{"id":598667,"date":"2023-01-18T06:50:02","date_gmt":"2023-01-18T12:50:02","guid":{"rendered":"https:\/\/news.sellorbuyhomefast.com\/index.php\/2023\/01\/18\/ibm-quantum-computing-poses-an-existential-threat-to-data-encryption\/"},"modified":"2023-01-18T06:50:02","modified_gmt":"2023-01-18T12:50:02","slug":"ibm-quantum-computing-poses-an-existential-threat-to-data-encryption","status":"publish","type":"post","link":"https:\/\/newsycanuse.com\/index.php\/2023\/01\/18\/ibm-quantum-computing-poses-an-existential-threat-to-data-encryption\/","title":{"rendered":"IBM: Quantum computing poses an \u2018existential threat\u2019 to data encryption\u00a0"},"content":{"rendered":"<div>\n<section>\n<p><time title=\"2023-01-17T22:43:08+00:00\" datetime=\"2023-01-17T22:43:08+00:00\">January 17, 2023 2:43 PM<\/time>\n\t\t\t<\/p>\n<\/section>\n<div>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"750\" height=\"388\" src=\"https:\/\/venturebeat.com\/wp-content\/uploads\/2021\/09\/quantum-physics-4550602_1920-e1669395552971.jpg?fit=750%2C388&#038;strip=all\" alt=\"Graphic of a side view of a head with gold netting and lines all over, represents quantum physics, AI, or particles\"><\/p>\n<\/p><\/div>\n<\/p><\/div>\n<div id=\"primary\" role=\"main\">\n<article id=\"post-2851699\">\n<div>\n<div id=\"boilerplate_2682874\">\n<p><em>Check out all the on-demand sessions from the Intelligent Security Summit <a href=\"https:\/\/avolio.swapcard.com\/intelligentsecuritysummit2022\/registrations\/Start?utm_source=vb&#038;utm_medium=boiler&#038;utm_content=ondemand&#038;utm_campaign=IS22_BoilerPlates\" data-type=\"URL\" data-id=\"https:\/\/avolio.swapcard.com\/intelligentsecuritysummit2022\/registrations\/Start?utm_source=vb&#038;utm_medium=boiler&#038;utm_content=ondemand&#038;utm_campaign=IS22_BoilerPlates\">here<\/a><\/em>.<\/p>\n<hr>\n<\/div>\n<p>For years, encryption has played a core role in securing enterprise data. However, as <a href=\"https:\/\/venturebeat.com\/ai\/quantum-computing-faces-the-ghosts-of-its-past-present-and-future\/\">quantum computers<\/a> become more advanced, traditional encryption solutions and public-key cryptography (PKC) standards, which enterprise and consumer vendors rely on to secure their products, are at serious risk of decryption.\u00a0<\/p>\n<p>Today, <a href=\"https:\/\/www.ibm.com\/thought-leadership\/institute-business-value\/en-us\" target=\"_blank\" rel=\"noreferrer noopener\">IBM Institute for Business Value<\/a> issued a new <a href=\"https:\/\/www.ibm.com\/thought-leadership\/institute-business-value\/en-us\/report\/quantum-safe-encryption\" target=\"_blank\" rel=\"noreferrer noopener\">report<\/a> titled Security in the Quantum Era, examining the reality of <a href=\"https:\/\/venturebeat.com\/security\/quantum-risk-cryptography\/\">quantum risk<\/a> and the need for enterprise adoption of quantum-safe capabilities to safeguard the integrity of critical applications and infrastructure as the risk of decryption increases.\u00a0<\/p>\n<p>The report argues that quantum computing poses an \u201cexistential risk\u201d to classical computer encryption protocols, and notes that cybercriminals are potentially already exfiltrating encrypted data with the intention of decrypting it once quantum computers advance as part of \u201charvest now, decrypt layer attacks.\u201d<\/p>\n<h2 id=\"h-the-problem-with-traditional-encryption-and-quantum-computing\">The problem with traditional encryption\u00a0and quantum computing<\/h2>\n<p>One of the central limitations of traditional cryptographic protocols like RSA is that they\u2019re reliant on mathematical problems like the factorization of large numbers, which are simple enough for a quantum computer to solve with brute force.\u00a0<\/p>\n<p><html><body><\/p>\n<div id=\"boilerplate_2803147\">\n<h3>Event<\/h3>\n<div>\n<p><span>Intelligent Security Summit On-Demand<\/span><\/p>\n<p><span>Learn the critical role of AI &#038; ML in cybersecurity and industry specific case studies. Watch on-demand sessions today.<\/span><\/p>\n<\/div>\n<p><a href=\"https:\/\/avolio.swapcard.com\/intelligentsecuritysummit2022\/registrations\/Start?utm_source=vb&#038;utm_medium=incontent&#038;utm_content=ondemand&#038;utm_campaign=IS22_InContent\"><br \/>\n                Watch Here            <\/a>\n                        <\/p>\n<\/div>\n<p><\/body><\/p>\n<p>With a quantum computer, cryptographic protocols \u201ccan in theory be solved \u2014 and solved within a few hours \u2014 with the help of Shor\u2019s algorithm,\u201d the report said. \u201cThis makes protocols like RSA an insufficient cryptographic scheme in a future where quantum computers have reached their full potential.\u201d<\/p>\n<p>While this process hasn\u2019t taken place just yet, more and more organizations are taking the risk of this decryption seriously. In December 2022, President Biden signed the <a href=\"https:\/\/www.infosecurity-magazine.com\/news\/biden-quantum-cybersecurity-law\/\" target=\"_blank\" rel=\"noreferrer noopener\">Quantum Computing Cybersecurity Preparedness Act<\/a> encouraging government agencies to adopt technology that\u2019s resistant to post-quantum decryption.\u00a0<\/p>\n<p>Likewise, last year <a href=\"https:\/\/www.nist.gov\/news-events\/news\/2022\/07\/nist-announces-first-four-quantum-resistant-cryptographic-algorithms\" target=\"_blank\" rel=\"noreferrer noopener\">NIST<\/a> concluded its search to identify quantum-resistant algorithms that had been ongoing since 2016, choosing four algorithms as finalists, and selecting <a href=\"https:\/\/pq-crystals.org\/kyber\/\" target=\"_blank\" rel=\"noreferrer noopener\">CRYSTALS-Kyber<\/a>, a public-key encryption algorithm and <a href=\"https:\/\/pq-crystals.org\/dilithium\/\" target=\"_blank\" rel=\"noreferrer noopener\">CRYSTALS-Dilithium<\/a> a digital signature algorithm, as its top two chosen standards.\u00a0<\/p>\n<h2 id=\"h-ibm-s-lattice-based-approach-to-quantum-encryption\">IBM\u2019s lattice-based approach to quantum encryption\u00a0<\/h2>\n<p>With the global quantum cryptography <a href=\"https:\/\/www.marketsandmarkets.com\/Market-Reports\/quantum-cryptography-market-45857130.html\" target=\"_blank\" rel=\"noreferrer noopener\">market<\/a> expected to grow from $89 million in 2020 to $214 million by 2025, IBM has been active in establishing itself as a leader within the space alongside other providers like <a href=\"https:\/\/www.intel.com\/content\/www\/us\/en\/research\/news\/post-quantum-cryptography.html\" target=\"_blank\" rel=\"noreferrer noopener\">Intel<\/a>, which has helped contribute to NIST\u2019s <a href=\"https:\/\/venturebeat.com\/security\/cloudflare-post-quantum-cryptography\/\">post-quantum cryptography<\/a> standards.\u00a0<\/p>\n<p>Just last year, IBM launched <a href=\"https:\/\/newsroom.ibm.com\/2022-04-05-Announcing-IBM-z16-Real-time-AI-for-Transaction-Processing-at-Scale-and-Industrys-First-Quantum-Safe-System\" target=\"_blank\" rel=\"noreferrer noopener\">IBM z16<\/a>, a quantum-safe, AI-driven data inference-optimization solution designed for processing mission-critical data. The company had also contributed to three of the four post-quantum algorithms chosen by NIST.\u00a0<\/p>\n<p>Part of IBM\u2019s quantum strategy is to use lattice-based cryptography, a method for constructing security primitives that\u2019s based on the geometry of numbers, which can be used to construct encryption protocols that are harder for quantum computers to crack than those that rely on factorization.\u00a0<\/p>\n<p>IBM notes that this approach first emerged in the 1990s out of two research papers, Brown University\u2019s <a href=\"https:\/\/web.securityinnovation.com\/hubfs\/files\/ntru-orig.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">NTRU: A new high speed public key cryptosystem<\/a> by Jeffrey Hoffstein, Jill Pipher and Joseph Silverman; and IBM scientist Miklos Ajtai\u2019s <a href=\"https:\/\/eccc.weizmann.ac.il\/eccc-reports\/1996\/TR96-007\/index.html\" target=\"_blank\" rel=\"noreferrer noopener\">Generating Hard Instances of Lattice Problems<\/a>.\u00a0<\/p>\n<p><strong>VentureBeat&#8217;s mission<\/strong> is to be a digital town square for technical decision-makers to gain knowledge about transformative enterprise technology and transact. <a href=\"https:\/\/info.venturebeat.com\/website-preference-center.html?utm_source=VBsite&#038;utm_medium=bottomBoilerplate\" data-type=\"URL\" data-id=\"https:\/\/info.venturebeat.com\/website-preference-center.html\">Discover our Briefings.<\/a><\/p>\n<p>\t\t\t\t<\/html><\/div>\n<\/p><\/div>\n<p><a href=\"https:\/\/venturebeat.com\/security\/ibm-quantum-computing\/\" class=\"button purchase\" rel=\"nofollow noopener\" target=\"_blank\">Read More<\/a><br \/>\n Tim Keary<\/p>\n","protected":false},"excerpt":{"rendered":"<p>January 17, 2023 2:43 PM Check out all the on-demand sessions from the Intelligent Security Summit here. For years, encryption has played a core role in securing enterprise data. However, as quantum computers become more advanced, traditional encryption solutions and public-key cryptography (PKC) standards, which enterprise and consumer vendors rely on to secure their products<\/p>\n","protected":false},"author":1,"featured_media":598668,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4442,2533,46],"tags":[],"class_list":{"0":"post-598667","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-computing","8":"category-quantum","9":"category-technology"},"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/posts\/598667","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/comments?post=598667"}],"version-history":[{"count":0,"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/posts\/598667\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/media\/598668"}],"wp:attachment":[{"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/media?parent=598667"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/categories?post=598667"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/tags?post=598667"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}