Quantum Computer Power Threatens Encryption

Encryption has played a core role in securing enterprise data, but as quantum computers become more advanced, traditional encryption solutions and public-key cryptography standards, which enterprise and consumer vendors rely on to secure their products, are at serious risk of decryption. 

The power of quantum computers lies in the fact that they can carry out many computations, while simultaneously considering several different configurations. As a result, they are much faster than traditional computers. 

Many people who have heard of quantum computing know that it’s coming and are aware that it will bring an almost unimaginable speed-up in the ability of computers to perform many kinds of calculations. This will allow wonderful advances in, for example, our ability to discover new materials and design new life-saving drugs. Now, cyber security researchers and analysts are worried that a new type of computer, based on quantum physics rather than more standard electronics, could break most modern cryptography. The effect would be to make communications as insecure as if they weren’t encoded at all.

Quantum computers have a significant and growing potential to change the way we process information, and they can also be used by our potential enemies for significant and highly destructive new modes of cyber attack.

The US Department of Defense (DoD) is concerned that a weaponised quantum computer could be used to break the encryption that protects sensitive government data and communications. Their analysis is that quantum computers will threaten data and privacy to the extent that this will force the largest technology upgrade cycle in computer history. Indeed, the US government has already recognised this issue, and claims to be dealing with the threat. 

They are not alone. It is evident that several nation-states are spending billions of dollars, and deploying thousands of computer scientists, along with many other skilled technologists  - to build a quantum computer that will break all current forms of encryption.

The head of Britain’s MI6 spy agency Richard Moore says that “our adversaries are pouring money and ambition into mastering artificial intelligence, quantum computing and synthetic biology because they know…this will give them leverage.”

Quantum computing can create immense business benefits, and the social implications of quantum technologies are likely to be far-reaching. By decade’s end, practical quantum computing solutions could impact computing strategies across industries which will profoundly alter how we think of computing and, critically, how we secure our digital economy through cryptography.

The governments and commercial organisations that are responsible for securing sensitive data must not underestimate the threat of quantum computers - the science to support quantum computing is well-founded and quantum computers may be a single breakthrough away from cracking modern cryptography.

IBM:    American Scientist:      I-HLS:     VentureBeat:     Verdict:    CIGI

You Might Also Read:

Quantum Computing Raises As Many Problems As It Solves:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« Rising Cybercrime Means SMEs Should Seek Cyber Insurance
Is Standardisation Of The Cybersecurity Profession A Good Thing? »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

UK Cyber Week Expo & Conference

UK Cyber Week Expo & Conference

Award-winning event organiser ROAR B2B announces the launch of UK Cyber Week and its inaugural event on 4 and 5 April 2023 at the Business Design Centre, London.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

BackupVault

BackupVault

BackupVault is a leading provider of completely automatic, fully encrypted online, cloud backup.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

CW Jobs

CW Jobs

CWJobs.co.uk is a leading specialist IT recruitment website covering all areas of IT including Cyber Security.

RSA Conference

RSA Conference

RSA Conference conducts information security events around the globe that connect you to industry leaders and highly relevant information.

Micro Focus

Micro Focus

Micro Focus is one of the world’s largest enterprise software providers. We deliver trusted and proven mission-critical software that keeps the digital world running.

Cavirin

Cavirin

Cavirin’s Automated Risk Analysis Platform reduces risk and automates security and compliance.

Swedish Civil Contingencies Agency (MSB)

Swedish Civil Contingencies Agency (MSB)

MSB's Information Assurance Department is responsible for supporting and coordinating work relating to Sweden's national societal information security.

Skkynet Cloud Systems

Skkynet Cloud Systems

Skkynet is a leader in real-time data systems for the secure management and control of industrial processes (SCADA) and embedded devices (M2M).

KeepSolid

KeepSolid

KeepSolid is a Virtual Private Network services provider offering secure encrypted access to the internet.

Relution

Relution

Relution is the Unified Endpoint Management platform for innovative companies and educational institutions. It enables you to manage your mobile apps and devices easily and securely.

National Information & Communication Security Taskforce (NICST) - Taiwan

National Information & Communication Security Taskforce (NICST) - Taiwan

National Information & Communication Security Taskforce (NICST) is responsible for coordination and policy making of information and communication security in Taiwan.

Cloud GRC

Cloud GRC

Cloud GRC is an innovative cybersecurity company with solutions and expertise in Cybersecurity Strategies & Frameworks, Threat & Risk Assessment, Cloud Security, and Regulatory Compliance Requirements

Conference on Applied Machine Learning in Information Security (CAMLIS)

Conference on Applied Machine Learning in Information Security (CAMLIS)

CAMLIS is a venue for discussing applied research on machine learning, deep learning and data science in information security.

11:11 Systems

11:11 Systems

11:11 Systems synchronizes every aspect of network services for your business. Build your network with the industry’s most trusted expert skills.

Quantum Star Technologies

Quantum Star Technologies

Quantum Star Technologies has developed Starpoint to be a next-next-generation solution to cyber security threats. Our mission is to secure the online world through our patented technology.

Fenix24

Fenix24

Fenix24 is an industry leader in the incident-response space. We ensure the fastest response, leading to the full restoration of critical infrastructure, data, and systems.

Tarlogic

Tarlogic

Tarlogic works to protect and defend your security with the highest quality technical team with next generation solutions to achieve the best protection.

Rhymetec

Rhymetec

Rhymetec are an industry leader in cloud security, providing innovative cybersecurity and data privacy services to the modern-day SaaS business.