The
Cybersecurity in the new era of
The
The importance & the implication of the
Majority of the G-8 countries have either formulated or in the process of formulating their own quantum computing security legislations. Most of the research in this area is currently being sponsored by large governmental grants to universities & research houses. Quantum computing is one of the most rapidly evolving technologies. Hardly a week goes by where new discoveries & their commercial applications aren't announced. With this background, there is an immense sense of urgency that is being displayed to tackle the threat of quantum computers being used to decrypt & decipher sensitive data involving large corporations & nation states.
The Industry Response
There has been a concerted and ongoing effort by organisations like NIST & ISO to test & standardize post-quantum cryptography models, come up with cryptographic algorithms & standards which doesn't let quantum computers break the code easily. The cybersecurity market has already started to see Quantum Key Distribution (QKD) devices which help prevent de-encryption of secure data by quantum computers. Currently 2 schools of thought- post-quantum cryptographic algorithms using digital signatures & Quantum Key Distribution using photonic technology are rapidly evolving from a research & development standpoint.
Quantum Threat Landscape
Harvest Now, Decrypt Later (HNDL) attacks are increasing exponentially with the commercial evolution of quantum computing. Today, adversaries are aware that stealing sensitive encrypted data using classical computers can help them decrypt it user powerful quantum computers in the near future. They are playing the long game.
Quantum computing has the potential to fundamentally alter the cybersecurity landscape, both for the better and for the worse. These powerful systems backed by the laws of physics could greatly accelerate the pace of cyber innovation and can also render some of the current encryption methods useless. As
It can be a slow & painful process to develop failproof quantum safe encryption methods. It is critical to get deeper insights into the evolving global landscape and maturity of quantum cybersecurity. The threat from quantum computers to existing security architecture is real & organisations should start evaluating their current state of cybersecurity maturity in a holistic manner.
There are some fundamental activities that enterprises can start now for quantum-proofing their data, such as using large keys on symmetric cryptographic algorithms and larger output sizes on hash algorithms. Implementing cryptographic agility within protocols along with suitable cryptographic hardware implementation will be important. The entire concept of
It is crucial for all organisations to take stock of their current inventory, assess their current state and develop a practical & workable plan to sustain in a future shaped by Quantum computing.
(C) 2023 Electronic News Publishing, source