Special Measures To Deal With Quantum Technology

The US Government is planning a new policy to secure its information technology infrastructure against fast-moving development of quantum supercomputers.  President Biden has signed two directives aimed at advancing quantum science, including a memorandum outlining his administration’s plan to address national security risks posed by quantum computers that could be capable of breaking the US Defense Department’s communications encryption. 

“Current research shows that at some point in the not-too-distant future, when quantum information science matures, quantum computers… will be capable of breaking much of the cryptography that currently secures our digital communication,” a senior White House official told reporters.

Quantum computers, one of many quantum information science applications, is a “fundamentally different kind of computer with the ability to analyse information in ways that traditional computers cannot,” according to a White House press release announcing the directives. 

The Presidential memorandum also directs the federal government to protect quantum technologies from theft by criminals and adversaries and initiates collaboration between the federal government and private sector by establishing a “Migration to Post-Quantum Cryptography Project” at the US National Cybersecurity Center of Excellence and an open working group with industry. 

The Washington-based Quantum Alliance Initiative (QAI), is a private sector initiative to promote US leadership  in global quantum computing-enabled security, however, it is known that various state actors,  in other parts off the world, including Australia, Canada, China, France, Germany, Russia, Saudi Arabia, the UK and even North Korea, are channelling both public and private investment into developing their own quantum computers as quickly as possible.

Now, President Biden will sign an executive order placing the National Quantum Initiative Advisory Committee, the US government’s independent advisory body for quantum information science and technology, directly under the authority of the White House. 

This action aims to ensure “that the president, Congress, federal departments and agencies and the general public receive the most current, accurate and relevant information on quantum information science and technology to drive forward US policy making in this area,” according to the White House. “The United States has long been a global leader in the development of new technologies, like Quantum Information Science (QIS).

QIS is a broad field of science and engineering. Quantum computers, one of the many promising applications of QIS, are not a replacement to traditional computers. Rather, they are a fundamentally different kind of computer, with the ability to analyse information in ways that traditional computers cannot.  “While QIS itself is not new, recent breakthroughs in QIS have shown the potential to drive innovations across the American economy, from energy to medicine, through advancements in computation, networking and sensing. Breakthroughs in QIS are poised to generate entirely new industries, good-paying jobs, and economic opportunities for all Americans”, says the White House statement. 

The security encryption that operates in the background of current digital technology works essentially like a combination lock. In the same way as a combination lock can be opened with the time and patience needed to try all the possible combinations, so modern encryption can be unlocked with enough computing power.

Quantum technology offers the possibility to perform that task very much faster than conventional computers.

Quantum computers work fundamentally differently than conventional computers. Conventional computers rely on transistors, which form logic gates, basically little switches embedded on chip. In the same way a switch can take one of two positions, on or off, so conventional logic gates can produce one of two values, zero or one. String all of those zeros and ones together and you have modern computer code. But at the quantum atomic level, physics functions differently. It’s possible to create a unit of information called a quantum bit, or qubit, that doesn’t represent either zero or one but both at once.

That promises to make quantum computing much faster than conventional computing, fast enough to open up a very broad range of possibilities for Artificial Intelligence, cryptography and other scientific computations.

Quantum computing is still in its infancy. Experts disagree on how to judge the performance of quantum versus regular computers. But there is agreement that quantum computers that can break extremely complex encryption will arrive at some point and probably this decade. The Executive Order will direct the National Institute of Standards and Technology (NIST) to work with us industry to “generate research on, and encourage widespread, equitable adoption of, quantum-resilient cryptographic standards and technologies.” 

The US government's concern is that even if encrypted data cannot be decrypted on a US quantum computer, it doesn’t necessarily mean the same will be true when that data is run though a quantum computer belonging to a hostile state.

Right now, the US government relies on easily available, relatively cheap, commercial software for many of its IT systems. A change to using extremely expensive bespoke QIS systems will take many years to accomplish and government agencies would continue to rely on the  private sector to help manage what will likely be a very difficult transition. 

The process to transition the US government's  most vulnerable IT systems to QSI standards will take time, money and the patience to endure a lengthy process of updating the current IT infrastructure to protect against the impending threat of quantum computing.

White House:    DefenseOne:   Breaking Defemse:    Business Telegraph:   Marketwatch:   TelecomTV:    Mirage:

You Might Also Read: 

China Plans For Supremacy In AI & Quantum Computing:

 

« Anonymous Launch An Attack On Rosneft
The Cyber Security Investment Boom Continues »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Lacuna Talent

Lacuna Talent

Lacuna Talent delivers the combined power of Via Resource, the international Cyber Security recruiter, and Lacuna Talent, the Specialist AI/Data recruiter.

Forcepoint

Forcepoint

Forcepoint provide a unified, cloud-centric platform that safeguards users, networks and data while eliminating the inefficiencies of managing multiple point security products.

Avatu

Avatu

Avatu specialise in providing clients the advice, technology and tools they need to fight cyber and insider threats.

IT Security Association Germany (TeleTrusT)

IT Security Association Germany (TeleTrusT)

TeleTrusT is an IT Security association and network for IT security comprising members from industry, administration, consultancy and research.

Malware Patrol

Malware Patrol

Malware Patrol provides intelligent threat data that protects against cyber attacks.

Horangi

Horangi

Horangi provides security products and services that enable the rapid delivery of Incident Response and threat detection for our customers who lack the scale, expertise, or time to do it themselves.

Kippeo Technologies

Kippeo Technologies

Kippeo is a security systems integrator providing innovative solutions that look at all the parameters and connect all the dots.

Veriff

Veriff

Veriff provides highly-automated identity-verification services that prevent fraud like nothing else on the market.

eResilience

eResilience

eResilience is a division of Referentia Systems, a pioneer in an ultra-secure information safeguarding technique known as “Enclaving”, in which data can be segmented and protected within a network.

LTIMindtree

LTIMindtree

LTIMindtree is a new kind of technology consulting firm. We help businesses transform – from core to experience – to thrive in the marketplace of the future.

Crosspoint Capital Partners

Crosspoint Capital Partners

Crosspoint Capital Partners is a private equity investment firm focused on the cybersecurity and privacy sectors.

UK Cyber Cluster Collaboration (UKC3)

UK Cyber Cluster Collaboration (UKC3)

UKC3 has been launched to support Cyber Clusters and encourage greater collaboration across regions and nations of the UK.

Quarkslab

Quarkslab

Quarkslab is a dedicated team of cyber-security engineers and developers. We aim at forcing the attackers, not the defender, to adapt constantly.

Radiant Security

Radiant Security

Radiant Security offers an AI-powered security co-pilot for Security Operations Centers (SOCs). Reinforce your SOC with an AI assistant.

OrbiSky Systems

OrbiSky Systems

OrbiSky Systems is a British tech startup specializing in data management and cybersecurity solutions.

Hopper Security

Hopper Security

The Future of Open-Source Risk Management Starts Here. We built Hopper to make sure you can harness the power of Open-Source safely and effectively.