Quantum computing will enable a safer, more secure world

Today's media narrative around quantum computing's role in cybersecurity is overwhelmingly negative, because quantum computers will render today's encryption standards redundant, leaving much of our data at risk of being decoded.
First, it's important to understand how quantum computing will impact encryption.
In 1994, American mathematician Peter Shor developed a quantum algorithm that essentially could break RSA encryption phenomenally faster.
The current quantum computers aren't powerful enough to run Shor's algorithm, but the technology is developing at speed.
There has already been extensive work by researchers to develop quantum-safe encryption standards - some of which will be based on quantum technology.
It's important to take a step back and realize that while quantum technology may undermine RSA-based security, quantum will also play a big role in creating new security standards that will improve how we communicate, make transactions, and go about our daily lives.
These protocols will allow people to communicate more securely, as it will be much harder for bad actors to collect or intercept data using these quantum communication protocols.
Quantum key distribution will allow two communicating users to tell whether a third party has tried to eavesdrop or tamper with a transmission.
This system of key distribution relies on a fundamental aspect of quantum mechanics: that trying to measure a quantum system will disturb that system.
Quantum technology will enable true random number generation.
The greatest potential for quantum computing security applications is within artificial intelligence and machine learning.
The speed advantage offered by quantum computing means that a quantum computer can take all that data, create connections, and feed those connections to an ML model, which a classical computer will still be able to run and operate.
Quantum computing will allow you to create those models much more quickly and be more confident in the resulting algorithm.
There is a possibility for AI/ML models to run entirely on the quantum computer, enhancing classification and regression capabilities.
Thinking beyond cybersecurity, using quantum computing to improve AI/ML models has applications in many industries.
High-frequency trading algorithms used by financial institutions have been connected to flash crashes in the stock market when these automated trading bots make errors; improving these algorithms through quantum data processing should limit these errors, adding stability to financial markets, as well as helping financial institutions generate more profit.
As mentioned, quantum encryption is a key development, enabling governments to better protect communications and state secrets, but there's also an exciting area of research called quantum metrology: the use of quantum computing in radar technology.
Ultimately, these are just a few ways that quantum computing provides opportunities for creating a safer, more secure world.
By using quantum machines to process more information, at a faster pace, organizations will have the ability to create vastly more sophisticated AI. They can rely less heavily on heuristics or intelligent guesses and instead make more informed choices.
While sufficiently powerful quantum computers are still some years away, there are exciting opportunities ahead..


This Cyber News was published on www.cybersecurity-insiders.com. Publication date: Tue, 02 Jan 2024 20:13:04 +0000


Cyber News related to Quantum computing will enable a safer, more secure world

Quantum computing: The data security conundrum - One of the biggest challenges of digital technology today is around security systems and data. While this has proven successful, advancements in quantum computing - which utilises quantum mechanics to solve complex problems faster than conventional ...
9 months ago Itsecurityguru.org
Quantum computing will enable a safer, more secure world - Today's media narrative around quantum computing's role in cybersecurity is overwhelmingly negative, because quantum computers will render today's encryption standards redundant, leaving much of our data at risk of being decoded. First, it's ...
10 months ago Cybersecurity-insiders.com
IBM Heron Quantum Chip, Quantum System Two - Next generation quantum processor dubbed 'Heron', and the modular IBM Quantum System Two unveiled by Big Blue. IBM has unveiled two new quantum developments, with a new series of utility-scale processors housed within a modular quantum system. At its ...
11 months ago Silicon.co.uk
Customer compliance and security during the post-quantum cryptographic migration | AWS Security Blog - For example, using the s2n-tls client built with AWS-LC (which supports the quantum-resistant KEMs), you could try connecting to a Secrets Manager endpoint by using a post-quantum TLS policy (for example, PQ-TLS-1-2-2023-12-15) and observe the PQ ...
1 month ago Aws.amazon.com
Getting your organisation post-quantum ready - While quantum computing is still very much in its early stages, it's important that companies are already thinking about this evolving technology - and more importantly implementing and stress testing much needed solutions suitable for a post-quantum ...
11 months ago Cybersecurity-insiders.com
It's time to bolster defenses for an AI / Quantum Future - The rapid advances we are seeing in emerging technologies like AI, ML and quantum computing will have a devastating impact on organizations not prepared and who have not considered updating existing modes of asymmetric data encryption. Quantum is ...
9 months ago Cybersecurity-insiders.com
DORA and your quantum-safe cryptography migration - Quantum computing is a new paradigm with the potential to tackle problems that classical computers cannot solve today. New requirements for financial entities in the EU. DORA lays out a set of requirements across ICT risk management, incident ...
9 months ago Securityintelligence.com
Breakthrough promises secure quantum computing at home - The full power of next-generation quantum computing could soon be harnessed by millions of individuals and companies, thanks to a breakthrough by scientists at Oxford University Physics guaranteeing security and privacy. This advance promises to ...
7 months ago Sciencedaily.com
Post-Quantum Cryptography Alliance Launches to Advance Post-Quantum Cryptography - PRESS RELEASE. SAN FRANCISCO, Feb. 6, 2024 /PRNewswire/ - The Linux Foundation is excited to announce the launch of the Post-Quantum Cryptography Alliance, an open and collaborative initiative to drive the advancement and adoption of post-quantum ...
9 months ago Darkreading.com
Edge Computing: Data and Connectivity - Edge computing is a distributed computing model that brings processing capabilities closer to the data source, be it IoT devices, sensors, or end-user devices, rather than relying on centralized data centers. By decentralizing data processing, edge ...
11 months ago Feeds.dzone.com
Safeguard Your Network in a Post-Quantum World - There is an imminent threat to existing cryptography with the advent of quantum computers. A quantum computer works with qubits, which can exist in multiple states simultaneously, based on the quantum mechanical principle of superposition. Thus, a ...
9 months ago Feedpress.me
What You Need to Know to Embrace the Imminent Quantum Shift for Your Cryptography Future - Cryptography has long been essential in ensuring the protection of data and communication networks. Remaining reliant on outdated cryptographic standards certainly adds to the dangers of compromise. As we usher in an era of cloud-scaling and quantum ...
8 months ago Cyberdefensemagazine.com
Accenture and SandboxAQ Collaborate to Help Organizations Protect Data - PRESS RELEASE. NEW YORK; Jan. 16, 2024 - Accenture and SandboxAQ are partnering to deliver artificial intelligence and quantum computing solutions to help organizations identify and remediate cybersecurity vulnerabilities. According to recent ...
10 months ago Darkreading.com
Tech Giants Form Post-Quantum Cryptography Alliance - The Linux Foundation today announced the launch of the Post-Quantum Cryptography Alliance, an initiative to advance and drive the adoption of post-quantum cryptography. Founded by AWS, Cisco, IBM, IntellectEU, Nvidia, QuSecure, SandboxAQ, and the ...
9 months ago Securityweek.com
Edge Computing: Enhancing Data Processing - Edge computing revolutionizes data processing by bringing computational power closer to where data is generated, enhancing efficiency and responsiveness. Discover how edge computing is reshaping technology and our interactions with it, unlocking a ...
8 months ago Securityzap.com
Preparing for Q-Day as NIST nears approval of PQC standards - Q-Day-the day when a cryptographically relevant quantum computer can break most forms of modern encryption-is fast approaching, leaving the complex systems our societies rely on vulnerable to a new wave of cyberattacks. While estimates just a few ...
4 months ago Helpnetsecurity.com
Preparing for Q-Day as NIST nears approval of PQC standards - Q-Day-the day when a cryptographically relevant quantum computer can break most forms of modern encryption-is fast approaching, leaving the complex systems our societies rely on vulnerable to a new wave of cyberattacks. While estimates just a few ...
4 months ago Helpnetsecurity.com
How Communications Companies Can Prepare for Q-Day - After a grueling eight years of testing, the National Institute of Standards and Technology (NIST) has finalized the first three algorithms that will form the backbone of the world's strategy to counter the potential threats of quantum ...
1 month ago Darkreading.com
China plans to take 'hack-proof' quantum satellite technology to new heights - China is planning new, cutting-edge quantum communications satellites. China launched the first dedicated quantum communications satellite, named Micius, in 2016, and has been quietly working on followup missions in the years since. "Low Earth orbit ...
11 months ago Space.com
Why We Need to Cultivate a Confidential Computing Ecosystem - Researchers have been working on solutions for runtime security for years now. Computing data and deriving value from it - while also preserving its privacy - is no small challenge. The industry is tackling runtime security on all fronts - we've seen ...
9 months ago Securityboulevard.com
Fortifying confidential computing in Microsoft Azure - I wrote about how Microsoft used Intel's secure extensions to its processor instruction sets to provide a foundation for confidential computing in Azure a few years ago. In the years since, the confidential computing market has taken a few steps ...
11 months ago Infoworld.com
Adapting cybersecurity for the quantum computing era - Researchers are exploring promising quantum computing applications across various domains, from cryptography and optimization problems to drug discovery and artificial intelligence. The race to harness the power of quantum bits has sparked a wave of ...
11 months ago Helpnetsecurity.com
The Impacts of Quantum Computing on Cryptocurrency in 2023 - The development of quantum computers has caused a lot of concern in the security world, as they are believed to be able to crack current public key encryption (PKI) in a relatively short amount of time. This is known as the cryptopocalypse, and it is ...
1 year ago Securityweek.com
The Latest in Cybersecurity: QuSecure's Quantum Computing Based Security for Endpoints - The world of cybersecurity is an ever-changing one, and with it comes new opportunities for attackers searching for vulnerabilities to exploit. In response, QuSecure has launched an endpoint security solution based on quantum computing to help ...
1 year ago Csoonline.com
Creating a New Market for Post-Quantum Cryptography - A day in the busy life of any systems integrator includes many actions that revolve around the lifeblood of its business - its customers. Systems integrators help solve evolving customer business challenges, which in turn adds partner value. It's a ...
11 months ago Securityboulevard.com

Latest Cyber News


Cyber Trends (last 7 days)


Trending Cyber News (last 7 days)