Quantum Computing Poses Risks to Data and Cybersecurity | TDWI (2024)

Quantum Computing Poses Risks to Data and Cybersecurity | TDWI (1)

Quantum Computing Poses Risks to Data and Cybersecurity

As quantum computing matures, developers race to meet the cybersecurity challenges it brings.

  • By Kayla Williams
  • March 16, 2023

Quantum computing is a new hardware technology that has the potential to change the way the world processes large and complex problems. It is a pioneering new computer science technology based on the principles of quantum theory – using materials on an atomic or subatomic level. This gives quantum computing the potential to solve problems that have historically been deemed too complex for traditional computing methods because it can grow exponentially and essentially calculate all possible configurations at the same time.

For Further Reading:

Quantum Computing: Available Yet Distant

How Global Turmoil and Inflation Will Impact Cybersecurity and Data Management in 2023

The Most Important Cybersecurity Step to Implement This Year

Public companies including Google, IBM, and Amazon are investing heavily in quantum technologies, while governments have poured billions into research and development programs in efforts to be the first to harness it. As quantum computing garners more attention and promises to drive transformational changes with breakthrough applications, it also opens the door to new and dangerous threats.

Quantum computing is forecasted to revolutionize industries ranging from aerospace and pharmaceuticals to finance and manufacturing. For example, harnessing the power of quantum computers could allow scientists and researchers to design life-saving drugs faster, and the automotive industry to create longer-lasting batteries for electric vehicles and promote a greener economy.

Similar to the space race, governments also have a stake in the quantum computing game. In 2018, the White House Office of Science and Technology Policy and the Department of Energy invested more than $1 billion into quantum computing research and created the National Quantum Initiative Advisory Committee to provide counsel on quantum computing. In 2020, the Chinese government allocated $10 billion to construct the National Laboratory for Quantum Information Sciences.

However, with any new technological advancement comes inherent risk. Quantum computers can break many of the encryption algorithms currently used to protect sensitive data, posing a grave threat to all data users.

Quantum Computing as a Cybersecurity Risk

Modern encryption relies on the difficulty of calculating solutions to mathematical problems to keep data secure. Thanks to the exponentially greater processing power of a quantum computer, it could be capable of calculating all possible solutions to those problems simultaneously, essentially breaking an encryption cipher and making the encryption null and void.

The post-quantum computing era will require companies to find new forms of encryption, as current methods may not be secure against quantum-based attacks. Although much of the research into quantum computing is currently taking place in academia, private and government organizations are increasingly focusing on the potential cybersecurity risks it poses. The National Quantum Blueprint, announced at this year's World Economic Forum, aims to guide nations looking to invest in quantum technology development while assessing its cybersecurity dangers. As the view of quantum computing shifts from an exciting innovation to a potential cybersecurity threat, it is becoming an increasingly pressing concern.

Addressing Quantum Computing Challenges

As an example of the work being done to address the challenges posed by quantum computing, Microsoft is developing a post-quantum version of the Transport Layer Security (TLS) protocol. TLS is a commonly used security protocol that protects data transmitted over the internet. However, Microsoft has noted that some of the asymmetric algorithms used in the TLS exchange can be vulnerable to particular algorithms when executed on a quantum computer. In July 2022, the National Institute of Standards and Technology (NIST) of the U.S. Department of Commerce released the first four quantum-resistant cryptographic algorithms resulting from a six-year competition. These algorithms will be included in NIST's post-quantum cryptographic standard, which is expected to be released in 2024.

Further research into cryptography protection is being conducted by IBM. In doing their research and thanks to their quantum computing network, Big Blue has developed a proprietary system called Quantum Safe, which works directly with companies to identify their specific risks, assess their maturity, and determine what steps must be taken to ensure mature security controls, including cryptographic standards adoption. As recently as November 2022, IBM and Vodafone announced a partnership to help prepare the telecommunications giant for the next wave of quantum computing challenges that will arise, aiming to protect their assets and data with Quantum Safe across a variety of telecommunications use cases.

Although the adoption of new cryptographic algorithms may require changes to current business practices, the potential benefits of quantum computing far outweigh the risks. However, it is crucial to manage these risks effectively to shape the future. When used responsibly, quantum computing has the potential to make a significant positive impact.

About the Author

Kayla Williams is the CISO at Devo. In her career, Williams has worked in many facets of information and process assurance. Prior to joining Devo, she worked as the director of GRC for LogMeIn, a global SaaS company, where she developed and implemented the information security policy framework, as well as security, compliance, and technical privacy risk framework, streamlined the company’s compliance function and instituted a security and technical privacy governance steering committee. You can reach the author on LinkedIn.


Quantum Computing Poses Risks to Data and Cybersecurity | TDWI (2024)

FAQs

Quantum Computing Poses Risks to Data and Cybersecurity | TDWI? ›

Quantum computers can break many of the encryption algorithms currently used to protect sensitive data, posing a grave threat to all data users. Modern encryption relies on the difficulty of calculating solutions to mathematical problems to keep data secure.

What are the risks of quantum computing cybersecurity? ›

Quantum computers will be able to break common encryption methods at an alarming speed. Encryption tools currently used to protect everything from banking and retail transactions to business data, documents and digital signatures can be rendered ineffective – fast.

What is the role of quantum computing in cyber security? ›

Quantum computers can break encryption methods at an alarming speed, rendering ineffective encryption tools that are widely used today to protect everything from banking and retail transactions to business data, documents, email and more.

What is the threat quantum computing poses to current cryptography? ›

Quantum computing poses a significant threat to current encryption methods because it can perform calculations that are infeasible for classical computers. This threat arises from quantum algorithms that can efficiently solve problems fundamental to cryptographic security. The foundation of encryption is mathematics.

What is the biggest problem with quantum computing? ›

Cost and Accessibility. Currently, quantum computers are expensive and require very specialized environments to operate. Therefore, one of the big challenges for this technology is to make it accessible for widespread use.

Will quantum computers break security? ›

Researchers typically estimate that it will be many years until quantum computers can crack cryptographic keys—the strings of characters used in an encryption algorithm to protect data—faster than ordinary computers.

What is the main purpose of quantum computing? ›

Quantum computing can improve research and development, supply-chain optimization, and production. For example, you could apply quantum computing to decrease manufacturing process–related costs and shorten cycle times by optimizing elements such as path planning in complex processes.

What is the impact of quantum computing on security in emerging technologies? ›

As quantum computers threaten classical encryption methods, developing quantum-resistant algorithms becomes important. Quantum computing can contribute to creating and implementing cryptographic techniques resilient to quantum attacks, ensuring the long-term security of digital communications.

Why is quantum computing more secure? ›

Similarly, quantum technology will enable true random number generation. Random number generators (RNGs) are used in security protocols to create encryption and decryption keys and things like one-time passwords.

What are the concerns of quantum security? ›

Quantum will disrupt existing cryptographic systems. Sensitive data with a lifespan of 10–15 years may already be at risk.

What is quantum cryptography in cyber security? ›

Quantum cryptography uses the same physics principles and similar technology to communicate over a dedicated communications link. Published theories suggest that physics allows QKD or QC to detect the presence of an eavesdropper, a feature not provided in standard cryptography.

How to protect against quantum computing? ›

Post-quantum cryptography (PQC) is a form of cryptography that is designed to be resistant to quantum computing. It uses mathematical algorithms that are believed to be secure against attacks from quantum computers, even when they become powerful enough to break traditional encryption algorithms.

What is the most major impact of quantum computing on cybersecurity? ›

Modern encryption, such as RSA and ECC, relies on the computational difficulty of problems like integer factorization and discrete logarithms. Quantum computers, with their advanced processing power, could solve these problems much faster than today's computers, rendering existing encryption methods obsolete.

What is the danger of quantum computing? ›

Quantum computing also leaves organizations vulnerable to the “collect now, break later” mentality, France says, in which attackers could steal data that is encrypted now, wait five or so years for quantum computers to scale up and become more widely available, then use them to decrypt the data.

Which two major challenges do quantum computers face? ›

As we briefly introduced in our previous article, there are still some hurdles on the path to quantum computers since they are much more vulnerable to errors than classical computers. In this article we are going to dive deep into some of the main challenges: quantum decoherence, error correction and scalability.

What are the risks of AI in cybersecurity? ›

Data Manipulation and Data Poisoning. Data manipulation and poisoning attacks target the labeled data used to train AI models. The attackers will introduce additional, mislabeled instances into this collection of data. The goal of these attacks is to train the AI's model incorrectly.

What is the drawback of quantum cryptography? ›

Limitations of Quantum Cryptography

Can only be used in short distances. Very expensive to implement on a scale. The technology is practically still not here yet. Photon polarization might be impacted in the traveling medium.

Top Articles
Butcher: The Art and Science of Meat Handling - Butchers Fridge
26 U.S. Code § 9816 - Preventing surprise medical bills
English Bulldog Puppies For Sale Under 1000 In Florida
Katie Pavlich Bikini Photos
Gamevault Agent
Pieology Nutrition Calculator Mobile
Hocus Pocus Showtimes Near Harkins Theatres Yuma Palms 14
Hendersonville (Tennessee) – Travel guide at Wikivoyage
Compare the Samsung Galaxy S24 - 256GB - Cobalt Violet vs Apple iPhone 16 Pro - 128GB - Desert Titanium | AT&T
Vardis Olive Garden (Georgioupolis, Kreta) ✈️ inkl. Flug buchen
Craigslist Dog Kennels For Sale
Things To Do In Atlanta Tomorrow Night
Non Sequitur
Crossword Nexus Solver
How To Cut Eelgrass Grounded
Pac Man Deviantart
Alexander Funeral Home Gallatin Obituaries
Energy Healing Conference Utah
Geometry Review Quiz 5 Answer Key
Hobby Stores Near Me Now
Icivics The Electoral Process Answer Key
Allybearloves
Bible Gateway passage: Revelation 3 - New Living Translation
Yisd Home Access Center
Home
Shadbase Get Out Of Jail
Gina Wilson Angle Addition Postulate
Celina Powell Lil Meech Video: A Controversial Encounter Shakes Social Media - Video Reddit Trend
Walmart Pharmacy Near Me Open
Marquette Gas Prices
A Christmas Horse - Alison Senxation
Ou Football Brainiacs
Access a Shared Resource | Computing for Arts + Sciences
Vera Bradley Factory Outlet Sunbury Products
Pixel Combat Unblocked
Movies - EPIC Theatres
Cvs Sport Physicals
Mercedes W204 Belt Diagram
Mia Malkova Bio, Net Worth, Age & More - Magzica
'Conan Exiles' 3.0 Guide: How To Unlock Spells And Sorcery
Teenbeautyfitness
Where Can I Cash A Huntington National Bank Check
Topos De Bolos Engraçados
Sand Castle Parents Guide
Gregory (Five Nights at Freddy's)
Grand Valley State University Library Hours
Holzer Athena Portal
Hello – Cornerstone Chapel
Stoughton Commuter Rail Schedule
Nfsd Web Portal
Selly Medaline
Latest Posts
Article information

Author: Jamar Nader

Last Updated:

Views: 5381

Rating: 4.4 / 5 (75 voted)

Reviews: 90% of readers found this page helpful

Author information

Name: Jamar Nader

Birthday: 1995-02-28

Address: Apt. 536 6162 Reichel Greens, Port Zackaryside, CT 22682-9804

Phone: +9958384818317

Job: IT Representative

Hobby: Scrapbooking, Hiking, Hunting, Kite flying, Blacksmithing, Video gaming, Foraging

Introduction: My name is Jamar Nader, I am a fine, shiny, colorful, bright, nice, perfect, curious person who loves writing and wants to share my knowledge and understanding with you.