Quantum Computer Power Threatens Encryption

Encryption has played a core role in securing enterprise data, but as quantum computers become more advanced, traditional encryption solutions and public-key cryptography standards, which enterprise and consumer vendors rely on to secure their products, are at serious risk of decryption. 

The power of quantum computers lies in the fact that they can carry out many computations, while simultaneously considering several different configurations. As a result, they are much faster than traditional computers. 

Many people who have heard of quantum computing know that it’s coming and are aware that it will bring an almost unimaginable speed-up in the ability of computers to perform many kinds of calculations. This will allow wonderful advances in, for example, our ability to discover new materials and design new life-saving drugs. Now, cyber security researchers and analysts are worried that a new type of computer, based on quantum physics rather than more standard electronics, could break most modern cryptography. The effect would be to make communications as insecure as if they weren’t encoded at all.

Quantum computers have a significant and growing potential to change the way we process information, and they can also be used by our potential enemies for significant and highly destructive new modes of cyber attack.

The US Department of Defense (DoD) is concerned that a weaponised quantum computer could be used to break the encryption that protects sensitive government data and communications. Their analysis is that quantum computers will threaten data and privacy to the extent that this will force the largest technology upgrade cycle in computer history. Indeed, the US government has already recognised this issue, and claims to be dealing with the threat. 

They are not alone. It is evident that several nation-states are spending billions of dollars, and deploying thousands of computer scientists, along with many other skilled technologists  - to build a quantum computer that will break all current forms of encryption.

The head of Britain’s MI6 spy agency Richard Moore says that “our adversaries are pouring money and ambition into mastering artificial intelligence, quantum computing and synthetic biology because they know…this will give them leverage.”

Quantum computing can create immense business benefits, and the social implications of quantum technologies are likely to be far-reaching. By decade’s end, practical quantum computing solutions could impact computing strategies across industries which will profoundly alter how we think of computing and, critically, how we secure our digital economy through cryptography.

The governments and commercial organisations that are responsible for securing sensitive data must not underestimate the threat of quantum computers - the science to support quantum computing is well-founded and quantum computers may be a single breakthrough away from cracking modern cryptography.

IBM:    American Scientist:      I-HLS:     VentureBeat:     Verdict:    CIGI

You Might Also Read:

Quantum Computing Raises As Many Problems As It Solves:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« Rising Cybercrime Means SMEs Should Seek Cyber Insurance
Is Standardisation Of The Cybersecurity Profession A Good Thing? »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

LogmeOnce

LogmeOnce

LogmeOnce provides users with solution to multiple Password problems, Single Sign-On (SSO), and Identity Management.

Adeptis Group

Adeptis Group

Adeptis are experts in cyber security recruitment, providing bespoke staffing solutions to safeguard your organisation against ever-changing cyber threats.

Lanner Electronics

Lanner Electronics

Lanner Electronics is a leading hardware provider for advanced network appliances and industrial automation solutions including cyber security.

PROMIA

PROMIA

PROMIA is in the business of providing solutions that are designed to support highly secure, reliable, scalable and interoperable business applications.

SlashNext

SlashNext

The SlashNext Internet Access Protection System (IAPS) provides Zero-Day protection against all internet access threats including Social Engineering & Phishing, Malware, Exploits and Callback Attacks.

Proficio

Proficio

Proficio is a world-class Managed Security Service Provider providing managed detection and response solutions, 24×7 security monitoring and advanced data breach prevention services worldwide.

National Authority for Electronic Certification and Cyber Security (AKCESK) - Albania

National Authority for Electronic Certification and Cyber Security (AKCESK) - Albania

AKCESK ensures security for trusted services, in particular reliability and security in electronic transactions between citizens, businesses and public authorities.

ODSC

ODSC

ODSC is a security systems integrator that provides services and expertise in identity management and access.

DQM GRC

DQM GRC

DQM GRC are one of the UK's leading providers of data governance, e-privacy and GDPR services, to commercial organisations across all industries in the UK.

NGS (UK)

NGS (UK)

NGS (UK) Ltd are independent, vendor agnostic, next generation security trusted advisors, providing all-encompassing solutions from the perimeter to the endpoint.

SHIELD

SHIELD

SHIELD is an established end-to-end fraud management solution that blocks fraudulent activities such as account takeovers, fake accounts creation, fraudulent payments, loyalty fraud and more.

Cingo Solutions

Cingo Solutions

Cingo Solutions is a Managed Detection & Response company providing specialized data security services.

Norma Inc.

Norma Inc.

Norma provides the secured wireless environment (WiFi and Bluetooth) with the unauthorized AP detection, and secures your IoT assets from various threats.

VinCSS

VinCSS

VinCSS Internet Security Services JSC is a leading organization working in the field of researching, developing, producing products as well as providing cyber security services.

Venticento

Venticento

Venticento is an IT company specialized in consulting and network support and assistance for companies that need to make their business processes more effective.

Bluerydge

Bluerydge

Bluerydge specialises in cyber security and technology, focusing on the delivery of innovative sovereign solutions through trusted, cleared and experienced professionals.