{"id":629571,"date":"2023-04-15T09:49:41","date_gmt":"2023-04-15T14:49:41","guid":{"rendered":"https:\/\/news.sellorbuyhomefast.com\/index.php\/2023\/04\/15\/with-cyber-attacks-on-the-rise-businesses-should-prepare-for-quantum-hacks-now\/"},"modified":"2023-04-15T09:49:41","modified_gmt":"2023-04-15T14:49:41","slug":"with-cyber-attacks-on-the-rise-businesses-should-prepare-for-quantum-hacks-now","status":"publish","type":"post","link":"https:\/\/newsycanuse.com\/index.php\/2023\/04\/15\/with-cyber-attacks-on-the-rise-businesses-should-prepare-for-quantum-hacks-now\/","title":{"rendered":"With cyber attacks on the rise, businesses should prepare for quantum hacks now"},"content":{"rendered":"<div>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.computerweekly.com\/visuals\/German\/article\/quantum-computing-3-adobe_searchsitetablet_520X173.jpg\" data-credit=\"zapp2photo - stock.adobe.com\"  width=\"520\" height=\"173\" alt><\/p>\n<p>zapp2photo &#8211; stock.adobe.com<\/p>\n<\/p><\/div>\n<div id=\"content-header\">\n<h2>Advances in quantum computing have brought the world is on the cusp of a technological revolution, but it is not without risk. Find out why you should start to prepare for post-quantum cryotography today.<\/h2>\n<\/div>\n<div id=\"content-center\">\n<ul>\n<li><i data-icon=\"1\"><\/i><\/li>\n<li><i data-icon=\"2\"><\/i><\/li>\n<\/ul>\n<div id=\"contributors-block\">\n<p><span>By<\/span><\/p>\n<ul>\n<li>\n\t\t\t\tAli El Kaafarani<\/li>\n<\/ul>\n<p>\n\tPublished: <span>13 Apr 2023<\/span>\n<\/p>\n<\/div>\n<section id=\"content-body\">\n<p>The world is on the cusp of a revolution in quantum technology. Investment in quantum R&#038;D reached <a href=\"https:\/\/www.mckinsey.com\/~\/media\/mckinsey\/business%20functions\/mckinsey%20digital\/our%20insights\/quantum%20computing%20use%20cases%20are%20getting%20real%20what%20you%20need%20to%20know\/quantum-computing-an-emerging-ecosystem.pdf\">$1.7bn in 2021<\/a> \u2013 a 20 times increase from five years prior, and in 2022, US quantum startups raised $870m \u2013 double what they\u2019d raised in 2020.\u00a0<\/p>\n<p>In March of 2023, the UK government launched its much-anticipated <a href=\"https:\/\/assets.publishing.service.gov.uk\/government\/uploads\/system\/uploads\/attachment_data\/file\/1142942\/national_quantum_strategy.pdf\">National Quantum Strategy<\/a> with a <a href=\"https:\/\/www.ft.com\/content\/900ba4ee-6c60-4406-963a-810771c2ad7c\">landmark investment of \u00a32.5bn<\/a>, highlighting the important role that quantum technologies will hold for the UK\u2019s future growth and global competitiveness.\u00a0<\/p>\n<p>But with the quantum opportunity comes a threat. Quantum computers will have the power to solve computational problems that were previously thought impossible, posing a significant security risk as traditional encryption methods used to protect virtually all of the world\u2019s sensitive information are rendered obsolete.\u00a0<\/p>\n<p>Governments are taking note and in 2022, the White House <a href=\"https:\/\/www.congress.gov\/bill\/117th-congress\/house-bill\/7535\">enacted<\/a> the Quantum Computing Cybersecurity Preparedness Act to lay the groundwork for a transition to quantum-secure cryptography.\u00a0<\/p>\n<section data-menu-title=\"The quantum threat takes different forms\">\n<h3><i data-icon=\"1\"><\/i>The quantum threat takes different forms<\/h3>\n<p>Important and sensitive data, even when encrypted, is constantly being stolen and stored by bad actors who hope to decipher it one day. This is known as a \u2018harvest now, decrypt later\u2019 attack.\u00a0<\/p>\n<p>When powerful quantum computers arrive, all our data will be vulnerable to this kind of retrospective attack. According to the US National Academy of Sciences, an initial quantum computer prototype capable of breaking current encryption methods could be <a href=\"https:\/\/crsreports.congress.gov\/product\/pdf\/IF\/IF11836\">developed <\/a>in the next decade.<\/p>\n<p>For nation states, the intelligence value of reaching this threshold is almost impossible to quantify. NIST <a href=\"https:\/\/nvlpubs.nist.gov\/nistpubs\/CSWP\/NIST.CSWP.04282021.pdf\">says<\/a> that once this threshold has been crossed, \u2018nothing can be done to protect the confidentiality of encrypted material that was previously stored by an adversary.\u2019 That\u2019s why data needs to be protected with quantum-resistant encryption today, even before these machines are a reality.<\/p>\n<p>According to <a href=\"https:\/\/www.boozallen.com\/expertise\/analytics\/quantum-computing\/chinese-cyber-threats-in-the-quantum-era.html#:~:text=Booz%20Allen%20recommends%20CISOs%20manage,3)%20educating%20personnel%20and%20staying\">Booz Allen Hamilton<\/a>, \u2018the anticipated cracking of encryption by quantum computers must be treated as a current threat.\u2019 Only late last year, top former US national security officials including the Deputy Director of National Intelligence, <a href=\"https:\/\/cyberscoop.com\/quantum-computing-threat\/\">warned<\/a> the world that the danger of these types of retrospective attacks was \u2018immediate.\u2019<\/p>\n<p>There has been a lot of focus on new cryptographic schemes and algorithms to combat the quantum threat, but the methods by which these are securely implemented also need to be considered. For example, the techniques for guarding against side channel attacks also have to be significantly evolved, tested and validated before critical devices can be considered quantum-secure.<\/p>\n<\/section>\n<section data-menu-title=\"Post-quantum cryptography (PQC)\">\n<h3><i data-icon=\"1\"><\/i>Post-quantum cryptography (PQC)<\/h3>\n<p>The threat of such an attack is credible enough that the NSA and other government agencies across the world have <a href=\"https:\/\/www.technologyreview.com\/s\/600715\/nsa-says-it-must-act-now-against-the-threat-of-quantum-computers\/\">warned<\/a> that \u2018we must act now\u2019 to prepare for it.\u00a0<\/p>\n<p>In 2016, NIST initiated a process to define new, quantum-ready cryptographic standards to replace those vulnerable to quantum attack. In July last year, it <a href=\"https:\/\/csrc.nist.gov\/News\/2022\/pqc-candidates-to-be-standardized-and-round-4#standardization\">picked<\/a> a handful of diverse algorithms to standardise, with more to be announced in the future.<\/p>\n<p>Because the future capabilities of quantum computers remain an open question, NIST has taken a variety of mathematical approaches to safeguard encryption. Each approach has different characteristics in terms of its practicality, implementation and design that make them suitable for different use cases.\u00a0<\/p>\n<\/section>\n<section data-menu-title=\"Preparing for PQC\">\n<h3><i data-icon=\"1\"><\/i>Preparing for PQC<\/h3>\n<p>NIST is <a href=\"https:\/\/www.nccoe.nist.gov\/projects\/building-blocks\/post-quantum-cryptography\">unequivoca<\/a>l that businesses should begin the transition to PQC now: \u2018It is critical to begin planning for the replacement of hardware, software, and services that use public-key algorithms now so that the information is protected from future attacks.\u2019<\/p>\n<p>Of the data your company holds, work out what needs to be kept confidential. The answer will help you prioritise systems for upgrade, starting with those most vulnerable to attack. Depending on your sector, different operational systems and aspects of the supply chain will take priority. For example, healthcare businesses need to prioritise electronic medical records (EMR), patient monitoring and prescription issuing systems, while energy firms should focus on grid control, generation plant control, and energy discovery data collection systems.\u00a0<\/p>\n<p>CISOs should also establish a realistic timeline for their company\u2019s path to migration. For many organisations, a straightforward option will be integrating hybrid cryptography solutions. NIST has recommended combining <a href=\"https:\/\/csrc.nist.gov\/publications\/detail\/fips\/140\/3\/final\">FIPS 140-3<\/a>-certified solutions with one or more post-quantum candidates for standardisation to gain the quantum-resistant assurance of PQC algorithms while keeping solutions FIPS-certified.\u00a0<\/p>\n<p>The fact of the matter is that quantum computers will soon become a reality. The threat will impact us all, so the best way to deal with this is through preparation today.\u00a0\u00a0<\/p>\n<p><em>Ali El Kaafarani is <\/em><i>CEO of post-quantum cryptography company, <\/i><a href=\"http:\/\/www.pqshield.com\"><i>PQShield<\/i><\/a><i>, and research fellow at the <\/i><a href=\"https:\/\/www.maths.ox.ac.uk\/people\/ali.elkaafarani\"><i>University of Oxford\u2019s Mathematical Institute<\/i><\/a>.\u00a0<em>He holds a PhD in cryptography from the <a href=\"https:\/\/www.bath.ac.uk\/\" target=\"_blank\" rel=\"noopener\">University of Bath<\/a>.<\/em><\/p>\n<\/section>\n<\/section>\n<section id=\"DigDeeperSplash\">\n<h4>\n\t\t\t<i data-icon=\"m\"><\/i>Read more on IT risk management<\/h4>\n<ul>\n<li><a id=\"DigDeeperItem-1\" href=\"https:\/\/www.techtarget.com\/searchenterpriseai\/definition\/crypto-agility\"><br \/>\n\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/cdn.ttgtmedia.com\/visuals\/digdeeper\/1.jpg\" srcset=\"https:\/\/cdn.ttgtmedia.com\/visuals\/digdeeper\/1_searchsitetablet_520X173.jpg 960w,https:\/\/cdn.ttgtmedia.com\/visuals\/digdeeper\/1.jpg 1280w\" alt ><\/p>\n<h5>crypto-agility<\/h5>\n<div>\n<p><img decoding=\"async\" src=\"https:\/\/cdn.ttgtmedia.com\/rms\/onlineimages\/gillis_alex.jpg\" alt=\"AlexanderGillis\">\n\t\t\t\t\t\t\t\t\t<\/p>\n<p><span>By: <span>Alexander\u00a0Gillis<\/span><\/span>\n\t\t\t\t\t\t\t<\/p>\n<\/div>\n<p>\t\t\t\t<\/a><\/li>\n<li><a id=\"DigDeeperItem-2\" href=\"https:\/\/www.techtarget.com\/searchsecurity\/definition\/post-quantum-cryptography\"><br \/>\n\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/cdn.ttgtmedia.com\/visuals\/digdeeper\/2.jpg\" srcset=\"https:\/\/cdn.ttgtmedia.com\/visuals\/digdeeper\/2_searchsitetablet_520X173.jpg 960w,https:\/\/cdn.ttgtmedia.com\/visuals\/digdeeper\/2.jpg 1280w\" alt ><\/p>\n<h5>post-quantum cryptography<\/h5>\n<div>\n<p><img decoding=\"async\" src=\"https:\/\/cdn.ttgtmedia.com\/rms\/computerweekly\/Rob Clyde.jpg\" alt=\"RobClyde\">\n\t\t\t\t\t\t\t\t\t<\/p>\n<p><span>By: <span>Rob\u00a0Clyde<\/span><\/span>\n\t\t\t\t\t\t\t<\/p>\n<\/div>\n<p>\t\t\t\t<\/a><\/li>\n<li><a id=\"DigDeeperItem-3\" href=\"https:\/\/www.computerweekly.com\/news\/252529003\/Whats-happening-with-quantum-safe-cryptography\"><br \/>\n\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/cdn.ttgtmedia.com\/visuals\/ComputerWeekly\/Hero Images\/computer-chip-processor-hardware-kyu-adobe_searchsitetablet_520X173.jpg\" srcset=\"https:\/\/cdn.ttgtmedia.com\/visuals\/ComputerWeekly\/Hero%20Images\/computer-chip-processor-hardware-kyu-adobe_searchsitetablet_520X173.jpg 960w,https:\/\/cdn.ttgtmedia.com\/visuals\/ComputerWeekly\/Hero%20Images\/computer-chip-processor-hardware-kyu-adobe.jpg 1280w\" alt ><\/p>\n<h5>What\u2019s happening with quantum-safe cryptography?<\/h5>\n<div>\n<p><img decoding=\"async\" src=\"https:\/\/cdn.ttgtmedia.com\/rms\/computerweekly\/Cliff-Saran-Sep-2022-140x180px.jpg\" alt=\"CliffSaran\">\n\t\t\t\t\t\t\t\t\t<\/p>\n<p><span>By: <span>Cliff\u00a0Saran<\/span><\/span>\n\t\t\t\t\t\t\t<\/p>\n<\/div>\n<p>\t\t\t\t<\/a><\/li>\n<li><a id=\"DigDeeperItem-4\" href=\"https:\/\/www.techtarget.com\/searchsecurity\/feature\/How-to-prepare-for-post-quantum-computing-security\"><br \/>\n\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/cdn.ttgtmedia.com\/rms\/onlineimages\/security_a210892891_searchsitetablet_520X173.jpg\" srcset=\"https:\/\/cdn.ttgtmedia.com\/rms\/onlineimages\/security_a210892891_searchsitetablet_520X173.jpg 960w,https:\/\/cdn.ttgtmedia.com\/rms\/onlineimages\/security_a210892891.jpg 1280w\" alt ><\/p>\n<h5>How to prepare for post-quantum computing security<\/h5>\n<div>\n<p><img decoding=\"async\" src=\"https:\/\/cdn.ttgtmedia.com\/rms\/onlineImages\/johnson_kyle.jpg\" alt=\"KyleJohnson\">\n\t\t\t\t\t\t\t\t\t<\/p>\n<p><span>By: <span>Kyle\u00a0Johnson<\/span><\/span>\n\t\t\t\t\t\t\t<\/p>\n<\/div>\n<p>\t\t\t\t<\/a><\/li>\n<\/ul>\n<\/section>\n<\/div>\n<p><a href=\"https:\/\/www.computerweekly.com\/opinion\/With-cyber-attacks-on-the-rise-businesses-should-prepare-for-quantum-hacks-now\" class=\"button purchase\" rel=\"nofollow noopener\" target=\"_blank\">Read More<\/a><br \/>\n Anthony Noren<\/p>\n","protected":false},"excerpt":{"rendered":"<p>zapp2photo &#8211; stock.adobe.com Advances in quantum computing have brought the world is on the cusp of a technological revolution, but it is not without risk. Find out why you should start to prepare for post-quantum cryotography today. By Ali El Kaafarani Published: 13 Apr 2023 The world is on the cusp of a revolution in<\/p>\n","protected":false},"author":1,"featured_media":629572,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[234,24748,46],"tags":[],"class_list":{"0":"post-629571","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-attacks","8":"category-cyber","9":"category-technology"},"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/posts\/629571","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/comments?post=629571"}],"version-history":[{"count":0,"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/posts\/629571\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/media\/629572"}],"wp:attachment":[{"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/media?parent=629571"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/categories?post=629571"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/tags?post=629571"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}