In an era where technological advancements are changing our world, one of the emerging threats is quantum computing.
This powerful technology, while promising revolutionary benefits, poses a modern risk cybersecurity construction. As we stand on the brink of this massive change, it is important to understand the potential risks and plan accordingly.
A quantum leap
Quantum computing uses the principles of quantum mechanics to perform calculations at speeds unmatched by classical computers. In 2019, Google announced that it had demonstrated a “supercomputer speed” when its Sycamore processor solved a problem in 200 seconds that would take the world’s most advanced supercomputers nearly 10,000 years old.
Even though the claims were criticized, there is no denying that quantum computing has made significant advances in computing capabilities that surpass today’s high-speed HPC systems. Recent advances show the nearness of quantum computers that can break existing systems.
Quantum risk
TNW Conference 2025 – Return to NDSM on June 19-20, 2025 – Save the date!
As we finished the amazing edition of 2024, we are happy to announce our return to Amsterdam NDSM in 2025. Register now!
Modern recording methods, which protect everything from privacy data to national security information, relying on the complexities of solving mathematical problems that old computers cannot handle well. Quantum computers, however, can quickly solve these problems, making traditional encryption obsolete. These risks are:
- Data Tampering and Misuse: All encrypted data is vulnerable to encryption and decryption by quantum computers.
- “Harvest Now, Decrypt Later” Attacks: Hackers can collect encrypted data now with the goal of extracting it once quantum computers are available.
- Disagreement of Critical Systems: Failure to migrate from quantum-safe algorithms to quantum-safe algorithms could lead to breaches of complex business and operational systems, affecting industries such as healthcare, finance, and government.
In August 2021, the US National Security Agency (NSA) he announced that “The use of mass computing can have a negative impact on National Security Systems and the country as a whole. The security methods used by quantum cryptography make it difficult to break and solve the problem, and provide security that exceeds traditional encryption methods, which is driving the growth of the market. ”
Who should be worried?
Organizations that use long-term confidential information, such as personally identifiable information (PII), personal health information (PHI), legal documents, and intellectual property, are at greater risk. In addition, organizations that provide long-life systems, such as medical devices, and suppliers to critical industries must prioritize planning for volume threats.
Setting up quantum time
The question is not if quantum computers will break current encryption, but when. Predictions vary, with some experts estimating major impacts within the next decade. For example, Deloitte thinks The biggest threats to the increase may appear within a decade, right Forrester Forecasts 50% to 70% chance within five years.
Mitigation methods
To mitigate the following threats, organizations should follow a proactive approach:
- Understanding Business Goals and Objectives: Understand how quantitative threats affect business and data.
- Discover Quantum Hazards: Find out which areas of the business are most at risk of being affected by volume.
- Define Target Size: Set goals for achieving quantum-safe solutions.
- Assess Current Potential: Assess existing security measures against future threats.
- Focus on the Priorities: Prioritize areas that need immediate attention to increase resilience.
- Develop a Quantum Security Roadmap: Create a detailed system for converting to secure cryptography algorithms.
- Show Value From Investments: Communicate the importance and benefits of information security to stakeholders.
- Raise Awareness: Educate all levels of the organization on quantitative risk and appropriate mitigation measures.
Post Quantum Cryptography (PQC) experiments
Post Quantum Cryptography (PQC) is a national security imperative for many governments. NIST has been struggling to find out about the next version of FIPS 140.3 (512 bit) PQC standards control, which was first released in August 2024. Among these, Quantum Knight is among the first FIPS 140.3 module approved.
The new NIST PQC algorithms are only raw ciphers, not encryption algorithms like CLEAR. Released on August 13, these NIST algorithms are now expected to be effective and used over the next 3-10 years in all of the above-mentioned ecosystems.
Google, Apple, IBM, and others have started to promote cryptography within their systems and services and are starting companies to discuss and learn how to use and make these new algorithms useful for their customers. This only tries to upgrade their current distributed system (eg hops/dump/pass-thrus).
Way forward
Switching to quantum secure algorithms is not a straightforward process. It includes:
- Agreement: Working with academics, industry, and governments to develop and implement scalable algorithms.
- Distribution of Resources: Smart investment in quantum security technologies and strategies.
- Education: Ensuring that stakeholders understand the risks and the appropriate measures using clear and recognizable language.
- The Complete Method: Beyond algorithms, review protocols, standards, and hardware to ensure optimal security.
Despite these advances, the real challenge lies in implementing and integrating quantum cryptographic solutions.
Many companies struggle to move from theoretical models to practical applications, creating a gap between promise and performance. This is where pioneers like Quantum Knight come in, providing powerful and reliable solutions that meet and exceed industry standards.
The end
The advent of quantum computing is a double-edged sword, offering unprecedented computational power while threatening to disrupt our cyber security systems. Organizations need to act now, understand the threat, prepare for the inevitable, and implement quantum security systems.
Although the future is still uncertain, the current situation will protect the future from the threat of inflation.
Amir Vashkover is an experienced technology leader with extensive experience in operations and leadership in the Cybersecurity industry. He currently leads Philips’ Data Security division and is a board advisor to post-quantum encryption provider Quantum Knight. Prior to this, Amir held positions in several industries, including positions such as CISO, VP of Business Development and Product management. He has a university degree in Electrical & Computer engineering, and an MBA from leading universities in Israel.
#Quantum #computing #inevitable #threat #information #security