Technology giant Meta is working to ward off a “quantum apocalypse,” which poses an imminent threat to modern cybersecurity and encryption standards across industries, including the encryption model used in blockchain technology.
During the company's latest MetaTech podcast, Meta engineers emphasized that the risks posed by quantum computing are significant enough to require immediate and urgent action, as finding a solution could take an enormous amount of time due to current technological limitations.
The company added that ensuring the protection of the asymmetric cryptography used in blockchain technology has become a top priority in recent months.
A looming threat
Sheran Lin, software engineering manager at Meta, said the company is working closely with standards bodies such as NIST, ISO and IETF to ensure its post-quantum cryptography (PQC) algorithms are rigorously verified and standardized.
Lin added that Meta is combining traditional algorithms, namely X25519, with Kyber to create post-quantum cryptography (PQC), resulting in a hybrid method that ensures Meta's systems are secure against both current and future threats.
This is also beneficial for blockchains, which are based on an asymmetric cryptography model that relies on public and private key pairs.
Meta cryptographer Rafael Misozki explained that this model is particularly vulnerable because quantum algorithms can efficiently solve complex mathematical problems, adding that securing these systems has become a “top priority” for the company.
Quantum computing is the field that uses quantum mechanics to solve problems faster than classical computers, including the mathematical networks that underpin crypto infrastructure. As a result, quantum computing poses a threat to blockchain-based ecosystems.
While fully functioning quantum computers capable of cracking encryption algorithms don't yet exist, Misozki warned that there is an urgent need to address the threat.
Meta cryptographers noted that one of the main reasons is the “save now, decrypt later” attack, a scenario in which an agent stores encrypted data today with the goal of decrypting it in the future when quantum computers are powerful enough.
Furthermore, despite Meta’s efforts to become quantum-ready, the transition from current encryption algorithms to quantum-resistant algorithms will be a lengthy process that could take years or even decades.
Security and Efficiency
For example, the Kyber 768 public key shares that Meta is testing are significantly larger than traditional keys, which causes packet size issues and increased latency in certain scenarios. To address this issue, Meta opted for smaller Kyber 512 parameters, which strike a good balance between security and efficiency.
Additionally, the introduction of hybrid key exchange revealed unforeseen issues, including race conditions in multi-threaded environments. Meta engineers have resolved these issues, but there is no guarantee that additional issues will not surface in the future.
Misoczki and Lin explained that Meta's next step is to use PQC to secure external public traffic.
This includes overcoming additional challenges such as ensuring browser support for specific implementations and managing increased communication bandwidth due to larger data payloads.
Members of Meta's technical team concluded that the path to quantum-resistant cryptography is complex, but with careful planning and collaboration, it is a challenge that can be tackled head-on.
Mentioned in this article