Quantum-Safe Encryption Comes Closer

As innovation has progressed from the Internet, Wi-Fi, smartphones, and the Internet of Things, there have been significant security concerns with each technological step. Currently, most security systems in existing IT environments rely on public-key cryptography, which is used almost everywhere from messaging to transactions to securing data at rest.

These cryptographic systems are based on mathematical problems that are difficult and time- consuming for classical computers, but will be much easier and quicker for quantum computers to solve. Indeed, the race to secure our digital world has never been more urgent and the potential of  Quantum computing is  fast becoming reality. 

Quantum computers use properties of quantum mechanics to compute in a fundamentally different way from today's digital, 'classical', computers. They are, theoretically, capable of performing certain computations that would not be feasible for classical computers. 

While their potential to revolutionise fields like healthcare and financial services  is immense, so too is their potential to overturn digital security.  

The encryption that protects everything from our financial transactions to state secrets is at risk of being rendered obsolete by quantum computing. Quantum computers have the potential to solve certain complex mathematical problems millions of times faster than today’s classical computers. This capability, while groundbreaking, poses a significant threat to the encryption algorithms that currently secure the Internet. 

Public-key cryptography, which underpins the security of online banking, email, and secure communications, relies on the difficulty of factoring large numbers something that quantum computing can fix in minutes. Experts have warned that adversaries might already be harvesting encrypted data, biding their time until quantum computers are powerful enough to decrypt it. This Store Now, Decrypt Later” (SNDL)  strategy could lead to catastrophic breaches of sensitive information.

In response, the National Institute of Standards and Technology (NIST) has taken crucial steps to safeguard the future. 

Recognising the gravity of the threat, NIST has spearheaded an initiative to develop new cryptographic algorithms that can withstand the power of quantum computers. After years of rigorous testing and evaluation, NIST has recently published three new algorithms designed to protect against quantum attacks. These algorithms represent the best hope we have for securing our digital future, and their adoption across industries is imperative.

But transitioning to quantum-safe encryption is no small task. The process of integrating these new algorithms into existing systems will take years, if not decades. Companies across sectors, from banking to telecommunications, must begin now to ensure their products and services are equipped to resist quantum threats. 

The importance of quantum-safe encryption extends far beyond protecting individual companies or even entire industries. At its core, this is a matter of national security. 

The US faces sophisticated cyber threats from adversaries like China and Russia, both of which are investing heavily in quantum computing technology. If these nations develop quantum capabilities before the US has transitioned to quantum-safe encryption, the consequences could be severe.

  • Communications that are currently secure could be exposed, revealing sensitive information about troop movements, intelligence operations, and strategic plans. 
  • The ability of an adversary to decrypt classified information in real time would fundamentally alter the balance of power, eroding the US’s strategic advantage and putting lives at risk.

These strategic threats will serve to accelerate the adoption of quantum-safe encryption standards across all sectors critical to national security, not only government agencies but also private companies that handle sensitive data, such as defence contractors and financial institutions. This includes providing clear guidance and support to industries that may struggle with the technical and financial challenges of such a transition.

Given the potentially catastrophic consequences of a quantum cyberattack, the cost of these measures would be a small price to pay for enhanced national security.  As quantum computing evolves, so too must our ability to defend against and, if necessary, retaliate against quantum-enabled cyberattacks. This includes strengthening encryption methods and developing tools to detect and neutralise quantum based threats before they can do harm.

The actions taken by NIST to develop quantum-safe encryption standards are a critical first step. For the US the race to achieve quantum security is imperative to safeguard its national security and digital infrastructure.

NIST   |   NCSC   |    Microsoft   |    WEF   |   Oodaloop  |    Vodafone   |    Quanta Magazine

Image: planetvolumes

You Might Also Read: 

Standards: The Key To Building A Sustainable Quantum-Safe Future:


If you like this website and use the comprehensive 7,000-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« The Obstacles That Security Teams Face In Vulnerability Management
NIS2 - Countdown To Compliance »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

CERT.BY

CERT.BY

The National Computer Emergency Response Team of the Republic of Belarus.

Bulletproof Cyber

Bulletproof Cyber

Bulletproof offer a range of security services, from penetration testing and vulnerability assessments to 24/7 security monitoring, and consultancy.

I-Tracing

I-Tracing

I-TRACING are experts in IT security, specialized in legal compliance of information systems, security of information systems, and the collection of digital evidence and traces.

NXO France

NXO France

NXO is an independent leader in the integration and management of digital workflows with services covering digital infrastructures, communications & collaboration, and security.

CTM360

CTM360

CTM360 is a unified external security platform offering 24x7x365 Cyber Threat Management for detecting and responding to cyber threats.

Singular Security

Singular Security

Singular Security help public and private organizations minimize cybersecurity risk and pass their IT compliance audit.

OWN

OWN

OWN (formerly SEKOIA) is a major French player in cybersecurity providing tailor-made, informed and adapted cyber support thanks to its DNA of passionate and committed experts.

Centre for Cyber Security Belgium (CCB)

Centre for Cyber Security Belgium (CCB)

The Centre for Cyber Security Belgium is the central authority for cyber security in Belgium.

Guernsey

Guernsey

Guernsey provides a wide range of engineering, architecture and consulting services to multiple markets, including cybersecurity consulting and CMMC certification.

Raiven Capital

Raiven Capital

Raiven Capital is a global early-stage technology venture capital fund. We focus on founder-led, driven companies on the leading edge of disruption.

Istari

Istari

ISTARI is a new kind of cyber risk management company. We’re an agile collective of best-in-class capabilities and experts, who build ongoing partnerships with clients.

CSIR Information & Cybersecurity Research Centre

CSIR Information & Cybersecurity Research Centre

The CSIR Information & Cybersecurity Research Centre focuses on research, development, and innovation of home-grown cyber and information security.

Next DLP

Next DLP

Next DLP (formerly Jazz Networks) is a leading provider of insider risk and data protection solutions.

Elitery

Elitery

Elitery is an IT-managed service company that focuses on cloud and cybersecurity services.

tmc3

tmc3

tmc3 is an award-winning, people-centric consultancy that is transforming cyber security from an overhead into an organisational enabler.

DRTConfidence

DRTConfidence

DRTConfidence is the proven solution for today’s organizations needing to meet rigorous compliance standards across the enterprise.