• Tech News
    • Games
    • Pc & Laptop
    • Mobile Tech
    • Ar & Vr
    • Security
  • Startup
    • Fintech
  • Reviews
  • How To
What's Hot

Elementor #32036

January 24, 2025

The Redmi Note 13 is a bigger downgrade compared to the 5G model than you might think

April 18, 2024

Xiaomi Redmi Watch 4 is a budget smartwatch with a premium look and feel

April 16, 2024
Facebook Twitter Instagram
  • Contact
  • Privacy Policy
  • Terms & Conditions
Facebook Twitter Instagram Pinterest VKontakte
Behind The ScreenBehind The Screen
  • Tech News
    1. Games
    2. Pc & Laptop
    3. Mobile Tech
    4. Ar & Vr
    5. Security
    6. View All

    Bring Elden Ring to the table with the upcoming board game adaptation

    September 19, 2022

    ONI: Road to be the Mightiest Oni reveals its opening movie

    September 19, 2022

    GTA 6 images and footage allegedly leak

    September 19, 2022

    Wild west adventure Card Cowboy turns cards into weird and silly stories

    September 18, 2022

    7 Reasons Why You Should Study PHP Programming Language

    October 19, 2022

    Logitech MX Master 3S and MX Keys Combo for Business Gen 2 Review

    October 9, 2022

    Lenovo ThinkPad X1 Carbon Gen10 Review

    September 18, 2022

    Lenovo IdeaPad 5i Chromebook, 16-inch+120Hz

    September 3, 2022

    It’s 2023 and Spotify Still Can’t Say When AirPlay 2 Support Will Arrive

    April 4, 2023

    YouTube adds very convenient iPhone homescreen widgets

    October 15, 2022

    Google finishes iOS 16 Lock Screen widgets rollout w/ Maps

    October 14, 2022

    Is Apple actually turning iMessage into AIM or is this sketchy redesign rumor for laughs?

    October 14, 2022

    MeetKai launches AI-powered metaverse, starting with a billboard in Times Square

    August 10, 2022

    The DeanBeat: RP1 simulates putting 4,000 people together in a single metaverse plaza

    August 10, 2022

    Improving the customer experience with virtual and augmented reality

    August 10, 2022

    Why the metaverse won’t fall to Clubhouse’s fate

    August 10, 2022

    How Apple privacy changes have forced social media marketing to evolve

    October 16, 2022

    Microsoft Patch Tuesday October Fixed 85 Vulnerabilities – Latest Hacking News

    October 16, 2022

    Decentralization and KYC compliance: Critical concepts in sovereign policy

    October 15, 2022

    What Thoma Bravo’s latest acquisition reveals about identity management

    October 14, 2022

    What is a Service Robot? The vision of an intelligent service application is possible.

    November 7, 2022

    Tom Brady just chucked another Microsoft Surface tablet

    September 18, 2022

    The best AIO coolers for your PC in 2022

    September 18, 2022

    YC’s Michael Seibel clarifies some misconceptions about the accelerator • DailyTech

    September 18, 2022
  • Startup
    • Fintech
  • Reviews
  • How To
Behind The ScreenBehind The Screen
Home»Security»The truth about quantum risk cryptography and being ‘quantum safe’
Security

The truth about quantum risk cryptography and being ‘quantum safe’

August 12, 2022No Comments6 Mins Read
Facebook Twitter Pinterest LinkedIn Tumblr Email
How to gain an unfair advantage over cyberattackers: “Mission control” cybersecurity
Share
Facebook Twitter LinkedIn Pinterest Email

Were you unable to attend Transform 2022? Check out all of the summit sessions in our on-demand library now! Watch here.


The creation of classical computing may have paved the way for the modern enterprise, but it’s also barely scratched the surface of the limits of data processing potential. In the future, quantum computers will amplify the resources that organizations have available to process their data. 

While quantum computing will unlock powerful analytics and artificial intelligence (AI) processing capabilities, it also opens the door to serious security vulnerabilities, due to the ability of these computers to decrypt public-key algorithms. 

This would give cybercriminals and nation-states the ability to openly decrypt information protected by public-key algorithms — not just in the future, but also retrospectively — by collecting encrypted data today to decrypt when quantum computers finally reach maturity. 

Although researchers estimate that quantum computers could be able to do this as soon as 2030, with the Biden administration’s CHIPS and Science Act [subscription required] being approved by Congress last week –  and setting aside $52 billion in subsidies to support semiconductor manufacturers, and $200 billion to aid research in AI, robotics and quantum computing – this development could happen much sooner. 

The truth about quantum risk 

The idea of quantum risk dates back to 1994, when mathematician and researcher Peter Shor created Shor’s algorithm, and discovered that it was theoretically possible to break cryptographic algorithms with number factorization.  

This first highlighted the vulnerability of public-key algorithms that weren’t able to offer this level of factorization. However, not all forms of public-key encryption are as susceptible to exploitation as others, so it’s important not to panic about quantum risk. 

See also  Persona releases a brand new threat verification engine to fight identification fraud 

“Quantum computers cracking crypto sounds scary and will get people reading, but the reality is much more nuanced. Will some types of QC eventually be able to decode some of today’s best crypto? Almost certainly. Will we have time to put measures in place before that happens? Signs point to yes,” said Brian Hopkins, Forrester analyst. 

Hopkins explains that, on the one hand, asymmetric key encryption algorithms like PKI are the most vulnerable, while symmetric key encryption is much less vulnerable, and one-time pads would remain “pretty much unbreakable.” 

For Hopkins, the main risk posed by quantum computers lies in the fact that small advances in their infrastructure can oustrip classical systems and rapidly change the threat landscape. 

“If one of these firms [IBM, HPE, IonQ, Rigetti] figures out how to scale high-quality qubits more easily, we could see machines that double or triple in qubit number and quality every year to 18 months,” Hopkins said. “That means we could go from nothing to ‘oh no’ in a few months.” 

The risk today: Harvest now, decrypt later 

Although it’s unclear when quantum computers will have the ability to decrypt public key algorithms, many commentators are concerned that threat actors and nation-states are in the process of stockpiling data that’s encrypted today, which they will then decrypt when quantum computing advances.

“One of the biggest risks at present is what’s known as a HNDL attack This is an acronym for “harvest now, decrypt later,” where encrypted data is captured, stored and held onto until a quantum computer is able to unlock it,” said Vikram Sharma, founder and CEO, QuintessenceLabs. 

See also  Don't leave open source open to vulnerabilities

“While this intercepted data is encrypted, this is a false sense of security; it will easily be decrypted by a threat actor with access to a quantum computer,” Sharma said. Above all, new investments in quantum tech and geopolitical motivations mean “the quantum risk threat has shifted from no longer if, to when.” 

How do CISOs and security leaders need to react? 

One of the challenges around reacting to post-quantum threats is the lack of certainty around the future threat landscape, and what technologies are required to defend against them. Together, these factors make it difficult to justify investment in preventative and defensive post-quantum technologies. 

Fortunately, post-quantum cryptography (PQC) solutions, essentially encryption services that can’t be decrypted by quantum computers, offer a strong answer to these next-generation threats. 

The key to being prepared for the evolving threat landscape is to act quickly. As Sharma said, “By the time companies start ‘feeling’ risk from a quantum computer, it will be much too late, because data that was stolen years ago will have been decrypted.” 

A simple first step is for organizations to start identifying data assets that could be vulnerable to the decryption of public-key algorithms. Conducting a quantum risk assessment can help them identify the impact a post-quantum incident could have on the organization as a whole. 

With this information, security leaders can start to build a business case to justify spending on quantum resilience, identifying the potential financial impact of such an event, and put forward a proposed timeline to adopt any defensive solutions like PQC, quantum key distribution (QKD) or quantum random number generation (QRNG). 

What defensive solutions are available? Quantum cryptography 

Just a month ago, NIST finally announced the first four post-quantum algorithms it would be choosing as its new post-quantum cryptographic standard. 

See also  Comm100 Chat Service Hacked In A Supply-Chain Attack

“This means those organizations facing advanced persistent threats (from nation-states, in particular) now have guidance on how to select quantum-resistant encryption for their highest-secrecy data moving forward,” said Kayne McGladrey, IEEE senior member. 

As part of the announcement, NIST selected some core algorithms for enterprise use cases. These include the CRYSTALS-Kyber algorithm for general encryption, and CRYSTALS-Dilithium, FALCON and SPHINCS+ for digital signatures (although it recommended Dilithium as the primary digital signature algorithm). 

Vadim Lyubashevsky, a Cryptography Research Scientist at IBM who worked on Cyber and Dilithium, explains that the CRYSTALS-Kyber algorithm is extremely fast, with short public-key and ciphertext sizes, while Dilithium is advantageous over FALCON because it’s easier to implement and less error-prone. 

Though these solutions are effective, Lyubashevsky warns that organizations should expect to mix adoption of quantum encryption alongside traditional public-key algorithms.  

“Realistically, what organizations should expect to implement are hybrid strategies that blend both quantum-safe protocols with existing cryptographic standards to ensure data is secure and protected against threats that exist now and that will arise in the near future,” Lyubashevsky said. 

“As the era of quantum computing may arrive very soon, it is worth starting early on the journey to move from ‘safe’ to ‘quantum safe.’ The first step to get there is education: Understand quantum-safe cryptography and what its implications are for your organization. Partner with cryptographic experts to future-proof data encryption and make decisions that will protect your systems well into the future,” Lyubashevsky said.

Source link

cryptography Quantum risk Safe Truth
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email

Related Posts

Meet the Humans Trying to Keep Us Safe From AI

June 27, 2023

How To Create A Psychologically Safe Workplace – And Why You Need To

June 11, 2023

Runaway AI Is an Extinction Risk, Experts Warn

May 30, 2023

No One on Twitter Is Safe From Elon Musk

December 17, 2022
Add A Comment

Comments are closed.

Editors Picks

India’s Exponent Energy may have found the secret to 15 min rapid EV charging – DailyTech

August 17, 2022

Recent job listing suggests Netflix is diving into cloud gaming

August 21, 2022

Users warned over Azure Active Directory authentication flaw

September 14, 2022

Genshin Impact dev miHoYo invested in an experimental fusion reactor

March 1, 2022

Subscribe to Updates

Get the latest news and Updates from Behind The Scene about Tech, Startup and more.

Top Post

Elementor #32036

The Redmi Note 13 is a bigger downgrade compared to the 5G model than you might think

Xiaomi Redmi Watch 4 is a budget smartwatch with a premium look and feel

Behind The Screen
Facebook Twitter Instagram Pinterest Vimeo YouTube
  • Contact
  • Privacy Policy
  • Terms & Conditions
© 2025 behindthescreen.uk - All rights reserved.

Type above and press Enter to search. Press Esc to cancel.