Quantum Computing: The Growing Threat Of SNDL

Advances in  the combined power of computing and Artificial Intelligence are on the verge of transforming many aspect of work and life. As these technologies become more widely distributed it is becoming very important to understand the potential security risks. Specifically, quantum computing promises extraordinary performance gains that could have a profound impact on global economies, security and welfare. 

Quantum computing has the potential transform industries like financial services, aerospace, and pharmaceuticals and has attracted  significant private & public sector investment. But the power of quantum computing can be leveraged for bad purposes and even with the best intentions, these downside risks need to be considered.

Microsoft has already told organisations to begin preparing for potential cyber attacks based on quantum technology and cyber criminals are already gathering encrypted data so they can attack it as soon as the right tools are available. CISOs must start planning for the future today.

Currently, sophisticated threat actors  are carrying out Store Now Decrypt Later (SNDL) attacks against the US and other governments, and they are storing sensitive encrypted data which is critical to national security. 

Often the purpose of stealing this sensitive data is to decrypt it using quantum computers. Previously, the public-key encryption algorithms that have protected stored data, communications, financial transactions, networks, government secrets, intellectual property and other assets for nearly 50 years, will become obsolete, and the sensitive information that they protected will be revealed by quantum computing. 

Any encrypted data that has already been stolen can no longer be protected and this danger is immediate.

Quantum computing applies the principles of quantum physics to information technology. While classical computing is based on binary bits, quantum computing uses quantum bits, or “qubits”. Like a bit, a qubit can hold a value of 0 or 1, but it can also have a superposition state, being in both states simultaneously. Another important quality is entanglement, which means that one or more qubits can be linked together so that changes to one qubit affect the other, even if those two qubits are light years apart from one another.

The benefits that could come with the power of quantum computing are frequently discussed, but the cyber security of this new computing is also high level security problem facing governments. 

It’s imperative that government regulatory agencies start migrating vulnerable cyber security protocols to post-quantum cryptography (PQC) as PQC will protect this sensitive government and critical industry data from these new types of cyber attacks.

The US government has already taken some positive steps against this national security threat. In May 2022 President Biden issued an executive order, along with two national security memorandums directing the US to accelerate its quantum computing cyber security. Subsequently the US House of Representatives passed the Quantum Computing Cybersecurity Preparedness Act and this bill now awaits Senate review. Industry is standing by to support the US government upon Senate approval and US Government implementation.

While it is a much-needed step in the right direction, the proposed legislation does not adequately take account of the present threat posed by SNDL attacks on vital government, military and infrastructure systems that rely on current public key cryptography. 

Much of the encrypted data will continue to be sensitive for decades. Once this data is exfiltrated, there is nothing that can be done to prevent it from eventually being exploited by adversaries. Post-quantum cryptography (PQC) protocols can protect against SNDL attacks, but the migration process to PQC is unlikely to be quick

Quantum computing is still developing and it is uncertain the extent of the transformation or how quickly quantum computers will spread throughout the business world and the criminal world. But while quantum computing is certain to have a profound impact on existing cryptography, it is already delivering innovation in cyber security that will help mitigate increasingly sophisticated threats.  

Microsoft:      Whitehouse:    Whitehouse:     US Congress:   Cyberscoop:      Forbes:       

Springer/Link:      Mimecast:      Cybermagazine:      Image: Alex Shuper

You Might Also Read:

Quantum Computing  - Its Background & Future:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« FinOps In Cybersecurity: Managing The Cost Of Security
The Importance Of Cloud Access Security In Today's Cyber Landscape »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

MetaCompliance

MetaCompliance

MetaCompliance is a cyber security and compliance organisation that helps transform your company culture and safeguard your data and values.

Kaspersky Lab

Kaspersky Lab

Kaspersky Lab is one of the world’s largest privately held vendors of endpoint cybersecurity solutions.

Authenware

Authenware

AuthenWare delivers the highest level of identity security based on behavioral biometrics.

ASU Online - Information Technology Program

ASU Online - Information Technology Program

The Information Technology program at ASU Online provides you with the expertise to design, select, implement and administer computer-based information solutions.

Sqreen

Sqreen

Sqreen is a web application security monitoring and protection solution helping companies protect their apps and users from attacks.

Excellium Services

Excellium Services

Excellium’s Professional Services team combines expertise and experience that complements your in-house security resources.

Rippleshot

Rippleshot

Rippleshot is a fraud analytics firm that detects mass card compromises faster, allowing issuers to execute more proactive fraud detection strategies.

Altipeak Security

Altipeak Security

Altipeak Security provide Safewalk - a flexible and robust authentication platform through which we offer improved security to SMBs, corporates, banks, insurance companies, healthcare and more.

Cybil

Cybil

Cybil is a publicly-available portal where members of the international cyber capacity building community can find and share information to support the design and delivery of programs and projects.

Point Predictive

Point Predictive

Point Predictive build Predictive Models using Artificial Intelligence and Machine Learning techniques that help our customers stop fraud and early payment default (EPD).

Turnkey Consulting

Turnkey Consulting

Turnkey Consulting is a leading provider of Integrated Risk Management (IRM), Identity Access Management (IAM), and Cyber and Application Security.

Proximity

Proximity

Proximity is a leading professional services organisation providing consulting, legal and commercial advisory solutions with a focus on government and regulated industries.

Sydeco

Sydeco

Sydeco offer a complete range of products that secure computer and industrial networks, servers, programs and data against any type of computer attack.

NVISIONx

NVISIONx

NVISIONx data risk governance platform enables companies to gain control of their enterprise data to reduce data risks, compliance scopes and storage costs.

Orro Group

Orro Group

Orro create 'future now' solutions that make it faster, simpler and safer for you to access, store and share information. Wherever, whenever and with whomever you want.

Deepware

Deepware

Deepware is an emerging AI research company dedicated to exploring the potential of GenAI in both generation and detection.