Quantum Computing, LUKS Cryptography, and Qubes

Short answer: Yes, in theory. It’s mainly asymmetric encryption that’s at risk to quantum computing (due to Shor’s algorithm). By contrast, the biggest potential impact of quantum computing on a symmetric cipher like AES would be to halve the time it takes to brute a given key length (due to Grover’s algorithm), e.g., being able to brute force AES-256 in half the time, or the time it would take to brute force AES-128 with classical computers. However, with a sufficiently strong key, even brute forcing AES-128 with classical computers (or AES-256 with quantum computers) would take thousands or millions of years under ideal conditions (e.g., devoting every computer on earth to the task, then building more computers in space and on other planets and moons, and building Dyson spheres to power it all). Therefore, at least AES-256 (which we use in LUKS for Qubes) is quantum-resistant, and perhaps some shorter key lengths might be too. In this case (and in most cases), the weak link in cryptography lies in the implementation, not the math. Of course, if there turns out to be a fatal zero-day vulnerability in LUKS, then even though AES itself is theoretically quantum-resistant, the specific version of LUKS containing the vulnerability may not even be able to withstand classical computers, hence why the answer is, “Yes, in theory.”

5 Likes