Apscitu Mail masthead.
Apscitu Mail motto.

Expert Email News Article tab.

Susan Penfield, Q*bert.

No, The NSA Does Not Have Encryption-Breaking Quantum Computers



By Duane Thresher, Ph.D.          December 7, 2019

Many people who absolutely should be using email encryption, like VIPs, don't because they say the National Security Agency (NSA), and thus the CIA, FBI, etc., can break the encryption (decrypt) anyway so why bother; the encryption will just point out their email to the NSA as worth breaking. The slightly more knowledgeable of these people say that the NSA can break this encryption because they have encryption-breaking quantum computers. The IT incompetent NSA does nothing to dissuade them of this belief because it makes their job of reading people's emails much easier. And the IT incompetent media, universities, and tech companies can't hype quantum computers enough -- it sells ads and gets funding and investors, much like bogus artificial intelligence stories do. However, without any NSA-insider knowledge you could have been fairly sure the NSA doesn't have encryption-breaking quantum computers and now with the NSA-insider revelations of Edward Snowden you can be very sure the NSA doesn't have encryption-breaking quantum computers. So encrypt your email. Let Apscitu help you do it right so it is actually unbreakable.

Nowadays, breaking encryptions must be done via mathematical calculations on a computer and the security of an encryption is based on how fast it would take without the encryption key to break the encryption. If it would take on average millions of years then that is the same as being unbreakable.

Most people know about a computer's "brain", the CPU (Central Processing Unit) or just "processor". They may also have heard of Moore's Law and through a misconstruing of it, think it means processor speed will double every year or so (it actually says the density of components, like transistors, in integrated circuits (ICs or "chips") will double every year or so, which is not the same thing). Computer salesmen, including for supercomputers, and the media got used to selling new computers every year based on dramatically faster processor speeds and now they are dependent on that.

At some point it became impossible to dramatically increase the speed of a single processor. Enter "parallel processing", whereby multiple processors, often on the same chip, are used instead of a single processor to increase speed, by doing calculations concurrently instead of sequentially. The fastest computers in the world, supercomputers, are now the ones with the most processors (numbering in the thousands) and personal computers have dual-core (two processor) or quad-core (four processor) chips.

(Full disclosure: I am an expert on parallel processing and supercomputers, having attended NASA's High Performance Computing School and rewritten large parts of the NASA GISS climate model to run on parallel processing supercomputers, as well as having a BS in Electrical Engineering and Computer Science from MIT.)

The dirty big secret of parallel processing is that many, if not most, problems are not amenable to being solved faster by it. If each calculation in a solution requires the output of the previous calculation, i.e. calculations have to be sequential not concurrent, then parallel processors provide no advantage over a single processor. You can see this yourself if you have a multi-processor personal computer and have set up a performance meter to show the activity of each processor. You will see that most things you do on the computer mostly use a single processor.

Even for those problems that are amenable to parallel processing, at some point so many processors are required to solve the problem fast enough, that it becomes impractical. If it takes most, all, or more of the existing processors in the world to break a single encrypted email fast enough then that is the same as being unbreakable. (This would be especially true if most emails, no matter how trivial, were encrypted, so that it would not be known which ones were worth the effort of breaking.)

For example, RSA -- named after its discoverers MIT computer scientists Ronald Rivest, Adi Shamir, and Leonard Adleman -- is the actual encryption used, originally illegally, in the most well-known encryption system in the world, PGP (Pretty Good Privacy). (For more on RSA, PGP, and encryption, see Incompetent Encryption Is Worse Than No Encryption.) The difficulty in breaking RSA is based on the time-consuming difficulty of finding two very large prime factors of an even larger number. There is (as yet) no easy mathematical formula for this and so it is like looking for a needle in a haystack, actually worse.

This prime factorization is amenable to being solved by parallel processing but the numbers involved are so large it would still take too many processors to break even a single encrypted email fast enough to be practical.

Enter quantum computers, which are based on quantum theory. Quantum theory attempts to explain the behavior of subatomic particles. It is bizarre, to say the least. Ever hear of Schroedinger's Cat, who is both dead and alive? Scientists trying to understand and explain quantum theory invoke infinite alternate universes. Really. This is not to say that quantum theory is wrong; it is one of the most successful scientific theories ever. Successful meaning accurately predictive, although the predictions tend to be statistical, which is of limited usefulness (knowing 16.67% of dice throws will be a 6 tells you nothing about what an individual dice throw will be; Einstein insisted that "God does not play dice with the universe").

As most people know, traditional computers, including parallel processing supercomputers, use bits, which mathematically can be 0 or 1 and physically are a low or high (relatively) voltage. These bits are grouped (e.g. bytes) to represent larger numbers, one bit combination per number. By performing, electronically, mathematical operations on these bit groups, problems can be solved.

Quantum computers have bits too, called "qubits", which physically are states (often spin direction) of subatomic particles. The states of these subatomic particles become "entangled" such that all combinations are represented at once by qubits. Unlike traditional computers, which have to iterate to the solution, with quantum computers, the solution is essentially already there, so they theoretically can be much faster than traditional computers.

If trying to understand and explain quantum theory and computers is maddeningly difficult -- the preceding is a great simplification -- actually building a quantum computer is much harder. Just for starters, the hardware must be kept near absolute zero and isolated for quantum effects not to be completely obliterated by macroscopic factors. Beyond that there is no one best way, at a basic level, to build a quantum computer, like there is for traditional computers.

Quantum computers have significantly high error rates. A computer with a non-zero error rate is unusable. If a computer has a non-zero error rate, how do you know its solution is correct, unless you already know the solution, in which case why do you need the computer?

Those who claim to have built quantum computers say they need to do more work, i.e. need more funding/investment, to get the error rate down. However, this error rate may be inherent. When Bell Labs spent a lot of time and money trying to reduce noise in telephone lines (it limited the number of conversations that could be carried on a single line, requiring more lines, which are expensive) they found that some significant noise was physically inherent in the system and could not be reduced.

That's just the quantum computer hardware. Figuring out how to solve a problem, i.e. the software, with a quantum computer is even harder (it depends on the problem being solved), which is why I didn't try to explain it more above. Quantum computers are thus applicable to even fewer problems than parallel processing computers, although the mentioned prime factorization of RSA encryption is supposedly amenable to quantum computing.

The hyperbole about quantum computers is as fantastical as their concept. This hyperbole is necessary to sell ads and get funding and investors, just like for artificial intelligence, fusion, superconductivity, nanotechnology, gene therapy, perpetual motion, etc.

Most recently, in October 2019, Google grandly claimed it had a 53-qubit computer that could solve in 200 seconds an arcane problem (not even an important one like encryption breaking) whose solution would take 10,000 years for the current world's fastest computer, a parallel processing supercomputer built by IBM for the Department of Energy. IBM pointed out that their supercomputer would actually only take 2.5 days, not 10,000 years! And if they added even more processors, not even an unreasonable number, it could take significantly less than 2.5 days.

Besides the probably-insurmountable difficulties for anyone of building an encryption-breaking quantum computer, as if that weren't enough, how else could you have been fairly sure that the NSA hasn't built an encryption-breaking quantum computer?

The head of a project to build an encryption-breaking quantum computer would obviously have to be highly-educated in the appropriate field. For example, Robert Oppenheimer, the head of the U.S. atomic bomb project during World War II, was himself a highly-educated physicist.

The private company Booz Allen Hamilton, Booz for short, does a lot of the work for the NSA. Much of what people think NSA employees do is actually done by Booz. Edward Snowden actually worked for Booz when he hacked the NSA as an insider and many of the secret NSA documents that Snowden stole and released (see ahead) have the Booz logo on them.

Booz's Chief Innovation Officer, who would be in charge of huge innovations like quantum computers, is Susan Penfield. You would rightly expect that Penfield was a highly-educated computer scientist and electrical engineer/physicist, i.e. an IT expert. She is not, not even close. Incredibly, Penfield only has a BS in management. She thinks entangled is about her hair and a qubit is a 1980s video game character (Q*bert).

All Booz's Susan Penfield does (and can do) is hang around social media (her photo above is from her Twitter page, where her inane motto is "let your innovation light shine bright!") and go around giving supposedly inspirational but misleading talks to impressionable girls about STEM careers ("you don't need a good STEM education, girls can do anything"). Like many, Penfield hides her IT incompetence behind the women's movement.

Now with the NSA-insider revelations of Edward Snowden you can be very sure the NSA doesn't have encryption-breaking quantum computers.

Recently, while using one of my fake Facebook accounts (no one should have a real Facebook account), Facebook perfunctorily informed me about their use of facial recognition on Facebook user photos. I remembered that the Snowden documents showed that Facebook aids and abets the NSA, but I went through the Snowden documents again to refresh my memory of the extent.

I was again struck by what was in the Snowden documents, as every IT expert who actually reads them is. The variety and extent of ways the NSA has to eavesdrop on people's communications is shocking.

But I was also struck, for the first time, by what was not in the Snowden documents -- no mention of the use of encryption-breaking quantum computers.

Most of the Snowden documents are internal NSA advertising for the variety and extent of ways the NSA has to eavesdrop on people's communications. In any business, workers have to know what tools are available. That's why Snowden chose the documents to steal from the NSA -- they give a good overview.

So if encryption-breaking quantum computers, which would make many other methods superfluous (see the Quantum program next), are not advertised, you can be very sure the NSA doesn't have them.

The NSA does have a program they call "Quantum" -- obviously to imply they have encryption-breaking quantum computers -- but it is not about encryption breaking. In fact, it is a method to get around encryption, which is admitting they can't break it, by hacking personal computers so they can get to the message before encryption or after decryption.

While the Snowden documents are several years old now, it's extremely unlikely, given the above, that the NSA developed encryption-breaking quantum computers in those few years. The Snowden documents are full of "coming soon" announcements, none of which are about encryption-breaking quantum computers.

Even if there were prime factoring quantum computers that could break RSA, there are encryptions that are as good or better than RSA, some that can't be broken even theoretically by a quantum or any other computer.

In fact, with PGP most email messages are not actually encrypted by RSA because it is too processor intensive to do so. Only the key to another encryption is encrypted by RSA and then sent with the message, which is encrypted by the other encryption, a less processor intensive but no easier to break encryption.

RSA was invented to solve the key distribution problem -- if you have to securely communicate with many people, like in the military during war, securely getting the encryption key to everyone is a big problem.

RSA uses a public key, which anyone, including the enemy, can have, for encrypting (only) and a private (secret) key, which only the recipient has to have, for decrypting (only), whereas other encryptions only have a private (secret) key for encrypting and decrypting, which both sender and recipient have to have.

If key distribution is not a problem, like between just two people who can easily contact each other at least once using other than email, there are encryptions that can't be broken even theoretically by a quantum or any other computer.

For example, there is one-time pad encryption. This was used for messages between the President of the United States and the leader of the Soviet Union during the Cold War. In one-time pad encryption each character of a message is encrypted with a different key, which is another character, randomly chosen. Both sides have to have these keys, which are pads of sheets of characters that must only be used once and then destroyed, hence the name.

Even if you could quickly enough try every possible character (27, for alphabet/space only messages) for every character in the encrypted message, looking for a non-gibberish message -- and for alphabet/space only messages, the total number of possible "messages" would be 27 to the power of the number of characters in the message, a huge number for even short messages -- you would end up with a large number of non-gibberish reasonable messages.

For example, "attack on december eleventh" could also validly be decrypted as "attack on september seventh" or even "milk bread cheese eggs soda" because they all have the same number of characters, 27 (note the total number of possible "messages" would be about 443 followed by 36 zeroes). Without the one-time pad there is no way to know which non-gibberish message is the intended one.

(Did you ever hear the saying that if you have an infinite number of monkeys, each randomly pecking at a keyboard, one of them will produce Shakespeare's Macbeth? That's not hyperbole, that's the power of large numbers. It's actually an understatement since much other literature would be produced as well.)

The moral of this story is you should use email encryption for all your emails. It will prevent your emails from being read by the NSA or anyone else who shouldn't. NSA-insider Edward Snowden himself has said this. Snowden, apparently describing the NSA's deceivingly-named Quantum program, also said that the way the NSA gets around encryption is by intercepting the message before it is encrypted (sent) or after it is decrypted (received) on personal computers due to sender or recipient IT incompetence. For that reason, you should have Apscitu set up your email encryption.