The Problem With Quantum

Quantum computing is no longer a distant frontier, it’s a fast-approaching commercial viability, with major breakthroughs expected within the next five to ten years. Quantum computing is a new approach to calculation that uses the principles of fundamental physics to solve extremely complex problems very quickly.

Quantum computers will do extraordinary things. They will create extremely complex digital twins at the molecular level and develop optimisation solutions at the global level, creating change for many industries, from pharmaceuticals to logistics.

But before we can see any of those benefits, we need a viable quantum computer that can solve hyper-complex problems. The quantum computers we have today can solve problems, but nothing an ordinary computer can’t handle. 

But to take the next big leap in quantum computing, we need a stable qubit. A qubit, or quantum bit, is the most fundamental building block of a quantum computer. It functions much like a transistor on a standard computer chip, but it can calculate in ways no traditional microprocessor ever could. Building a useful quantum computer would require entangling thousands of these qubits.

Some of the most powerful institutions in the world, including Google, Microsoft, Amazon, IBM and the US Government , are spending many millions of dollars in a race to develop and build the first practical quantum computer.

For businesses, particularly those in data-sensitive sectors like finance, healthcare, and telecommunications, the technology poses both a transformative opportunity and a looming cyber security threat. Whereas it was previously estimated that it would take a quantum computer with 20 million quantum bits eight hours to crack the popular RSA algorithm, the new estimate reckons this could be done with 1 million qubits far quicker. 

Now, cyber security analysis are predicting a quantum apocalypse, an event when quantum computers become a reality and render most methods of Internet encryption useless.

  • The EU wants to speed up quantum computing, as Europe has fallen behind the US and China in rolling out the technology.
  • The US government fear is that a quantum computer would allow an adversary like China to quickly decode US military messages or consumer banking transactions.

Quantum computing is seen as the next frontier in technology. Its capabilities surpass those of existing supercomputers, enabling it to solve problems in areas ranging from drug discovery to battery technology, as well as communications and navigation technology for defence and space.

A Big Problem For Cyber Security

Modern-day digital communications, Internet traffic and data collections are secured using a system called public key cryptography, which relies on complex mathematics that regular computers can’t solve. But quantum computers, which are many times more powerful than today’s computers, could crack those codes easily, experts have warned.

Once quantum computers reach the inflection point, it would effectively mean that most of today’s data flying around on Internet wires would be readable to anyone tapping in.

The challenge for European countries will be to defend themselves against these emerging threats, or else fall prey to foreign spooks, cyber crooks and hackers. Europe is the global leader in the number of scientific publications on the technology, but private investment has mostly gone elsewhere.

Europe attracts only 5 percent of global private quantum funding, compared to over 50 percent by the US and 40 percent by China, according to the EU's calculations.

Cyber security authorities have suggested that EU countries protect critical infrastructure with post-quantum cyber security by the end of 2030. The dates proposed by European cyber officials roughly aligned with those put forward by the US, the UK and Australia

However, as data scientists make advances in the world of quantum computing, they're also working to create quantum-resistant algorithms to protect our digital footprints.

In the UK, all top secret government data has already been classified as post-quantum. This means that it uses new forms of encryption that scientists believe will stand up to quantum computers. Indeed, the UK has invested millions into the industry over the last few years and that amount is only going to rise.

Recent research from ISACA’s global Quantum Computing Pulse Poll highlights a growing concern, the rapid rise of quantum computing poses a serious risk to cyber security and business stability, yet most enterprises remain unprepared. 

While 62 percent of technology and cyber security professionals fear that quantum computing could break current Internet encryption standards, only five percent consider it a high priority in the near term.

Politico  |  Nokia  |   IBM  |     The Converstaion  |  Wired  |  McKinsey  |   @EpicPlain  |

The Week  |  Industrial Cyber 

 Image: Planet Volumes 

You Might Also Read: 

Facing The Quantum Challenge:


If you like this website and use the comprehensive 8,000-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible




 

« Fancy Bear's Anatomy: Tactics, Techniques & Procedures
Russian Cyber Crime Network Disrupted »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Tines

Tines

The Tines security automation platform helps security teams automate manual tasks, making them more effective and efficient.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

AV Test

AV Test

The AV-TEST Institute is a leading international and independent service provider in the fields of anti-virus research and IT security.

Security Stronghold

Security Stronghold

Security Stronghold is focused on protecting computers from malicious programs like viruses, Trojans, spyware, adware, trackware, keyloggers and other kinds of online threats.

RoboForm

RoboForm

RoboForm's industry-leading encryption technology securely stores your passwords, with one Master Password serving as your encryption key.

Magic Software Enterprises

Magic Software Enterprises

Magic provide Mobile Device Management (MDM) for Secure Enterprise Mobility. Magic MDM overcomes the challenges of mobile device management security by protecting all of your devices, data and content

Semperis

Semperis

Semperis is an enterprise identity protection company that enables organizations to quickly recover from accidental or malicious changes and disasters that compromise Active Directory.

PureCyber

PureCyber

PureCyber (formerly Wolfberry Cyber) is an award-winning cyber security consultancy whose goal it is to make cyber security accessible, understandable, and affordable for any organisation.

Onfido

Onfido

Onfido is building the new identity standard for the internet. We digitally prove people’s real identities using a photo ID and facial biometrics.

Cyberfort Group

Cyberfort Group

Cyberfort exists to provide our clients with the peace-of-mind about the security of their data and the compliance of their business.

Coretelligent

Coretelligent

Coretelligent is a leading providers of Managed and Co-Managed IT, cybersecurity and private cloud services.

Bosch Global Software Technologies (BGSW)

Bosch Global Software Technologies (BGSW)

Bosch Global Software Technologies offer an advanced innovation for AI security. The Bosch AIShield is the definite answer to safeguard your business against model extraction attacks.

Splashtop

Splashtop

Splashtop’s cloud-based, secure, and easily managed remote access solution is increasingly replacing legacy approaches such as virtual private networks.

Cytidel

Cytidel

Cytidel is a vulnerability and risk management platform that utilises threat and business intelligence to help IT Security teams.

Clango

Clango

Clango employs an identity-centric approach to optimizing your cybersecurity investment while minimizing risk.

Softanics

Softanics

Softanics’ ArmDot protects .NET apps with advanced obfuscation, control flow protection, and virtualization, securing code against reverse engineering without requiring agents or environment changes.

Arctera

Arctera

Arctera simplifies data management to keep you secure. Our company operates as three units - Data Compliance, Data Resilience, and Data Protection.

New York State Technology Enterprise Corporation (NYSTEC)

New York State Technology Enterprise Corporation (NYSTEC)

NYSTEC is a nonprofit technology consulting company, advising organizations, agencies, institutions, and businesses since 1996.