October 29, 2024

LEDACRYPT, CROSS AND LESS: The Future of Post-Quantum Cryptography Made in Italy

Traditional cryptography is at risk in the quantum era. Italy responds with innovative solutions from the Polytechnic University of Marche: LEDACRYPT, CROSS and LESS, resistant to future attacks.

Cybersecurity is a topic of growing importance in today's world, especially with the emergence of increasingly advanced technologies such as quantum computing. Traditional cryptographic systems, which have dominated the field of digital security for decades, are about to face an existential challenge. Algorithms such as RSA and elliptic curve cryptography, which have protected billions of transactions and communications, risk becoming vulnerable to new types of attacks. However, in the heart of this looming storm, Italian research is making extraordinary progress, with new cryptographic solutions that could define the future of digital security: LEDACRYPT, CROSS and LESS.

The current context of cryptography

Over the past few decades, computer security has relied on cryptographic methods that use public and private keys. The Rivest–Shamir–Adleman (RSA) algorithm and elliptic curve cryptography (ECC) have been pillars of this protection, providing robust mechanisms for encrypting data and ensuring authenticity in communications. RSA relies on the difficulty of factoring large prime numbers, while ECC uses the mathematical properties of elliptic curves to create cryptographic keys that are smaller but just as secure as RSA.

However, with the emergence of quantum computing, it has been realized that these solutions may no longer be sufficiently secure. The reason? Shor's algorithm.

Shor's Algorithm and Quantum Attack

Quantum computing represents a new paradigm in computation, exploiting the properties of quantum physics to solve complex problems much faster than traditional computers. One of the most famous algorithms in the context of cryptography is theShor's algorithm, developed by Peter Shor in 1994.

Shor's Algorithm

Shor's algorithm is capable of solving two fundamental cryptographic problems: integer factorization and discrete logarithm problem, which are the basis of the security of RSA algorithms and elliptic curve cryptography. In a world dominated by classical computing, factoring a 2048-bit number would take billions of years. However, a sufficiently powerful quantum computer could solve it in dramatically reduced times, undermining the security of RSA and ECC.

A quantum attack exploits this weakness. Since RSA and ECC rely on the computational difficulty of these problems, a quantum attack, made possible by a quantum computer, would make these algorithms vulnerable. This scenario has given rise to a global race to develop new cryptographic systems resistant to quantum computers: and this is where LEDACRYPT, CROSS and LESS, the three algorithms born from Italian research, come into play.

The Role of Italian Research in Post-Quantum Cryptography

THE Polytechnic University of Marche (UNIVPM) is one of the Italian institutions that has taken a leadership role in the development of new cryptographic solutions suitable for the quantum era. In collaboration with the American NIST (National Institute of Standards and Technology), Politecnica delle Marche has developed and perfected cryptographic algorithms that aim to solve the problems posed by future quantum attacks. Among these, the following stand out: LEDACRYPT, CROSS, and LESS.

univpm

LEDACRYPT: Long-term protection against quantum attacks

LEDACRYPT is an algorithm based on error-correcting codes, specifically designed to be resistant to quantum computers. Error-correcting codes are used to correct errors in data transmissions, but their application in cryptography is relatively recent. LEDACRYPT uses these codes to create complex cryptographic keys, which remain secure even in the presence of attacks by quantum computers.

The algorithm is based on a variant of the codes LDPC (Low-Density Parity-Check), also used in satellite communications and high-efficiency telecommunications systems. The robustness of these codes, combined with advanced cryptographic techniques, makes LEDACRYPT one of the most promising solutions for post-quantum cryptography.

CROSS: A Post-Quantum Public Key System

Another significant Italian contribution is CROSS, a cryptographic algorithm that aims to replace traditional public-key systems such as RSA and ECC. CROSS uses a completely different approach, relying on mathematical problems that, according to current research, remain difficult to solve even with the help of quantum computing.

CROSS uses a combination of techniques based on lattice theory, a field of mathematics that is currently considered one of the most promising foundations for post-quantum cryptography. Lattice-related problems, such as the shortest vector approximation problem (SVP), are much more complex than prime factorization or discrete logarithm solving, making CROSS resistant to quantum attacks.

LESS: Security for Low Resource Devices

While LEDACRYPT and CROSS aim to ensure data security in high-computation contexts, LESS is specifically designed for resource-constrained devices, such as Internet of Things (IoT) sensors, mobile devices, and other low-power systems. LESS (Lightweight Encryption for Securing Systems) uses lightweight cryptographic techniques that provide quantum security without requiring large computational resources, making it ideal for devices that cannot support more complex algorithms such as LEDACRYPT or CROSS.

LESS is based on a combination of symmetric encryption and data compression techniques, which allows it to offer robust security while maintaining minimal usage of system resources.

The challenge of quantum computers

Quantum computing has the potential to revolutionize many fields, from chemistry to medicine, but it also poses a significant threat to cybersecurity. Quantum computers are capable of performing parallel calculations exponentially faster than classical computers, which is what makes current cryptographic algorithms like RSA and ECC vulnerable.

Shor's algorithm, for example, is designed to exploit the parallel processing power of quantum computers to factor large numbers into prime factors in dramatically reduced times. This makes RSA, which relies on the difficulty of factoring prime numbers, highly vulnerable. Elliptic curve cryptography, while based on a different mathematical problem (discrete logarithm on elliptic curves), is subject to a similar vulnerability.

The fundamental problem is that many of the cryptographic algorithms currently in use are not designed to be resistant to quantum computers. While these computers are not yet powerful enough to perform large-scale attacks, their development is progressing rapidly. Estimates vary, but many experts believe that a quantum computer powerful enough to run Shor's algorithm at scale could be developed in the next 10 to 20 years.

The Future of Cryptography: Towards a Post-Quantum World

In response to this emerging threat, the scientific and industrial community is actively working to develop cryptographic algorithms that can resist quantum attacks. The NIST, in particular, has initiated a standardization process for post-quantum cryptography, with the aim of identifying and certifying algorithms that can protect data even in the era of quantum computers.

LEDACRYPT, CROSS and LESS represent Italy's contribution to this global challenge. These algorithms not only aim to protect critical data from future quantum attacks, but also demonstrate how research and innovation can emerge in excellent Italian academic and scientific contexts.

Prof._Gian_Luca_Gregori

«This result was possible thanks to the talent and work of the research team in the telecommunications area – says the rector Gian Luca Gregori – who have achieved and maintained the most high standards of scientific research international in this sector, as also demonstrated by numerous international publications of primary importance".

However, widespread adoption of post-quantum solutions will take time. Many critical systems currently using RSA and ECC will need to be migrated to more secure algorithms, and this will require a coordinated effort between governments, industries, and academic institutions. However, with the development of new technologies such as LEDACRYPT, CROSS, and LESS, we can be optimistic about humanity’s ability to address future challenges.

Conclusion

Cryptography is about to undergo one of its most significant changes since the invention of modern public key systems. With the emergence of quantum computers, RSA and elliptic curve cryptography could become obsolete in the not too distant future. However, Italian research is proving to be at the forefront of the development of post-quantum cryptographic solutions. LEDACRYPT, CROSS and LESS are three algorithms that not only address the challenges posed by quantum computing, but also represent the potential of Italian innovation in the field of cybersecurity. Thanks to these new technologies, the future of cryptography could be not only more secure, but also more efficient and suited to the needs of the ever-evolving digital world.

Do you have doubts? Don't know where to start? Contact us!

We have all the answers to your questions to help you make the right choice.

Chat with us

Chat directly with our presales support.

0256569681

Contact us by phone during office hours 9:30 - 19:30

Contact us online

Open a request directly in the contact area.

INFORMATION

Managed Server Srl is a leading Italian player in providing advanced GNU/Linux system solutions oriented towards high performance. With a low-cost and predictable subscription model, we ensure that our customers have access to advanced technologies in hosting, dedicated servers and cloud services. In addition to this, we offer systems consultancy on Linux systems and specialized maintenance in DBMS, IT Security, Cloud and much more. We stand out for our expertise in hosting leading Open Source CMS such as WordPress, WooCommerce, Drupal, Prestashop, Joomla, OpenCart and Magento, supported by a high-level support and consultancy service suitable for Public Administration, SMEs and any size.

Red Hat, Inc. owns the rights to Red Hat®, RHEL®, RedHat Linux®, and CentOS®; AlmaLinux™ is a trademark of AlmaLinux OS Foundation; Rocky Linux® is a registered trademark of the Rocky Linux Foundation; SUSE® is a registered trademark of SUSE LLC; Canonical Ltd. owns the rights to Ubuntu®; Software in the Public Interest, Inc. holds the rights to Debian®; Linus Torvalds holds the rights to Linux®; FreeBSD® is a registered trademark of The FreeBSD Foundation; NetBSD® is a registered trademark of The NetBSD Foundation; OpenBSD® is a registered trademark of Theo de Raadt. Oracle Corporation owns the rights to Oracle®, MySQL®, and MyRocks®; Percona® is a registered trademark of Percona LLC; MariaDB® is a registered trademark of MariaDB Corporation Ab; REDIS® is a registered trademark of Redis Labs Ltd. F5 Networks, Inc. owns the rights to NGINX® and NGINX Plus®; Varnish® is a registered trademark of Varnish Software AB. Adobe Inc. holds the rights to Magento®; PrestaShop® is a registered trademark of PrestaShop SA; OpenCart® is a registered trademark of OpenCart Limited. Automattic Inc. owns the rights to WordPress®, WooCommerce®, and JetPack®; Open Source Matters, Inc. owns the rights to Joomla®; Dries Buytaert holds the rights to Drupal®. Amazon Web Services, Inc. holds the rights to AWS®; Google LLC holds the rights to Google Cloud™ and Chrome™; Microsoft Corporation holds the rights to Microsoft®, Azure®, and Internet Explorer®; Mozilla Foundation owns the rights to Firefox®. Apache® is a registered trademark of The Apache Software Foundation; PHP® is a registered trademark of the PHP Group. CloudFlare® is a registered trademark of Cloudflare, Inc.; NETSCOUT® is a registered trademark of NETSCOUT Systems Inc.; ElasticSearch®, LogStash®, and Kibana® are registered trademarks of Elastic NV Hetzner Online GmbH owns the rights to Hetzner®; OVHcloud is a registered trademark of OVH Groupe SAS; cPanel®, LLC owns the rights to cPanel®; Plesk® is a registered trademark of Plesk International GmbH; Facebook, Inc. owns the rights to Facebook®. This site is not affiliated, sponsored or otherwise associated with any of the entities mentioned above and does not represent any of these entities in any way. All rights to the brands and product names mentioned are the property of their respective copyright holders. Any other trademarks mentioned belong to their registrants. MANAGED SERVER® is a trademark registered at European level by MANAGED SERVER SRL, Via Enzo Ferrari, 9, 62012 Civitanova Marche (MC), Italy.

Back to top