Deakin: Can we stop quantum computing breaking the internet?

Acknowledgement: Lesson is derived from the transcript of video/s created by Deakin University
Learning Objectives
  1. Define quantum computing and explain how its processing power differs from classical computing.
  2. Understand the function of the Domain Name System (DNS) as the infrastructure of the internet.
  3. Analyze the role of digital signatures in establishing trust and identity online.
  4. Identify the security risks quantum computers pose to current encryption methods.
  5. Discuss the concept of post-quantum cryptography and its importance for global internet security.
Key Topics

Quantum Computing Fundamentals

Unlike regular computers, which process information one piece at a time (using bits that are either 0 or 1), quantum computers rely on the principles of quantum physics. This allows them to represent many combinations of information simultaneously. Because of this unique capability, a quantum computer can solve complex mathematical problems exponentially faster than the most powerful supercomputers we have today. While this offers incredible potential for science, it also threatens the mathematical puzzles that currently protect our digital data.

Further Inquiry

Australia is a global leader in quantum technology research, with several government and university-backed organizations dedicated to this field.

Search Terms
  • "what is quantum computing"
  • "quantum bits vs classical bits"
  • "CSIRO quantum technology roadmap"

The DNS and Digital Trust

The Domain Name System (DNS) acts as the 'phone book' of the internet. When you type a human-readable website name (like google.com) into your browser, the DNS translates it into a string of numbers known as an IP address so your computer can find the server. To prevent hackers from lying about these addresses, we use 'digital signatures' to prove the identity of the sender. These signatures act like a wax seal on a letter, guaranteeing that the information comes from a legitimate source and hasn't been tampered with.

Further Inquiry

Organizations in Australia are responsible for managing internet names and ensuring the cybersecurity of the nation's digital infrastructure.

Search Terms
  • "how DNS works"
  • "what is DNSSEC"
  • "digital signatures explanation"

Post-Quantum Security

The immense power of quantum computers means they could theoretically break the math behind our current digital signatures. If a bad actor used a quantum computer, they could forge signatures and redirect internet traffic to fake websites to steal information. To prevent this, researchers are developing 'post-quantum cryptography.' These are new security designs and algorithms that are resistant to attacks from both regular computers today and powerful quantum computers of the future, ensuring trust is maintained globally.

Further Inquiry

Australian universities and defence organizations are actively researching cryptographic methods that can withstand future quantum attacks.

Search Terms
  • "post-quantum cryptography"
  • "quantum safe security"
  • "future of encryption"
Knowledge Check
Quiz Progress Score: 0 / 10
1. What scientific principles do quantum computers rely on?
2. How does a quantum computer's speed compare to a regular computer?
3. What analogy is used to describe the Domain Name System (DNS)?
4. What does the DNS translate a human-legible website name into?
5. What is the primary function of a digital signature?
6. What could a bad actor with a quantum computer do to digital signatures?
7. What specific internet infrastructure is the research project focusing on strengthening?
8. What is the term for security designed to resist quantum computer attacks?
9. Which organization provided philanthropic funding for this research?
10. Why is this research considered to have far-reaching implications?
Question 1 of 10