­pu­ting. It is also essen­tial to coor­di­nate the ana­lyses car­ried out in iso­la­tion for each sys­tem or appli­ca­tion. An aggre­ga­tion phase is the­re­fore neces­sa­ry to obtain a sys­te­mic view of the risks and define a glo­bal secu­ri­ty stra­te­gy. This approach makes it pos­sible to iden­ti­fy the inter­de­pen­den­cies bet­ween the various ele­ments of the infor­ma­tion sys­tem and to put in place appro­priate pro­tec­tion measures.

The EBIOS method makes it pos­sible to iden­ti­fy not only the risks but also the sen­si­ti­vi­ty of the data held, which is cru­cial if the infor­ma­tion sys­tem is to be pro­tec­ted. It is essen­tial to dis­tin­guish bet­ween cri­ti­cal data, the loss of which could have a vital impact, and data that can be com­pro­mi­sed with fewer conse­quences. This assess­ment will make it pos­sible to prio­ri­tise pro­tec­tion efforts and ensure that secu­ri­ty mea­sures are adap­ted to the level of sen­si­ti­vi­ty of each type of data.

Consi­de­ra­tion should also be given to the pos­si­bi­li­ty of adap­ting secu­ri­ty pro­ce­dures by rever­ting to phy­si­cal means, such as paper, if neces­sa­ry. This approach can enhance the pro­tec­tion of sen­si­tive infor­ma­tion, par­ti­cu­lar­ly in high-risk situa­tions. The use of single-use codes is also a pro­mi­sing stra­te­gy. These codes, which have an expi­ry date of one to two months, can enhance secu­ri­ty by limi­ting the pos­si­bi­li­ties of unau­tho­ri­sed access.

Conclusion and outlook

In conclu­sion, the quan­tum threat repre­sents a major chal­lenge for the digi­tal secu­ri­ty of govern­ments and ope­ra­tors of vital impor­tance (ener­gy, com­mu­ni­ca­tions, trans­port, power, etc.). To meet these threats, it is essen­tial to anti­ci­pate them, invest in inno­va­tive solu­tions, mobi­lise human and finan­cial resources and pro­mote inter­na­tio­nal cooperation.

Quan­tum com­pu­ting will soon be capable of neu­tra­li­sing cur­rent encryp­tion sys­tems in record time, which means that we need to start adap­ting qui­ck­ly and tho­rough­ly right now. To achieve this, the tran­si­tion to post-quan­tum cryp­to­gra­phy will need to be cou­pled with robust secu­ri­ty mea­sures and increa­sed awa­re­ness, which are neces­sa­ry to gua­ran­tee our digi­tal sovereignty.

Final­ly, it is vital to take a glo­bal approach to the secu­ri­ty of digi­tal ser­vices, inte­gra­ting the tech­no­lo­gi­cal, sys­te­mic and human dimen­sions. The emer­gence of quan­tum tech­no­lo­gies is a major chal­lenge that needs to be addres­sed along­side cur­rent threats.

1Moh­se­ni, M., Read, P., Neven, H. et al. Com­mer­cia­lize quan­tum tech­no­lo­gies in five years. Nature 543, 171–174 (2017). https://​doi​.org/​1​0​.​1​0​3​8​/​5​4​3171a
2COCCIA, Mario. Dis­rup­tive inno­va­tions in quan­tum tech­no­lo­gies for social change. Jour­nal of Eco­no­mics Biblio­gra­phy, [S.l.], v. 9, n. 1, p. 21–39, apr. 2022. ISSN 2149–2387. Avai­lable at : <http://​ksp​jour​nals​.org/​i​n​d​e​x​.​p​h​p​/​J​E​B​/​a​r​t​i​c​l​e​/​v​i​e​w​/2287>. Date acces­sed : 02 Nov. 2024. http://​dx​.doi​.org/​1​0​.​1​4​5​3​/​j​e​b​.​v​9​i​1​.2287
3P. W. Shor, “Algo­rithms for quan­tum com­pu­ta­tion : dis­crete loga­rithms and fac­to­ring,” Pro­cee­dings 35th Annual Sym­po­sium on Foun­da­tions of Com­pu­ter Science, San­ta Fe, NM, USA, 1994, pp. 124–134, https://​doi​.org/​1​0​.​1​1​0​9​/​S​F​C​S​.​1​9​9​4​.​3​65700
4André Chailloux. L’algorithme quan­tique de Shor – Inter­stices.” Inter­stices, Novem­ber 4, 2020. https://​inter​stices​.info/​l​a​l​g​o​r​i​t​h​m​e​-​q​u​a​n​t​i​q​u​e​-​d​e​-​shor/
5Lov K. Gro­ver. 1996. A fast quan­tum mecha­ni­cal algo­rithm for data­base search. In Pro­cee­dings of the twen­ty-eighth annual ACM sym­po­sium on Theo­ry of Com­pu­ting (STOC ’96). Asso­cia­tion for Com­pu­ting Machi­ne­ry, New York, NY, USA, 212–219. https://​doi​.org/​1​0​.​1​1​4​5​/​2​3​7​8​1​4​.​2​37866
6Hen­riet, Loïc. “L’ordinateur quan­tique : tout com­prendre en 15 minutes.” Poly­tech­nique Insights, April 8, 2024. https://​www​.poly​tech​nique​-insights​.com/​t​r​i​b​u​n​e​s​/​s​c​i​e​n​c​e​/​l​o​r​d​i​n​a​t​e​u​r​-​q​u​a​n​t​i​q​u​e​-​t​o​u​t​-​c​o​m​p​r​e​n​d​r​e​-​e​n​-​1​5​-​m​i​n​utes/
7https://​incy​ber​.org/​a​r​t​i​c​l​e​/​n​i​s​t​-​p​u​b​l​i​e​-​t​r​o​i​s​-​a​l​g​o​r​i​t​h​m​e​s​-​c​h​i​f​f​r​e​m​e​n​t​-​p​o​s​t​-​q​u​a​n​t​ique/
8“Avis de l’ANSSI Sur La Migra­tion Vers La Cryp­to­gra­phie Post-Quan­tique (Sui­vi 2023)” https://cyber.gouv.fr/sites/default/files/document/Avis%20de%20l%27ANSSI%20sur%20la%20migration%20vers%20la%20cryptographie.pdf.
9Site ANSSI. “La méthode EBIOS Risk Mana­ger”, March 27, 2024, https://​cyber​.gouv​.fr/​l​a​-​m​e​t​h​o​d​e​-​e​b​i​o​s​-​r​i​s​k​-​m​a​nager

Support accurate information rooted in the scientific method.

Donate