Quantum Computing – Advantage Or Security Threat?

Several Federal agencies of the US security network, when polled, indicated they see quantum computing and artificial intelligence as potential security threats, especially in the near-term.

The US government passed a bill to foster an active quantum computing industry in, yet this hasn’t prevented the security community from regarding quantum computing being seen as an ’emerging threat’ together with certain forms of artificial intelligence.

The study was commissioned by the US Government Accountability Office, in a white paper titled “Long-Range Emerging Threats Facing the United States as Identified by Federal Agencies.”

The agencies identified 26 long-term threats within four categories, which were:

  • Adversaries’ Political and Military Advances—e.g., China’s increasing ability to match the U.S. military’s strength.
  • Dual-Use Technologies—e.g., self-driving cars might be developed for private use, but militaries can use them too.
  • Weapons—advances in weapons technology, e.g., cyber-weapons.
  • Events and Demographic Changes—e.g., infectious disease outbreaks.

Within the “dual-use technologies” category, that took center stage, the security agencies expressed fear that continued advances with quantum computing and artificial intelligence could be used to cause harm, rather than advance society.

Quantum computing continues to advance. This year, for instance, computer technologists set a new speed record for the trapped-ion ‘building blocks’ (or logic gates) of future-generation quantum computers.

As an example of the potential threat posed by quantum computing, researchers from the Russian Quantum Center in Moscow have gone on record to state that cryptocurrencies and blockchain technology will be vulnerable in the future from quantum systems unless these applications themselves integrate quantum technologies.

The same stands with AI, where studies are underway to assess the extent that AI can understand what it is like to be human, according to digitaljournal.com. The report reflects the concern where “adversaries could gain increased access to AI through affordable designs used in the commercial industry, and could apply AI to areas such as weapons.”

Also, “quantum communications could enable adversaries to develop secure communications that US personnel would not be able to intercept or decrypt.” Centered on this is the deployment by terror groups or rogue states of sophisticated technologies in the future, directed against the US.

I-HLS

You Might Also Read:

Quantum Computing Is Becoming Reality:

« How To Develop Good Cybersecurity Practice
Fortnite Teen Hackers 'Earning Thousands of Pounds a Week' »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Security Compass

Security Compass

Security Compass, the Security by Design Company, enables organizations to shift left and build secure applications by design, integrated directly with existing DevSecOps tools and workflows.

Feitian Technologies

Feitian Technologies

Feitian Technologies provides authentication and transaction security products for financial institutions, telecoms, government and leading business enterprises.

Device Authority

Device Authority

Device Authority specialises in security automation for the Internet of Things (IoT).

Planit Testing

Planit Testing

Planit is a leader in Quality Assurance and a specialist in software testing and training services.

ComTrue Technologies

ComTrue Technologies

ComTrue Technologies provides artificial intelligence solutions and information security solutions.

Mnemonica

Mnemonica

Mnemonica specializes in providing data protection system, information security compliance solutions, cloud and managed services.

Deepnet Security

Deepnet Security

Deepnet Security is a leading security software developer and hardware provider in Multi-Factor Authentication (MFA), Single Sign-On (SSO) and Identity & Access Management (IAM).

CybrHawk

CybrHawk

CybrHawk is a leading provider of information security-driven risk intelligence solutions focused solely on protecting clients from cyber-attacks.

Cyber Lockout

Cyber Lockout

Comprehensive ransomware insurance and preventative cybersecurity technology solution, working together to help protect businesses 24/7/365.

Triaxiom Security

Triaxiom Security

Triaxiom Security offers penetration testing, security audits, and strategic consulting customized to meet your needs.

Trellix

Trellix

Trellix is an extended detection and response (XDR) solutions provider created from a merger of McAfee Enterprise and FireEye Products.

COPA-DATA

COPA-DATA

COPA-DATA is the only independent software manufacturer to combine in-depth experience in automation with new possibilities of digital transformation – reliable, future-proof and operating worldwide.

Blue Bastion

Blue Bastion

Don’t give cybercriminals the chance to find weaknesses in your company’s cyber security system. Defend your institution from all attacks from all directions with Blue Bastion.

Sri Lanka CERT

Sri Lanka CERT

Sri Lanka CERT is the National Centre for Cyber Security, which has the national responsibility of protecting the nation’s cyberspace from cyber threats.

WaveLink

WaveLink

WaveLink offers low risk, results-oriented Engineering Services and best-of-class Technical Support Services. Areas of expertise include cyber and security engineering.

NST Cyber

NST Cyber

NST Cyber provides comprehensive Threat Exposure Management to Global banks and Forbes 2000 companies.