Facing the quantum hackers of tomorrow today

Facing the quantum hackers of tomorrow today

Quantum computing could create “a value of $450 billion to $850 billion over the next 15 to 30 years,” according to estimates in a 2021 report from Boston Consulting Group. Governments and private companies around the world are recognizing this potential and are developing their own quantum strategies and research initiatives.

Brace yourself for the power of quantum

However, as quantum technology advances, there is a dark cloud on the horizon. Hackers could one day use this processing power to crack public key cryptography systems, which are the basis for today’s secure interactions over the Internet, as well as other systems such as public key infrastructure, code signing systems, secure email and keys. management systems. Experts warn that this is a major threat to modern digital security that must be addressed now. “It will completely break these crypto systems,” said Dustin Moody, a mathematician at the US-based National Institute of Standards and Technology (NIST).

While a full-scale quantum computer is not yet a reality, the danger is immense. Duncan Jones, chief of cybersecurity at Quantinuum, a Cambridge and Colorado-based quantum computing company, says he is concerned about a particular issue. “If I send you some encrypted data today and someone records it, they can break in there later,” Duncan says. “They don’t need a quantum computer these days to break into it. They can just sit patiently on that data and they can then decrypt in the future.”

Post-quantum cryptography is emerging as an efficient and effective solution to defend against such quantum attacks. This solution is a set of new cryptographic algorithms, especially public key algorithms, that can be implemented using today’s classic computers.

There is a growing urgency for enterprises of all sizes and across industries, as well as public institutions and other organizations, to make their systems crypto-flexible and incorporate such quantum-resistant algorithms into their security frameworks. Companies and organizations cannot afford to wait and see how the quantum computing landscape evolves. “The cost will increase if it is adopted after quantum computers are established,” said Jung Hee Cheon, a professor of mathematics at Seoul National University in South Korea. Given the high stakes, a proactive, rather than reactive, attitude to such threats is critical.

Download the full report

This content is produced by Insights, the custom content arm of MIT Technology Review. It was not written by the editors of MIT Technology Review.

Leave a Comment

Your email address will not be published.