Quantum Computing: The Growing Threat Of SNDL

Advances in  the combined power of computing and Artificial Intelligence are on the verge of transforming many aspect of work and life. As these technologies become more widely distributed it is becoming very important to understand the potential security risks. Specifically, quantum computing promises extraordinary performance gains that could have a profound impact on global economies, security and welfare. 

Quantum computing has the potential transform industries like financial services, aerospace, and pharmaceuticals and has attracted  significant private & public sector investment. But the power of quantum computing can be leveraged for bad purposes and even with the best intentions, these downside risks need to be considered.

Microsoft has already told organisations to begin preparing for potential cyber attacks based on quantum technology and cyber criminals are already gathering encrypted data so they can attack it as soon as the right tools are available. CISOs must start planning for the future today.

Currently, sophisticated threat actors  are carrying out Store Now Decrypt Later (SNDL) attacks against the US and other governments, and they are storing sensitive encrypted data which is critical to national security. 

Often the purpose of stealing this sensitive data is to decrypt it using quantum computers. Previously, the public-key encryption algorithms that have protected stored data, communications, financial transactions, networks, government secrets, intellectual property and other assets for nearly 50 years, will become obsolete, and the sensitive information that they protected will be revealed by quantum computing. 

Any encrypted data that has already been stolen can no longer be protected and this danger is immediate.

Quantum computing applies the principles of quantum physics to information technology. While classical computing is based on binary bits, quantum computing uses quantum bits, or “qubits”. Like a bit, a qubit can hold a value of 0 or 1, but it can also have a superposition state, being in both states simultaneously. Another important quality is entanglement, which means that one or more qubits can be linked together so that changes to one qubit affect the other, even if those two qubits are light years apart from one another.

The benefits that could come with the power of quantum computing are frequently discussed, but the cyber security of this new computing is also high level security problem facing governments. 

It’s imperative that government regulatory agencies start migrating vulnerable cyber security protocols to post-quantum cryptography (PQC) as PQC will protect this sensitive government and critical industry data from these new types of cyber attacks.

The US government has already taken some positive steps against this national security threat. In May 2022 President Biden issued an executive order, along with two national security memorandums directing the US to accelerate its quantum computing cyber security. Subsequently the US House of Representatives passed the Quantum Computing Cybersecurity Preparedness Act and this bill now awaits Senate review. Industry is standing by to support the US government upon Senate approval and US Government implementation.

While it is a much-needed step in the right direction, the proposed legislation does not adequately take account of the present threat posed by SNDL attacks on vital government, military and infrastructure systems that rely on current public key cryptography. 

Much of the encrypted data will continue to be sensitive for decades. Once this data is exfiltrated, there is nothing that can be done to prevent it from eventually being exploited by adversaries. Post-quantum cryptography (PQC) protocols can protect against SNDL attacks, but the migration process to PQC is unlikely to be quick

Quantum computing is still developing and it is uncertain the extent of the transformation or how quickly quantum computers will spread throughout the business world and the criminal world. But while quantum computing is certain to have a profound impact on existing cryptography, it is already delivering innovation in cyber security that will help mitigate increasingly sophisticated threats.  

Microsoft:      Whitehouse:    Whitehouse:     US Congress:   Cyberscoop:      Forbes:       

Springer/Link:      Mimecast:      Cybermagazine:      Image: Alex Shuper

You Might Also Read:

Quantum Computing  - Its Background & Future:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« FinOps In Cybersecurity: Managing The Cost Of Security
The Importance Of Cloud Access Security In Today's Cyber Landscape »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 7,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Imperva

Imperva

Imperva is a leading provider of data and application security solutions including DDoS protection, Web application security, Data security and Cloud security.

Puppet

Puppet

Puppet is a leader in IT automation. Our software helps DevOps securely automate configuration and management of machines and the software running on them.

First Response

First Response

First Response is a Cyber Incident Response and Digital Forensic Investigation company.

Synectics Solutions

Synectics Solutions

Synectics deliver solutions for reducing risk, combating financial crime, and enabling organisations to meet their compliance and regulatory commitments.

ShieldIOT

ShieldIOT

ShieldIOT delivers a complete AI-powered security solution across any IoT device, application and network.

Jenson Knight

Jenson Knight

Jenson Knight is a global cyber security, cloud and IT infrastructure staffing specialist.

ALTR

ALTR

ALTR provide software-embedded solutions for data security and privacy.

Texas A&M Cybersecurity Center

Texas A&M Cybersecurity Center

Texas A&M Cybersecurity Center is dedicated to combating adversaries who desire to harm our citizens, our government, and our industry through cyber-attacks.

iSecurity Consulting

iSecurity Consulting

iSecurity delivers a complete lifecycle of digital protection services across the globe for public and private sector clients.

Cybermerc

Cybermerc

Cybermerc's services, training programmes and cyber security solutions are designed to forge collaborations across industry, government and academia, for collective defence of our digital borders.

Akito

Akito

Akito was set up to become a point of reference in the ICT market for issues related to Security and in particular Cyber Security.

Hadrian

Hadrian

Hadrian is modernizing offensive security practices with automation, making them faster and more scalable. Equipped with the hacker’s perspective, companies can now know what their critical risks are.

Amazon Web Services (AWS)

Amazon Web Services (AWS)

Amazon Web Services is the world’s most comprehensive and broadly adopted cloud platform, offering fully featured services from data centers globally.

Mobilen Communications

Mobilen Communications

Mobilen are dedicated to providing our customers with the highest level of secure data in transit and to bring privacy back to a mobile world.

GoCloud Systems

GoCloud Systems

GoCloud is an IT consulting firm. We provide IT strategy and cloud adoption services to the New Zealand Government, Non-Profit Organisations and private industry.

SplxAI

SplxAI

Our mission at SplxAI is to secure and safeguard GenAI-powered conversational apps by providing advanced security and pentesting solutions, so neither your organization nor your user base get harmed.