Quantum Computing and Encryption: You will get run over if you just sit there!
A Quantum Computer image created with StarryAI generative AI

Quantum Computing and Encryption: You will get run over if you just sit there!


By D’Artagnan Fischer

Quantum computing, a revolutionary technology that leverages quantum mechanics to perform calculations far beyond the capabilities of classical computers, is rapidly advancing. Its potential to break current encryption standards poses a significant threat to data security. While widespread adoption of quantum computing may be a decade away, proactive measures are necessary to mitigate future risks. Note: quantum usually connotes technologies at the atomic level. Movies have pretty much gone overboard with their use of “quantum” terminology.

The Urgency of Preparation

While it is highly unlikely that people with malicious intent (foreign governments?) are currently stockpiling encrypted data for the reason of being able to decrypt it later when quantum computers become mainstream in the next decade, the ultimate threat is real and will eventually be upon us. Ignoring the eventual impending quantum tsunami WILL leave organizations vulnerable to data breaches and other security risks.

WHAT does this actually mean?

The world as it exists today is secured with encryption. By the very nature of computers, encryption is a cryptographic padlock that keeps our data safe from prying eyes. Now, if you think of government and the military, anything sensitive is protected by encryption. The advent of quantum computers is bringing with it an ability to quickly decrypt all of our sensitive information. If all of our sensitive information can more or less be revealed in an instant, is this not a serious issue? The prediction of how soon quantum computers will be in the mainstream is around a decade from now. So, can we wait a decade and see what happens? Absolutely not! The things that need to be done in preparation is to figure out what needs to be upgraded or replaced and in what order (what is most key in the big scheme of things). We need to get connected with Quantum news and developments purely for awareness. When new hybrid encryption methodologies are presented, we need to consider them seriously, and when the standards people develop standards (e.g., NIST), we need to study them and implement them accordingly. If you simply sit back on your laurels for a decade, the quantum train will run you over. Make no mistake.

This is kind of like knowing an asteroid is going to hit the Earth in ten years, and what exactly will you plan to do to keep the human race safe? Sit and wait for it to happen, or be proactive and find ways to stay safe. The choice is definitely up to you, but I recommend NOT waiting to see what happens.

A Checklist for Preparedness

To ensure a secure future in the face of quantum computing, organizations should proactively consider the following:

  1. Inventory and Assessment: Conduct a comprehensive inventory of critical systems and data to identify potential vulnerabilities. While assessing existing encryption methods against quantum threats might be premature, considering the threat is estimated to be a long way off, staying updated on the latest research can prove essential.
  2. Stay Informed: Continuously monitor quantum computing advancements, attend conferences, and network with experts in the field. Many of us have news feeds and such in our Web interfaces, so why not add quantum to your feed?
  3. Develop a Roadmap: Create a flexible quantum cryptography roadmap that can be updated as technology evolves. Prioritize key systems and establish a timeline, keeping in mind that practical implementation may be a decade away. The asteroid is still going to hit, so taking it seriously is prudent.
  4. Hybrid Encryption: Explore hybrid encryption strategies that combine classical and quantum encryption to provide interim security. Remember, some scientists are now devoted to avoiding a catastrophe, and there have been some awesome methodologies for an interim solution to the problem. Be aware and take a closer look if you can.
  5. Research and Development: Consider supporting quantum technology research and development, either directly or through partnerships with academic institutions or research organizations. A lot of people are engaged to keep the human race alive after that imaginary asteroid hits!
  6. Education and Awareness: Raise awareness within the organization about the potential risks and benefits of quantum technologies. Our cohorts just need to be made aware that this is serious business and not some fad like some people think Y2K turned out to be. Develop educational materials and conduct training sessions.
  7. Compliance and Standards: Stay informed about emerging standards and guidelines, such as those developed by NIST, to ensure compliance and best practices.


An imagined Quantum Encryption device

Conclusion

While the immediate threat of quantum computing may be a decade away, proactive measures are crucial to safeguard sensitive data. Quantum computers and quantum encryption is a good thing and not something to be feared because quantum represents a very significant advancement in our computational abilities.

By following the outlined checklist, organizations can position themselves to address the challenges and opportunities presented by this groundbreaking technology, and not be consumed by it.


Juan Diaz

PKI Policy Lead

6 个月

Very informative... it'll be here faster than we think. And therefore its imperative to use an industry roadmap to help prevent the unknowns. Keep in mind the 6 Ps - Prior Planning Prevents Piss Poor Performance.

要查看或添加评论,请登录

D'Artagnan "Dart" Fischer, MBA的更多文章

社区洞察

其他会员也浏览了