Quantum Computer Power Threatens Encryption

Encryption has played a core role in securing enterprise data, but as quantum computers become more advanced, traditional encryption solutions and public-key cryptography standards, which enterprise and consumer vendors rely on to secure their products, are at serious risk of decryption. 

The power of quantum computers lies in the fact that they can carry out many computations, while simultaneously considering several different configurations. As a result, they are much faster than traditional computers. 

Many people who have heard of quantum computing know that it’s coming and are aware that it will bring an almost unimaginable speed-up in the ability of computers to perform many kinds of calculations. This will allow wonderful advances in, for example, our ability to discover new materials and design new life-saving drugs. Now, cyber security researchers and analysts are worried that a new type of computer, based on quantum physics rather than more standard electronics, could break most modern cryptography. The effect would be to make communications as insecure as if they weren’t encoded at all.

Quantum computers have a significant and growing potential to change the way we process information, and they can also be used by our potential enemies for significant and highly destructive new modes of cyber attack.

The US Department of Defense (DoD) is concerned that a weaponised quantum computer could be used to break the encryption that protects sensitive government data and communications. Their analysis is that quantum computers will threaten data and privacy to the extent that this will force the largest technology upgrade cycle in computer history. Indeed, the US government has already recognised this issue, and claims to be dealing with the threat. 

They are not alone. It is evident that several nation-states are spending billions of dollars, and deploying thousands of computer scientists, along with many other skilled technologists  - to build a quantum computer that will break all current forms of encryption.

The head of Britain’s MI6 spy agency Richard Moore says that “our adversaries are pouring money and ambition into mastering artificial intelligence, quantum computing and synthetic biology because they know…this will give them leverage.”

Quantum computing can create immense business benefits, and the social implications of quantum technologies are likely to be far-reaching. By decade’s end, practical quantum computing solutions could impact computing strategies across industries which will profoundly alter how we think of computing and, critically, how we secure our digital economy through cryptography.

The governments and commercial organisations that are responsible for securing sensitive data must not underestimate the threat of quantum computers - the science to support quantum computing is well-founded and quantum computers may be a single breakthrough away from cracking modern cryptography.

IBM:    American Scientist:      I-HLS:     VentureBeat:     Verdict:    CIGI

You Might Also Read:

Quantum Computing Raises As Many Problems As It Solves:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« Rising Cybercrime Means SMEs Should Seek Cyber Insurance
Is Standardisation Of The Cybersecurity Profession A Good Thing? »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Blueliv

Blueliv

Blueliv is a leading provider of targeted cyber threat information and intelligence. We deliver automated and actionable threat intelligence to protect the enterprise and manage your digital risk.

Cypress Semiconductor

Cypress Semiconductor

Cypress is a semiconductor design and manufacturing company providing embedded devices for secure IoT applications.

Atos

Atos

Atos provides a unique Cyber Security end to end solution with a data-centric and pre-emptive security approach.

Cybertrust Japan

Cybertrust Japan

Cybertrust Japan provides a comprehensive security certification and digital authentication service, enabling customers to build and manage highly secure IT infrastructures.

National Association of Software and Services Companies (NASSCOM) - India

National Association of Software and Services Companies (NASSCOM) - India

NASSCOM is a trade association of Indian Information Technology and Business Process Outsourcing industry. Areas of activity include cyber security.

Cysec - TU Darmstadt

Cysec - TU Darmstadt

CYSEC is the Cybersecurity faculty of the Technical University of Darmstadt and performs internationally renowned research in numerous areas of cybersecurity.

Siscon

Siscon

Siscon delivers tailor-made compliance solutions that are based on the customer's specific wishes and reality and then supplement with many years of experience in the field.

National Institute of Information and Communications Technology (NICT) - Japan

National Institute of Information and Communications Technology (NICT) - Japan

NICT is Japan’s sole National Research and Development Agency specializing in the field of information and communications technology.

CyberOwl

CyberOwl

CyberOwl builds on cutting-edge research and combines decades of experience in developing, securing and operating large distributed systems.

Armorblox

Armorblox

Armorblox stops targeted email attacks such as 0-day credential phishing, payroll fraud, vendor fraud, and other threats that get past legacy security controls.

SimSpace

SimSpace

SimSpace is the visionary yet practical platform for measuring how your security system responds under actual, sustained attack.

Cyber Gate Defense (CyberGate)

Cyber Gate Defense (CyberGate)

CyberGate is an Emirati establishment founded with an objective to provide cyber security services that would improve the overarching cyber security posture of the UAE.

EYE Security

EYE Security

EYE provides enterprise-grade cyber security services and cyber insurance to SMEs in Europe, Cyber Incident Response and strategic advice in board rooms.

Josef Ressel Centre for Intelligent & Secure Industrial Automation

Josef Ressel Centre for Intelligent & Secure Industrial Automation

The Josef Ressel Centre for Intelligent and Secure Industrial Automation investigates the fundamentals of digital assistants for industrial machines that enable intelligent and secure operation.

Auriga

Auriga

Auriga create innovative software and have become a benchmark for high quality banking software including cyber security solutions to protect business critical devices.

ITRM

ITRM

ITRM are one of the UK’s top managed service providers and offer a range of award-winning IT solutions, from ad-hoc consultancy to cyber security.