Special Measures To Deal With Quantum Technology

The US Government is planning a new policy to secure its information technology infrastructure against fast-moving development of quantum supercomputers.  President Biden has signed two directives aimed at advancing quantum science, including a memorandum outlining his administration’s plan to address national security risks posed by quantum computers that could be capable of breaking the US Defense Department’s communications encryption. 

“Current research shows that at some point in the not-too-distant future, when quantum information science matures, quantum computers… will be capable of breaking much of the cryptography that currently secures our digital communication,” a senior White House official told reporters.

Quantum computers, one of many quantum information science applications, is a “fundamentally different kind of computer with the ability to analyse information in ways that traditional computers cannot,” according to a White House press release announcing the directives. 

The Presidential memorandum also directs the federal government to protect quantum technologies from theft by criminals and adversaries and initiates collaboration between the federal government and private sector by establishing a “Migration to Post-Quantum Cryptography Project” at the US National Cybersecurity Center of Excellence and an open working group with industry. 

The Washington-based Quantum Alliance Initiative (QAI), is a private sector initiative to promote US leadership  in global quantum computing-enabled security, however, it is known that various state actors,  in other parts off the world, including Australia, Canada, China, France, Germany, Russia, Saudi Arabia, the UK and even North Korea, are channelling both public and private investment into developing their own quantum computers as quickly as possible.

Now, President Biden will sign an executive order placing the National Quantum Initiative Advisory Committee, the US government’s independent advisory body for quantum information science and technology, directly under the authority of the White House. 

This action aims to ensure “that the president, Congress, federal departments and agencies and the general public receive the most current, accurate and relevant information on quantum information science and technology to drive forward US policy making in this area,” according to the White House. “The United States has long been a global leader in the development of new technologies, like Quantum Information Science (QIS).

QIS is a broad field of science and engineering. Quantum computers, one of the many promising applications of QIS, are not a replacement to traditional computers. Rather, they are a fundamentally different kind of computer, with the ability to analyse information in ways that traditional computers cannot.  “While QIS itself is not new, recent breakthroughs in QIS have shown the potential to drive innovations across the American economy, from energy to medicine, through advancements in computation, networking and sensing. Breakthroughs in QIS are poised to generate entirely new industries, good-paying jobs, and economic opportunities for all Americans”, says the White House statement. 

The security encryption that operates in the background of current digital technology works essentially like a combination lock. In the same way as a combination lock can be opened with the time and patience needed to try all the possible combinations, so modern encryption can be unlocked with enough computing power.

Quantum technology offers the possibility to perform that task very much faster than conventional computers.

Quantum computers work fundamentally differently than conventional computers. Conventional computers rely on transistors, which form logic gates, basically little switches embedded on chip. In the same way a switch can take one of two positions, on or off, so conventional logic gates can produce one of two values, zero or one. String all of those zeros and ones together and you have modern computer code. But at the quantum atomic level, physics functions differently. It’s possible to create a unit of information called a quantum bit, or qubit, that doesn’t represent either zero or one but both at once.

That promises to make quantum computing much faster than conventional computing, fast enough to open up a very broad range of possibilities for Artificial Intelligence, cryptography and other scientific computations.

Quantum computing is still in its infancy. Experts disagree on how to judge the performance of quantum versus regular computers. But there is agreement that quantum computers that can break extremely complex encryption will arrive at some point and probably this decade. The Executive Order will direct the National Institute of Standards and Technology (NIST) to work with us industry to “generate research on, and encourage widespread, equitable adoption of, quantum-resilient cryptographic standards and technologies.” 

The US government's concern is that even if encrypted data cannot be decrypted on a US quantum computer, it doesn’t necessarily mean the same will be true when that data is run though a quantum computer belonging to a hostile state.

Right now, the US government relies on easily available, relatively cheap, commercial software for many of its IT systems. A change to using extremely expensive bespoke QIS systems will take many years to accomplish and government agencies would continue to rely on the  private sector to help manage what will likely be a very difficult transition. 

The process to transition the US government's  most vulnerable IT systems to QSI standards will take time, money and the patience to endure a lengthy process of updating the current IT infrastructure to protect against the impending threat of quantum computing.

White House:    DefenseOne:   Breaking Defemse:    Business Telegraph:   Marketwatch:   TelecomTV:    Mirage:

You Might Also Read: 

China Plans For Supremacy In AI & Quantum Computing:

 

« Anonymous Launch An Attack On Rosneft
The Cyber Security Investment Boom Continues »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

FT Cyber Resilience Summit: Europe

FT Cyber Resilience Summit: Europe

27 November 2024 | In-Person & Digital | 22 Bishopsgate, London. Business leaders, Innovators & Experts address evolving cybersecurity risks.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

TestFort

TestFort

TestFort QA Lab is a specialized software testing company offering independent quality assurance and software testing services.

ISTQB

ISTQB

ISTQB has defined the "ISTQB Certified Tester" scheme that has become the world-wide leader in the certification of competences in software testing.

PortSwigger

PortSwigger

PortSwigger's Burp Suite is an integrated platform for performing security testing of web applications.

Karamba Security

Karamba Security

Karamba provide an IoT Security solution for ECUs in automobiles which ensures that all cars are protected (not just autonomous cars).

Packet Ninjas

Packet Ninjas

Packet Ninjas is a niche cyber security agency with specialized expertise in the use of digital intelligence to strengthen cyber security.

Nuvias Group

Nuvias Group

Nuvias Group is a specialist value-addedd IT distribution company offering a service-led and solution-rich proposition ready for the new world of technology supply.

Fox-IT

Fox-IT

Fox-IT prevents, solves and mitigates the most serious cyber threats with smart solutions for governmental bodies, defense, law enforcement, critical infrastructure, banking and large enterprises.

SlashNext

SlashNext

The SlashNext Internet Access Protection System (IAPS) provides Zero-Day protection against all internet access threats including Social Engineering & Phishing, Malware, Exploits and Callback Attacks.

Nexus Group

Nexus Group

Nexus Group develops identity solutions for physical and digital access.

MAD Security

MAD Security

MAD Security is a premier provider of information and cybersecurity solutions that combine technology, managed security services, support and training.

Six Degrees

Six Degrees

Six Degrees is a leading secure, integrated cloud services provider. We protect UK organisations and help them thrive in the cloud by giving them secure platforms to innovate and grow.

SixThirty CYBER

SixThirty CYBER

SixThirty is a venture fund that invests in early-stage enterprise technology companies from around the world building FinTech, InsurTech, and Cybersecurity solutions.

Evalian

Evalian

Evalian is a data protection services provider. Working with organisations of all sizes, we specialise in Data Protection, GDPR, ISO Certification & Information Security.

Noetic Cyber

Noetic Cyber

Noetic provides a proactive approach to cyber asset and controls management, empowering security teams to see, understand, and optimize their cybersecurity posture.

Contextal

Contextal

Contextal develops cutting-edge open-source cybersecurity solutions, designed to connect the dots and detect complex threats, which slip through the existing protections.

Insane Cyber

Insane Cyber

Insane Cyber make cybersecurity easier to manage through automated, easy-to-use software and expert support and partnership.