Quantum Computer Power Threatens Encryption

Encryption has played a core role in securing enterprise data, but as quantum computers become more advanced, traditional encryption solutions and public-key cryptography standards, which enterprise and consumer vendors rely on to secure their products, are at serious risk of decryption. 

The power of quantum computers lies in the fact that they can carry out many computations, while simultaneously considering several different configurations. As a result, they are much faster than traditional computers. 

Many people who have heard of quantum computing know that it’s coming and are aware that it will bring an almost unimaginable speed-up in the ability of computers to perform many kinds of calculations. This will allow wonderful advances in, for example, our ability to discover new materials and design new life-saving drugs. Now, cyber security researchers and analysts are worried that a new type of computer, based on quantum physics rather than more standard electronics, could break most modern cryptography. The effect would be to make communications as insecure as if they weren’t encoded at all.

Quantum computers have a significant and growing potential to change the way we process information, and they can also be used by our potential enemies for significant and highly destructive new modes of cyber attack.

The US Department of Defense (DoD) is concerned that a weaponised quantum computer could be used to break the encryption that protects sensitive government data and communications. Their analysis is that quantum computers will threaten data and privacy to the extent that this will force the largest technology upgrade cycle in computer history. Indeed, the US government has already recognised this issue, and claims to be dealing with the threat. 

They are not alone. It is evident that several nation-states are spending billions of dollars, and deploying thousands of computer scientists, along with many other skilled technologists  - to build a quantum computer that will break all current forms of encryption.

The head of Britain’s MI6 spy agency Richard Moore says that “our adversaries are pouring money and ambition into mastering artificial intelligence, quantum computing and synthetic biology because they know…this will give them leverage.”

Quantum computing can create immense business benefits, and the social implications of quantum technologies are likely to be far-reaching. By decade’s end, practical quantum computing solutions could impact computing strategies across industries which will profoundly alter how we think of computing and, critically, how we secure our digital economy through cryptography.

The governments and commercial organisations that are responsible for securing sensitive data must not underestimate the threat of quantum computers - the science to support quantum computing is well-founded and quantum computers may be a single breakthrough away from cracking modern cryptography.

IBM:    American Scientist:      I-HLS:     VentureBeat:     Verdict:    CIGI

You Might Also Read:

Quantum Computing Raises As Many Problems As It Solves:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« Rising Cybercrime Means SMEs Should Seek Cyber Insurance
Is Standardisation Of The Cybersecurity Profession A Good Thing? »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

MarQuest

MarQuest

MarQuest provides services and systems to enhance network reliability and security.

Singapore Cybersecurity Consortium

Singapore Cybersecurity Consortium

Singapore Cybersecurity Consortium was created to encourage use-inspired research, training and technology awareness in cybersecurity.

GuardKnox

GuardKnox

GuardKnox protects the users of connected vehicles against threats that can endanger their physical safety and the safety of their personal information.

Silicon:SAFE

Silicon:SAFE

Silicon:SAFE develops impenetrable hardware solutions that prevent bulk data theft during a cyber-attack.

TUV Rheinland Group

TUV Rheinland Group

TUV Rheinland Group is a testing services company with nearly 145 years of technological experience. We help you to protect your systems comprehensively, proactively and permanently.

Axcient

Axcient

Axcient offers MSPs the most secure backup and disaster recovery technology stack with a proven Business Availability suite.

ICS-CSR

ICS-CSR

ICS-CSR is a research conference bringing together researchers with an interest in the security of industrial control systems.

VIBE Cybersecurity International

VIBE Cybersecurity International

VIBE’s certificate-less authenticated encryption enables scalable, flexible key exchange, and other advanced cryptographic functions using identity-based elliptic curve cryptosystems (ECC).

Corsha

Corsha

Corsha is on a mission to simplify API security and allow enterprises to embrace modernization, complex deployments, and hybrid environments with confidence.

Aiden Technologies

Aiden Technologies

Aiden simplifies your IT process, giving you peace of mind and security by ensuring your computers get exactly the software they need and nothing else.

6WIND

6WIND

6WIND deliver virtualized, cloud-native, distributed high performance & secure networking software solutions to support new applications such as 5G, IoT, SD-WAN.

Appknox

Appknox

Appknox is the world’s most powerful plug-and-play security platform that helps developers, security researchers, and enterprises to build a safe and secure mobile ecosystem.

DarkFeed

DarkFeed

DarkFeed is a Threat Intelligence provider that monitors the darknet in real-time, where hackers and Cyber criminals are most active.

DART Consulting & Training

DART Consulting & Training

DART is a leading cyber training and consultancy company. We enhance our clients’ cyber capabilities by growing and strengthening their frontline defense – the cyber teams.

FoxPointe Solutions

FoxPointe Solutions

FoxPointe Solutions is a full-service cyber risk management and compliance firm.

Hummingbird International

Hummingbird International

Hummingbird International, LLC offers services for the collection, audit, computer recycling and safe disposal of laptops, monitor/LCD, hard drives, and IT disposal.