The Quantum Computer Threat To Encryption Should Be Taken Seriously

The advanced computing capabilities of quantum computers will render most traditional encryption protocols used today obsolete. 

Quantum computing takes advantage of the strange ability of subatomic particles to exist in more than one state at any time. Due to the way the tiniest of particles behave, operations can be done much more quickly and use less energy than classical computers. Quantum technology can exploit quantum mechanical phenomena to solve mathematical problems that are difficult or intractable for conventional computers. 

In classical computing, a bit is a single piece of information that can exist in two states – 1 or 0. Quantum computing uses quantum bits, or 'qubits' instead. These are quantum systems with two states. However, unlike a usual bit, they can store much more information than just 1 or 0, because they can exist in any superposition of these values.

Future for Quantum Computing
Now if large-scale quantum computers are ever built, they will be able to break many of the public-key cryptosystems currently in use, according to NIST. The US National Institute of Standards and Technology (NIST) wants to develop new encryption standards designed to protect the federal government from new and emerging cybersecurity threats.

The agency spent much of the past year evaluating 69 algorithms for its Post Quantum Cryptography Standardisation project, designed to protect the machines used by federal agencies today from the encryption-breaking tools of tomorrow. The submitted algorithms are all designed to work with current technology and equipment, each offering different ways to protect computers and data from attack vectors, known and unknown, posed by developments in quantum computing.

Matthew Scholl, Chief of the Computer Security Division at NIST, said: “This is to ensure that we have some resilience so that when a quantum machine actually comes around, having more than one algorithm with some different genetic mathematical foundations, will ensure that we have a little more resiliency in that kit going forward.”

NIST is also working on another revamp of encryption standards for small “lightweight” computing devices, focusing on components such as RFID tags, industrial controllers, sensor nodes and smart cards that are inherent in many Internet of Things devices.The US government’s current encryption standards are largely designed for personal computers, laptops and other general purpose computing platforms. 

NIST officials believe new standards are needed to tackle a range of problems, from increasing reliance on connected devices to dissatisfaction with current identity and access management tools.

I-HLS:      Wired:

You Might Also Read: 

Quantum Computing – Advantage Or Security Threat?:

 

« Zain Qaider And The Sixty Year Rule
National Teams Engage In NATO’s Annual Cyber Challenge »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Arsenal Insurance Company

Arsenal Insurance Company

Arsenal is an insurance provider based in Moscow, Russia. Services offered include Cyber Risk insurance.

Robert Half Technology

Robert Half Technology

Robert Half Technology offers a full spectrum of technology staffing solutions to meet contract and full-time IT recruitment needs.

Identillect Technologies

Identillect Technologies

Identillect Technologies provide a user-friendly secure email solution to protect critical information, with an emphasis on simplicity.

Open Information Security Foundation (OISF)

Open Information Security Foundation (OISF)

OISF is a non-profit organization led by world-class security experts, programmers, and others dedicated to open source security technologies.

Hacker House

Hacker House

Hacker House teaches you what hackers can learn about your business and systems so that preventative solutions to protect your assets can be applied through active measures.

Air Informatics

Air Informatics

Air Informatics LLC provides security, information management, analytics and informatics for IT and wirelessly enabled airplanes and operations.

Dracoon

Dracoon

DRACOON is market leader in the German-speaking region for secure enterprise file sharing.

iProov

iProov

iProov delivers authentication and verification simply and securely, based on a genuine one-time biometric.

Uptycs

Uptycs

Uptycs combines the open source universal agent, osquery, with a scalable security analytics platform for fleet visibility, intrusion detection, vulnerability monitoring and compliance.

Intellias

Intellias

Intellias is a trusted technology partner to top-tier organizations and digital natives helping them accelerate their pace of sustainable digitalization.

Cigent Technology

Cigent Technology

Cigent keeps the most valuable asset in your organization safe—your data. Our advanced endpoint and managed network security solutions prevent ransomware and data theft.

Tabidus Technology

Tabidus Technology

Tabidus Technology is a cybersecurity association that unites and provides the global protection options against cyber threats.

Cloud Range

Cloud Range

Cloud Range provides cybersecurity teams with access to the world's leading cyber range platform, eliminating the need to invest in costly cyber range infrastructure.

Cyber Tzar

Cyber Tzar

Cyber Tzar is a new approach at dealing with an old problem; assessing and managing risks to your IT estate.

People Driven Technology

People Driven Technology

People Driven Technology is a customer-obsessed organization. We leverage our decades of business, technology, and engineering experience to deliver outcomes for our clients.

Flotek

Flotek

Flotek is an IT & Comms service provider delivering SMEs with trusted, innovative and cost effective cloud technology, with confidence, clarity and clout.

Rootly

Rootly

Rootly is an incident management platform on Slack that helps automate manual admin work during incidents.