Restructure cybersecurity with the power of quantum

Restructure cybersecurity with the power of quantum

Quantum computing offers the possibility of one day solving the world's most complex and pressing puzzles. With the science and technology industry at the forefront of the global battle to defeat COVID-19, for example, it has played a role in finding viable solutions, not only in the short term, but also for future pandemics. However, quantum computing is bound to force major changes in the cyber security landscape.

About the Author Rodney Joffe, Senior Vice President, Senior Technologist, and Fellow at Neustar. While quantum computing is still in its relative early days, its rapid evolution means that it will soon surpass technologies we previously relied on, particularly high-performance cloud computing. This is why many tech giants like IBM, Google, Amazon, and Microsoft have embarked on the race to achieve what has been called "quantum supremacy": the competition to build the first working, working quantum computer. . Microsoft, for example, just announced that its quantum computing platform, Azure Quantum, is now available in limited preview. However, advances like these have led experts to debate how quantum power will affect the cybersecurity landscape. Neustar International Security Council (NISC) research recently revealed that nearly a quarter of security professionals are already experimenting with quantum computing strategies, fearing that this could outpace the development of existing security technologies. These concerns are, in fact, extremely valid and require urgent action. Going forward, laying the groundwork for rebuilding our current global cybersecurity approach, including our algorithms, strategies, and systems, should be a priority.

Infinite possibilities

In our most critical industries, quantum computing promises to solve what would have previously been described as intractable or existential problems. As far as medical development is concerned, it has the potential to simulate the reaction of drugs. This reduces risk in the commonly used trial and error method and saves computer chemists time and money. Researchers at Penn State University have already announced that they are looking into how machine learning and quantum physics can be used to discover possible treatments for COVID-19. In addition, Accenture recently published a paper with Biogen, a biotechnology innovator, which revealed that as quantum computers become more widely available, drug discovery will speed up considerably, allowing scientists to compare molecules much more. great. Drug discovery is not the only area where quantum computing will improve. Much has been said about the potential for technology to overcome climate change in the future. The World Economic Forum recently explained how, by simulating large, complex molecules, it could create new ones for carbon capture. Also, last year, Google and NASA sent the tech community into a frenzy when they jointly revealed that quantum computers had the ability to compute in three minutes what would normally take 10,000 years for supercomputers. While this feat is still years away, it is at this level of power that cybersecurity professionals need to start planning.

decryption encryption

Today, the cybersecurity industry relies on encryption to protect devices and personal data. In theory, the encryption is possible to crack. In practice, however, this is impossible and would take a colossal amount of time to do, on time scales of several billion years. Cryptography can be classified in two ways: symmetric and asymmetric cryptography. In symmetric schemes, the same key is used to encrypt and decrypt data. In asymmetric schemes, also known as a public key, there is a publicly shared key for encryption and a private key for decryption. Based on complex mathematical calculations, these are designed with one basic goal: to be so complicated that it would take conventional computers too long and use too much computing power to solve. However, the time for encryption as a viable solution is limited. Neustar research has revealed that nearly three-quarters (75%) of cybersecurity professionals expect advances in quantum technology to surpass current technologies, such as encryption, in the next five years. Its ability to crack encryption techniques, such as the private key, poses a major challenge for the cybersecurity industry. In the wrong hands, it could be used to launch a cyberattack on an unprecedented scale.

Reimagine cybersecurity

Given Quantum's ability to solve problems we specifically create to be "unsolvable" at an unparalleled rate, there is a critical need to create new quantum-resistant public key schemes. Even if a quantum computer capable of breaking encryption is about ten years away, quantum-proof encryption must be implemented before then. Quantum planning requires careful consideration of your progress. Fortunately, most organizations have quantum computing on their radar. In fact, 74% of cybersecurity professionals admitted that they paid special attention to the development of the technology. Businesses should also take note of all encrypted data and ensure it is surrounded by 24/7 intelligence and threat intelligence, as well as robust processes. It must be recognized that even if it is impossible to crack this data at present, advances in quantum computing will mean that it will be vulnerable in the future. The current global pandemic has taught us that we need science and technology more than ever to guide us through the difficult times and produce the innovations that can benefit us in the long term. The power and uncertainty of quantum should not be viewed negatively; in fact, 87% of RSSIs, CSOs, CTOs, and security managers admitted they were delighted with the potential positive impact it would have. . Quantum computing is part of the future, and the cybersecurity industry must quickly prepare for its impact if it is to reap the benefits.