Special Measures To Deal With Quantum Technology

The US Government is planning a new policy to secure its information technology infrastructure against fast-moving development of quantum supercomputers.  President Biden has signed two directives aimed at advancing quantum science, including a memorandum outlining his administration’s plan to address national security risks posed by quantum computers that could be capable of breaking the US Defense Department’s communications encryption. 

“Current research shows that at some point in the not-too-distant future, when quantum information science matures, quantum computers… will be capable of breaking much of the cryptography that currently secures our digital communication,” a senior White House official told reporters.

Quantum computers, one of many quantum information science applications, is a “fundamentally different kind of computer with the ability to analyse information in ways that traditional computers cannot,” according to a White House press release announcing the directives. 

The Presidential memorandum also directs the federal government to protect quantum technologies from theft by criminals and adversaries and initiates collaboration between the federal government and private sector by establishing a “Migration to Post-Quantum Cryptography Project” at the US National Cybersecurity Center of Excellence and an open working group with industry. 

The Washington-based Quantum Alliance Initiative (QAI), is a private sector initiative to promote US leadership  in global quantum computing-enabled security, however, it is known that various state actors,  in other parts off the world, including Australia, Canada, China, France, Germany, Russia, Saudi Arabia, the UK and even North Korea, are channelling both public and private investment into developing their own quantum computers as quickly as possible.

Now, President Biden will sign an executive order placing the National Quantum Initiative Advisory Committee, the US government’s independent advisory body for quantum information science and technology, directly under the authority of the White House. 

This action aims to ensure “that the president, Congress, federal departments and agencies and the general public receive the most current, accurate and relevant information on quantum information science and technology to drive forward US policy making in this area,” according to the White House. “The United States has long been a global leader in the development of new technologies, like Quantum Information Science (QIS).

QIS is a broad field of science and engineering. Quantum computers, one of the many promising applications of QIS, are not a replacement to traditional computers. Rather, they are a fundamentally different kind of computer, with the ability to analyse information in ways that traditional computers cannot.  “While QIS itself is not new, recent breakthroughs in QIS have shown the potential to drive innovations across the American economy, from energy to medicine, through advancements in computation, networking and sensing. Breakthroughs in QIS are poised to generate entirely new industries, good-paying jobs, and economic opportunities for all Americans”, says the White House statement. 

The security encryption that operates in the background of current digital technology works essentially like a combination lock. In the same way as a combination lock can be opened with the time and patience needed to try all the possible combinations, so modern encryption can be unlocked with enough computing power.

Quantum technology offers the possibility to perform that task very much faster than conventional computers.

Quantum computers work fundamentally differently than conventional computers. Conventional computers rely on transistors, which form logic gates, basically little switches embedded on chip. In the same way a switch can take one of two positions, on or off, so conventional logic gates can produce one of two values, zero or one. String all of those zeros and ones together and you have modern computer code. But at the quantum atomic level, physics functions differently. It’s possible to create a unit of information called a quantum bit, or qubit, that doesn’t represent either zero or one but both at once.

That promises to make quantum computing much faster than conventional computing, fast enough to open up a very broad range of possibilities for Artificial Intelligence, cryptography and other scientific computations.

Quantum computing is still in its infancy. Experts disagree on how to judge the performance of quantum versus regular computers. But there is agreement that quantum computers that can break extremely complex encryption will arrive at some point and probably this decade. The Executive Order will direct the National Institute of Standards and Technology (NIST) to work with us industry to “generate research on, and encourage widespread, equitable adoption of, quantum-resilient cryptographic standards and technologies.” 

The US government's concern is that even if encrypted data cannot be decrypted on a US quantum computer, it doesn’t necessarily mean the same will be true when that data is run though a quantum computer belonging to a hostile state.

Right now, the US government relies on easily available, relatively cheap, commercial software for many of its IT systems. A change to using extremely expensive bespoke QIS systems will take many years to accomplish and government agencies would continue to rely on the  private sector to help manage what will likely be a very difficult transition. 

The process to transition the US government's  most vulnerable IT systems to QSI standards will take time, money and the patience to endure a lengthy process of updating the current IT infrastructure to protect against the impending threat of quantum computing.

White House:    DefenseOne:   Breaking Defemse:    Business Telegraph:   Marketwatch:   TelecomTV:    Mirage:

You Might Also Read: 

China Plans For Supremacy In AI & Quantum Computing:

 

« Anonymous Launch An Attack On Rosneft
The Cyber Security Investment Boom Continues »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Blue Frost Security

Blue Frost Security

Blue Frost Security provides high-level IT security consulting, penetration testing services, ISO 27001 Solutions, PCI compliance solutions and training.

OPSWAT

OPSWAT

OPSWAT is a software company that provides solutions to secure and manage IT infrastructure.

National Security Authority (NBU) - Slovakia

National Security Authority (NBU) - Slovakia

The National Security Authority (NBU) is the central government body in Slovakia for the Protection of Classified Information, Cryptographic Services, Trust Services and Cyber Security.

Governikus

Governikus

Governikus provides solutions for secure data transport, authentication, the use of electronic signatures and cryptography as well as for long-term storage.

SaferVPN

SaferVPN

SaferVPN is a Virtual Private Network services provider offering secure encrypted access to the internet.

Fugue

Fugue

Fugue ensures cloud infrastructure stays in continuous compliance with enterprise security policies.

Infopulse

Infopulse

Infopulse is a global provider of Software Engineering, Cloud & IT Infrastructure Management, and Cybersecurity services.

DestructData

DestructData

DestructData is a leading independent provider of End of Life data destruction/security solutions.

Alpine Security

Alpine Security

Alpine Security provides penetration testing, security assessments and cybersecurity training services.

Expel

Expel

Expel provide transparent managed security services, 24x7 detection, response and resilience.

TriagingX

TriagingX

TriagingX successfully created the first generation malware sandbox that is being used by many Fortune 500 companies for daily malware analysis.

Kratos Defense & Security Solutions

Kratos Defense & Security Solutions

The Kratos Space, Training, and Cybersecurity division addresses key cybersecurity challenges, including cloud security, continuous monitoring, IT security, and risk management.

MicroSec

MicroSec

MicroSec is a company specializing in IoT security. We focus on bringing enterprise grade security to IoT and embedded systems.

KATIM

KATIM

KATIM is a leader in the development of innovative secure communication products and solutions for governments and businesses.

Vali Cyber

Vali Cyber

Vali Cyber was founded in 2020 with the mission of addressing the specific cybersecurity needs of Linux.

Indian Cyber Security Solutions (ICSS)

Indian Cyber Security Solutions (ICSS)

Indian Cyber Security Solutions is an Enterprise Cyber Security Platforms company offering Cyber Security & Technical Education and Compliance & Penetration Testing Services.