Search This Blog

Powered by Blogger.

Blog Archive

Labels

Showing posts with label Quantum computing. Show all posts

Why Hackers Are Collecting Encrypted Data for Future Attacks

 



The cybercrime world is ever-changing, and hackers are preparing for a future quantum computer that might make current encryption techniques useless. This is called "harvest now, decrypt later," a rising phenomenon since cybercriminals steal encrypted data with hope for the time when, decrypted, it will become easy using quantum computers. Businesses must be aware of this new threat and use measures of proaction in their data protection.

Encryption has been one of the most essential practices that organisations have been carrying out for years, keeping any of the sensitive information being used to communicate, financial records, and personal information. New advances in quantum computing, however, create a potential danger that today's encryption would be relatively easy to break in the near future. Hackers are aware of this and are more aggressively collecting encrypted data that will wait for the quantum computers' ability to break down cryptographic codes.

Already, it's the reality of cyberattacks. Today, more than 70% of ransomware attacks include exfiltration of data before encrypting it. Cybercriminals are banking on quantum computing ultimately making decryption of taken data possible, no matter how safe they are today.


Threat from Quantum Computing to Encryption

There is a fundamental difference between quantum and traditional computing. In a classical computer, a bit is either one or zero. A qubit in a quantum computer, through superposition characteristic of it, is both one and zero at the same time, so that quantum computers are enabled to calculate at unprecedented speeds on complex calculations.

For instance, it would take a classical computer trillions of years to break a 2,048-bit encryption; a quantum computer can do this in a few seconds. Quantum technology is not available on a massive scale yet, but scientists predict that it will be implemented within ten years, causing hackers to put aside the data they want to encrypt in advance-by storing it encrypted today.


What Data Are Hackers Targeting?

In general terms, hackers have historically been most interested in stealing PII, which includes names, addresses, social security numbers, and even financial information. Such details are patently valuable for identity theft purposes and far more nefarious undertakings. With quantum computing, of course, hackers will no longer be limited to stealing data from databases but rather can intercept data as it travels between the web browser and server or even exploit vulnerabilities existing within internal networks.

This effectively means that companies must be even more careful to safeguard the very foundations of their HR and financial structures, communications, and any partnerships they hold. When quantum computing becomes ubiquitous, no encrypted data will ever remain safe unless new methods impervious to quantum decryption are deployed.


The Quantum Decryption Consequences

As a result, severe consequences will be meted out to businesses if they do not prepare for the quantum era. If hackers decrypt the data, the taken data may lead to initiating account takeovers, revealing identity theft campaigns that may have begun, and running targeted cyberattacks. The average cost of a data breach already runs into millions of dollars; it has risen from $4.35 million in 2022 to $4.45 million in 2023. These figures may see a great uptrend as quantum computing becomes a reality.

On the legal side, one of the main issues is possible legal implications. Companies that cannot protect client information may face billions in penalties and damage their reputation as jurisdictions worldwide are hardening their data protection measures.


Why Begin Preparing Now?

While quantum computing may not be commercially available yet, businesses cannot wait. It may take many years before the average hacker gets his hands on quantum technology, but well-funded groups-nation-states or corporate competitors-will probably soon get to use it. Companies should act now, not just to avoid losing money but to get ahead of advanced cyber threats.

Also, the development in quantum computer technology speeds up quickly. Although current quantum computers are of high price and complexity, a recent breakthrough came from a Chinese startup regarding portable consumer-grade quantum computers; this means that such quantum computers might appear more useful even sooner than thought.


Protecting Businesses Against Quantum Computing Threats

As quantum computing rapidly evolves, businesses need to take decisive actions to protect their data from future risks. Here are key steps to consider:

1. Adopt Post-Quantum Cryptography: Organisations should prioritise implementing encryption methods that are resistant to quantum computing, following the guidelines from the National Institute of Standards and Technology (NIST). By transitioning to post-quantum cryptographic standards as soon as they become available, businesses can secure their data from potential quantum-powered attacks.

2. Improve Breach Detection: Strengthening breach detection capabilities is essential. By monitoring for indicators of compromise, businesses can identify potential attacks early, allowing security teams to respond quickly. This could involve changing compromised passwords or encrypting sensitive data before hackers can exploit it.

3. Use Quantum-Safe VPNs: As quantum-safe virtual private networks (VPNs) are developed, they can provide an additional layer of security by protecting data in transit. These VPNs will ensure that hackers cannot intercept sensitive communications or steal data while it is being transmitted between systems.

4. Move Sensitive Data to Secure Locations: Business leaders should evaluate whether decrypted data poses significant risks and move critical information to secure offline storage if necessary. For highly sensitive data, businesses may need to implement segmented networks, strict access controls, or even revert to paper-based systems to protect it from potential quantum threats.


The Time to Act Is Now

With quantum computing on the horizon, businesses must begin preparing for a future where these technologies could be used to break traditional encryption. By adopting quantum-resistant cryptography, improving breach detection, and securely storing sensitive data, companies can reduce the risk of falling victim to quantum-driven cyberattacks. While quantum computers may still be years away, the consequences of failing to prepare could be disastrous. Now is the time for decision-makers to take proactive measures to protect their data before it's too late.


Cyber Resilience: Preparing for the Inevitable in a New Era of Cybersecurity

 

At the TED Conference in Vancouver this year, the Radical Innovators foundation brought together over 60 of the world’s leading CHROs, CIOs, and founders to discuss how emerging technologies like AI and quantum computing can enhance our lives. Despite the positive focus, the forum also addressed a more concerning topic: how these same technologies could amplify cybersecurity threats. Jeff Simon, CISO of T-Mobile, led a session on the future of security, engaging tech executives on the growing risks. 

The urgency of this discussion was underscored by alarming data from Proofpoint, which showed that 94% of cloud customers faced cyberattacks monthly in 2023, with 62% suffering breaches. This illustrates the increased risk posed by emerging technologies in the wrong hands. The sentiment from attendees was clear: successful cyberattacks are now inevitable, and the traditional focus on preventing breaches is no longer sufficient. Ajay Waghray, CIO of PG&E Corporation, emphasized a shift in mindset, suggesting that organizations must operate under the assumption that their systems are already compromised. 

He proposed a new approach centered around “cyber resilience,” which goes beyond stopping breaches to maintaining business continuity and strengthening organizational resilience during and after attacks. The concept of cyber resilience aligns with lessons learned during the pandemic, where resilience was about not just recovery, but coming back stronger. Bipul Sinha, CEO of Rubrik, a leading cyber resilience firm, believes organizations must know where sensitive data resides and evolve security policies to stay ahead of future threats. He argues that preparedness, including preemptive planning and strategic evolution after an attack, is crucial for continued business operations. 

Venture capital firms like Lightspeed Venture Partners are also recognizing this shift towards cyber resilience. Co-founder Ravi Mhatre highlights the firm’s investments in companies like Rubrik, Wiz, and Arctic Wolf, which focus on advanced threat mitigation and containment. Mhatre believes that cybersecurity now requires a more dynamic approach, moving beyond the idea of a strong perimeter to embrace evolutionary thinking. Waghray identifies four core elements of a cyber resilience strategy: planning, practice, proactive detection, and partnerships. 

These components serve as essential starting points for companies looking to adopt a cyber resilience posture, ensuring they are prepared to adapt, respond, and recover from the inevitable cyber threats of the future.

NIST Approves IBM's Quantum-Safe Algorithms for Future Data Security

 


In a defining move for digital security, the National Institute of Standards and Technology (NIST) has given its official approval to three quantum-resistant algorithms developed in collaboration with IBM Research. These algorithms are designed to safeguard critical data and systems from the emerging threats posed by quantum computing.

The Quantum Computing Challenge

Quantum computing is rapidly approaching, bringing with it the potential to undermine current encryption techniques. These advanced computers could eventually decode the encryption protocols that secure today’s digital communications, financial transactions, and sensitive information, making them vulnerable to breaches. To mitigate this impending risk, cybersecurity experts are striving to develop encryption methods capable of withstanding quantum computational power.

IBM's Leadership in Cybersecurity

IBM has been at the forefront of efforts to prepare the digital world for the challenges posed by quantum computing. The company highlights the necessity of "crypto-agility," the capability to  modify cryptographic methods to prepare in the face of rapid development of security challenges. This flexibility is especially crucial as quantum computing technology continues to develop, posing new threats to traditional security measures.

NIST’s Endorsement of Quantum-Safe Algorithms

NIST's recent endorsement of three IBM-developed algorithms is a crucial milestone in the advancement of quantum-resistant cryptography. The algorithms, known as ML-KEM for encryption and ML-DSA and SLH-DSA for digital signatures, are integral to IBM's broader strategy to ensure the resilience of cryptographic systems in the quantum era.

To facilitate the transition to quantum-resistant cryptography, IBM has introduced two essential tools: the IBM Quantum Safe Explorer and the IBM Quantum Safe Remediator. The Quantum Safe Explorer helps organisations identify which cryptographic methods are most susceptible to quantum threats, guiding their prioritisation of updates. The Quantum Safe Remediator, on the other hand, provides solutions to help organisations upgrade their systems with quantum-resistant cryptography, ensuring continued security during this transition.

As quantum computing technology advances, the urgency for developing encryption methods that can withstand these powerful machines becomes increasingly clear. IBM's contributions to the creation and implementation of quantum-safe algorithms are a vital part of the global effort to protect digital infrastructure from future threats. With NIST's approval, these algorithms represent a meaningful leap forward in securing sensitive data and systems against quantum-enabled attacks. By promoting crypto-agility and offering tools to support a smooth transition to quantum-safe cryptography, IBM is playing a key role in building a more secure digital future.


The Quantum Revolution: What Needs to Happen Before It Transforms Our World



When Bell Labs introduced the transistor in 1947, few could have predicted its pivotal role in shaping the digital age. Today, quantum computing stands at a similar crossroads, poised to revolutionise industries by solving some of the most complex problems with astonishing speed. Yet, several key challenges must be overcome to unlock its full potential.

The Promise of Quantum Computing

Quantum computers operate on principles of quantum physics, allowing them to process information in ways that classical computers cannot. Unlike traditional computers, which use bits that represent either 0 or 1, quantum computers use qubits that can exist in multiple states simultaneously. This capability enables quantum computers to perform certain calculations exponentially faster than today’s most advanced supercomputers.

This leap in computational power could revolutionise industries by simulating complex systems that are currently beyond the reach of classical computers. For example, quantum computing could imminently accelerate the development of new pharmaceuticals by modelling molecular interactions more precisely, reducing the costly and time-consuming trial-and-error process. Similarly, quantum computers could optimise global logistics networks, leading to more efficient and sustainable operations across industries such as shipping and telecommunications.

Although these transformative applications are not yet a reality, the rapid pace of advancement suggests that quantum computers could begin addressing real-world problems by the 2030s.

Overcoming the Challenges

Despite its promise, quantum computing faces technical challenges, primarily related to the stability of qubits, entanglement, and scalability.

Qubits, the fundamental units of quantum computation, are highly sensitive to environmental fluctuations, which makes them prone to errors. Currently, the information stored in a qubit is often lost within a fraction of a second, leading to error rates that are much higher than those of classical bits. To make quantum computing viable, researchers must develop methods to stabilise or correct these errors, ensuring qubits can retain information long enough to perform useful calculations.

Entanglement, another cornerstone of quantum computing, involves linking qubits in a way that their states become interdependent. For quantum computers to solve complex problems, they require vast networks of entangled qubits that can communicate effectively. However, creating and maintaining such large-scale entanglement remains a significant hurdle. Advances in topological quantum computing, which promises more stable qubits, may provide a solution, but this technology is still in its infancy.

Scalability is the final major challenge. Present-day quantum computers, even the smallest ones, require substantial energy and infrastructure to operate. Realising the full potential of quantum computing will necessitate either making these systems more efficient or finding ways to connect multiple quantum computers to work together seamlessly, thereby increasing their combined computational power.

As quantum computing progresses, so too must the measures we take to secure data. The very power that makes quantum computers so promising also makes them a potential threat if used maliciously. Specifically, a cryptographically relevant quantum computer (CRQC) could break many of the encryption methods currently used to protect sensitive data. According to a report by the Global Risk Institute, there is an 11% chance that a CRQC could compromise commonly used encryption methods like RSA-2048 within five years, with the risk rising to over 30% within a decade.

To mitigate these risks, governments and regulatory bodies worldwide are establishing guidelines for quantum-safe practices. These initiatives aim to develop quantum-safe solutions that ensure secure communication and data protection in the quantum era. In Europe, South Korea, and Singapore, for example, efforts are underway to create Quantum-Safe Networks (QSN), which use multiple layers of encryption and quantum key distribution (QKD) to safeguard data against future quantum threats.

Building a Quantum-Safe Infrastructure

Developing a quantum-safe infrastructure is becoming increasingly urgent for industries that rely heavily on secure data, such as finance, healthcare, and defence. Quantum-safe networks use advanced technologies like QKD and post-quantum cryptography (PQC) to create a robust defence against potential quantum threats. These networks are designed with a defence-in-depth approach, incorporating multiple layers of encryption to protect against attacks.

Several countries and companies are already taking steps to prepare for a quantum-secure future. For instance, Nokia is collaborating with Greece's national research network, GRNET, to build a nationwide quantum-safe network. In Belgium, Proximus has successfully tested QKD to encrypt data transmissions between its data centres. Similar initiatives are taking place in Portugal and Singapore, where efforts are focused on strengthening cybersecurity through quantum-safe technologies.

Preparing for the Quantum Future

Quantum computing is on the cusp of transforming industries by providing solutions to problems that have long been considered unsolvable. However, realising this potential requires continued innovation to overcome technical challenges and build the necessary security infrastructure. The future of quantum computing is not just about unlocking new possibilities but also about ensuring that this powerful technology is used responsibly and securely.

As we approach a quantum-secure economy, the importance of trust in our digital communications cannot be overstated. Now is the time to prepare for this future, as the impact of quantum computing on our lives is likely to be profound and far-reaching. By embracing the quantum revolution with anticipation and readiness, we can ensure that its benefits are both substantial and secure.


NATO Collaborates with Start-Ups to Address Growing Security Threats

 

Marking its 75th anniversary at a summit in Washington DC this week, the North Atlantic Treaty Organization (NATO) focused on Ukraine while emphasizing the importance of new technologies and start-ups to adapt to modern security threats.

In its Washington Summit Declaration, NATO highlighted its accelerated transformation to address current and future threats while maintaining a technological edge. This includes experimenting with and rapidly adopting emerging technologies like artificial intelligence (AI), biotechnology, and quantum computing.

Phil Lockwood, Head of NATO’s Innovation Unit, told Euronews Next, "We've long recognized that our ability to deter and defend relies on our technological edge. Although we're experiencing unprecedented technological innovation, our edge is potentially eroding. We must work hard to maintain this edge as adversaries and competitors pursue their own technological advancements."

One technology NATO is exploring is seabed mapping, with the Dutch start-up Lobster Robotics as a key partner. "If they had survey equipment, they could have detected the Nord Stream pipeline explosions. While they may not have intervened, at least the threat would have been known," said Stephan Rutten, co-founder and CEO of Lobster Robotics. Lobster Robotics is one of 44 companies selected from 1,300 applicants for NATO's Defence Innovation Accelerator for the North Atlantic (DIANA) program, which provides resources and networks to address critical defense and security challenges.

DIANA focuses on dual-use innovations, applicable both commercially and for defense. NATO also supports start-ups through the NATO Innovation Fund. Lobster Robotics' optical seabed mapping technology can significantly reduce costs and increase safety compared to using teams of divers. It is particularly useful for mapping critical underwater infrastructure like wind farms and oil rigs.

Access to government or defense contracts can be lucrative yet challenging for start-ups. "It comes down to networking. You need to know the people and how the organization works," Rutten said, noting that NATO’s approval helped them collaborate with governments. "I urge governments to think in the time scale of start-ups. They say they're moving fast, but procurement takes 18 months. I could start five new companies by then."

The Greece-based company Sortiria Technology, another underwater intelligence firm selected by NATO, also finds the procurement process lengthy. "There are long contraction cycles and varied buying processes in each country," said Angelos Tsereklas, Managing Director of Sortiria Technology. "But initiatives like DIANA and the NATO Innovation Fund, as well as support from the European Union and European Investment Bank, are disrupting that model."

This month, NATO launched a second round of the DIANA project, focusing on energy, human health, information security, logistics, and critical infrastructure. Information security is a top concern, with lessons to be learned from Ukraine's experience with sophisticated cyber attacks from Russia.

In its Washington Summit Declaration, NATO warned of cyber threats from Russia and China, announcing a new cyber alliance called the Integrated Cyber Defence Centre. This center will bring together civilian and military personnel from NATO member countries and industry experts.

One notable start-up is Hushmesh, which aims to create a safer, more efficient internet. While its vision may take decades to realize, CEO Manu Fontaine said, "The natural glide path is to develop services on an inherently secure, verified infrastructure." Hushmesh is currently developing a messaging service for a NATO pilot program in 2025.

The Washington Summit Declaration also stated NATO’s intent to monitor technological advancements on the battlefield in Ukraine through experimentation and rapid adoption of emerging technologies. Rutten noted that while government procurement remains challenging, change is underway. "Many countries are becoming more agile and open to innovation faster, inspired by the successes seen in Ukraine. However, it may take a few more years to fully implement these changes."

Debunking Common Myths About VPNs






Virtual Private Networks (VPNs) are important tools for online privacy, but they’re often misunderstood. Here, we clear up the top five myths to help you understand what VPNs can and can’t do for your digital security.

Myth 1: All VPNs Steal Your Data

Many people worry that VPNs are just a cover for collecting data. While some free VPNs do sell user data to advertisers, many trustworthy VPNs don't. These reputable VPNs are regularly audited by independent firms like KPMG or Deloitte to prove they don’t keep logs of your activity. For example, Private Internet Access has defended its no-log policy in court. Always choose VPNs that have passed these audits to ensure your data is safe.

Myth 2: Government Surveillance Makes VPNs Useless

Some think that because the government monitors internet traffic, using a VPN is pointless. While governments do have surveillance capabilities, VPNs still add a strong layer of protection. They encrypt your data, making it much harder for anyone, including government agencies, to intercept or read it without a warrant. Despite efforts to crack encryption, modern protocols like OpenVPN, WireGuard, and IKEv2 are still secure. Therefore, VPNs are essential for maintaining privacy even in the face of government surveillance.

Myth 3: Quantum Computing Will Break VPNs Soon

There’s a fear that quantum computers will soon break all encryption, making VPNs useless. While quantum computing is a future threat, practical quantum computers are still many years away. Researchers are already working on new types of encryption that can resist quantum attacks. Even though there’s a risk that stored encrypted data could be decrypted in the future, the vast amount of data on the internet makes it impractical for anyone to capture everything. Using a VPN with future-proof protocols can help protect your data against these risks.

Myth 4: VPNs Make You Completely Anonymous Online

VPNs do a great job of hiding your IP address, but they don’t make you completely anonymous. If you share personal information on social media or allow tracking cookies, your identity can still be exposed. For full privacy, use VPNs along with other tools like script blockers, ad blockers, and services that delete your data from marketing databases. By combining these tools and being careful online, you can greatly reduce your digital footprint.

Myth 5: Tor Is Better Than a VPN

The Tor Browser offers high privacy by routing your traffic through multiple servers, but this also slows down your internet speed. Tor’s known exit nodes can be blocked by websites. In contrast, good VPNs invest in high-quality servers, providing faster speeds and reliable access to content that’s blocked in your region. While Tor is great for absolute privacy, VPNs are better for everyday use, where speed and reliability are important.

Misunderstandings about VPNs often come from unreliable services giving the whole industry a bad name. By choosing well-reviewed and audited VPNs, you can significantly boost your online privacy and security. VPNs protect you from hackers, marketers, and surveillance, making your internet experience safer and more private. Clearing up these myths helps you make better decisions about using digital privacy tools.

Quantum Key Distribution Achieves Breakthrough with Semiconductor Quantum Dots

 

In the face of emerging quantum computing threats, traditional encryption methods are becoming increasingly vulnerable. This has spurred the development of quantum key distribution (QKD), a technology that uses the principles of quantum mechanics to secure data transmission. While QKD has seen significant advancements, establishing large-scale networks has been hindered by the limitations of current quantum light sources. However, a recent breakthrough by a team of German scientists may change this landscape. 

The research, published in Light Science and Applications, marks a significant milestone in quantum communication technology. The core of this breakthrough lies in the use of semiconductor quantum dots (QDs), often referred to as artificial atoms. These QDs have shown great potential for generating quantum light, which is crucial for quantum information technologies. In their experiment, the researchers connected Hannover and Braunschweig via an optical fiber network, a setup they called the “Niedersachsen Quantum Link.” This intercity experiment involved a fiber optic cable approximately 79 kilometers long that linked the Leibniz University of Hannover and Physikalisch-Technische Bundesanstalt Braunschweig. Alice, located at LUH, prepared single photons encrypted in polarization. Bob, stationed at PTB, used a passive polarization decoder to decrypt the polarization states of the received photons. 

This setup represents the first quantum communication link in Lower Saxony, Germany. The team achieved stable and rapid transmission of secret keys, demonstrating that positive secret key rates (SKRs) are feasible for distances up to 144 kilometers, corresponding to a 28.11 dB loss in the laboratory. They ensured a high-rate secret key transmission with a low quantum bit error ratio (QBER) for 35 hours based on this deployed fiber link. Dr. Jingzhong Yang, the first author of the study, highlighted that their achieved SKR surpasses all current single-photon source (SPS) based implementations. Even without further optimization, their results approach the levels attained by established decoy state QKD protocols using weak coherent pulses. Beyond QKD, quantum dots offer significant potential for other quantum internet applications, such as quantum repeaters and distributed quantum sensing. These applications benefit from the inherent ability of QDs to store quantum information and emit photonic cluster states. This work underscores the feasibility of integrating semiconductor single-photon sources into large-scale, high-capacity quantum communication networks. 

Quantum communication leverages the quantum characteristics of light to ensure messages cannot be intercepted. “Quantum dot devices emit single photons, which we control and send to Braunschweig for measurement. This process is fundamental to quantum key distribution,” explained Professor Ding. He expressed excitement about the collaborative effort’s outcome, noting, “Some years ago, we only dreamt of using quantum dots in real-world quantum communication scenarios. Today, we are thrilled to demonstrate their potential for many more fascinating experiments and applications in the future, moving towards a ‘quantum internet.’” 

The advancement of QKD with semiconductor quantum dots represents a major step forward in the quest for secure communication in the age of quantum computing. This breakthrough holds promise for more robust and expansive quantum networks, ensuring the confidentiality and security of sensitive information against the evolving landscape of cyber threats. 

As the world continues to advance towards more interconnected digital environments, the necessity for secure communication becomes ever more critical. The pioneering work of these scientists not only showcases the potential of QKD but also paves the way for future innovations in quantum communication and beyond.

New Rules for Quantum Encryption Unveiled by Cryptographers

 

Cryptographers are making significant strides in the field of quantum encryption, developing new rules that promise to enhance data security in the quantum computing age. As quantum computers advance, they pose a threat to current encryption methods, which rely on complex mathematical problems that quantum machines could potentially solve with ease. 

This has driven researchers to explore quantum encryption, which leverages the principles of quantum mechanics to create theoretically unbreakable security protocols. Quantum encryption primarily focuses on two main concepts: quantum key distribution (QKD) and post-quantum cryptography (PQC). QKD uses the properties of quantum particles to securely exchange cryptographic keys between parties. 

Any attempt to intercept these keys would alter the quantum states, alerting the parties to the presence of an eavesdropper. PQC, on the other hand, involves developing new cryptographic algorithms that can withstand attacks from both classical and quantum computers. Recent research has introduced innovative approaches to quantum encryption, addressing the challenges of scalability and practical implementation. 

These advancements aim to make quantum encryption more accessible and reliable, ensuring that data remains secure even in a future dominated by quantum computing. One of the most promising developments is the establishment of quantum-resistant algorithms, which can be integrated into existing digital infrastructures. These algorithms are designed to be robust against quantum attacks while maintaining compatibility with current systems. This dual approach ensures a smoother transition from classical to quantum-secure encryption.  

Furthermore, the discovery of new mathematical structures and protocols has opened up possibilities for more efficient and effective quantum encryption methods. These breakthroughs are crucial for protecting sensitive information, from financial transactions to personal communications, in a quantum computing world. The ongoing research in quantum encryption is a testament to the proactive efforts of cryptographers to anticipate and counter the potential threats posed by quantum computers. 

By staying ahead of these challenges, they are laying the groundwork for a future where data security is not only preserved but significantly strengthened. As the field of quantum encryption continues to evolve, it will play a pivotal role in safeguarding digital information against emerging threats. The innovative rules and protocols being developed today will shape the future of cybersecurity, ensuring that privacy and data integrity are maintained in an increasingly interconnected world.

Ensuring Secure Communication in the Digital Age with VPNs and Post-Quantum Cryptography

 


Cryptography secures online communication, but with reported losses of $534 million due to data breaches in 2023, robust encryption is crucial. Weak encryption invites breaches and man-in-the-middle attacks. Strong VPNs provide robust encryption and secure internet communication paths, essential for online privacy, security, and unrestricted access.

VPNs protect online activities by encrypting internet traffic, masking IP addresses, and bypassing geo-restrictions. They enhance security on unsecured networks like public Wi-Fi and prevent tracking by websites, advertisers, and governments.

Traditional VPNs use encryption algorithms like RSA and ECC, which are vulnerable to quantum computers' advanced capabilities. Quantum computers could break these algorithms quickly, exposing sensitive data.

Emergence of Post-Quantum Cryptography (PQC)

As quantum computing advances, new quantum-resistant cryptographic algorithms are needed to ensure data security. Government agencies recommend adopting these algorithms to maintain secure communications in a quantum future.

PQC-VPNs use new cryptographic algorithms resistant to quantum attacks, ensuring long-term data protection. Early adoption helps organizations maintain security, comply with data protection regulations, and gain a competitive edge.

VPNs create secure tunnels for internet traffic, encrypting data before it travels and decrypting it upon arrival, ensuring secure communication.

Businesses must protect sensitive data and maintain regulatory compliance. PQC VPNs future-proof data security against quantum threats, safeguard sensitive information, and demonstrate a commitment to cutting-edge security.

PQC VPNs secure data transmission, partner collaboration, cloud connectivity, IoT communication, remote access, and customer data handling.

Transitioning to PQC involves updating VPN software and infrastructure to support new algorithms. A hybrid approach combining traditional and quantum-resistant encryption ensures a smooth transition. Comprehensive testing and performance optimization are crucial.

Overall, adopting PQC-enabled VPNs is essential for future-proofing enterprise security against quantum threats, ensuring regulatory compliance, and maintaining a competitive edge.

Securing a Dynamic World: The Future of Cybersecurity Operations

Securing a Dynamic World: The Future of Cybersecurity Operations

Cybersecurity has become a critical concern for organizations worldwide. As threats evolve and technology advances, the role of cybersecurity operations is undergoing significant transformation. Let’s delve into the key aspects of this evolution. 

Today's changing cyber threat landscape presents a tremendous challenge to enterprises worldwide. With the rise of malevolent AI-powered threats and state-sponsored enterprises, the security sector is at a crossroads. 

Threat complexity increases, creating ubiquitous and multifaceted dangers, including sophisticated cyberattacks and internal weaknesses. This environment necessitates novel solutions, encouraging a move from old security paradigms to a more integrated, data-driven approach.

1. Dynamic Threat Landscape

Cyber threats are no longer limited to lone hackers in dark basements. Sophisticated state-sponsored attacks, ransomware gangs, and organized cybercrime syndicates pose substantial risks. The evolving threat landscape demands agility and adaptability from cybersecurity professionals.

2. Remote Work Challenges

The Covid-19 pandemic accelerated the adoption of remote work. While it offers flexibility, it also introduces security challenges. Securing remote endpoints, ensuring secure access, and protecting sensitive data outside the corporate network are top priorities.

3. Ransomware Surge

Ransomware attacks have surged, with costs doubling in 2021. These attacks not only encrypt critical data but also threaten to leak it publicly. Cybersecurity teams must focus on prevention, detection, and incident response to combat this menace.

4. Securing Remote Branches and IoT Devices

Organizations operate across multiple locations, including remote branches. Each branch introduces potential vulnerabilities. Additionally, the proliferation of Internet of Things (IoT) devices adds complexity. Cybersecurity operations must extend their reach to secure these distributed environments effectively.

5. Integrated, Data-Driven Solutions

Traditional security paradigms are shifting. Siloed approaches are giving way to integrated solutions that leverage data analytics, machine learning, and threat intelligence. Security operations centers (SOCs) now rely on real-time data to detect anomalies and respond swiftly.

6. Holistic Approach

Cybersecurity is no longer just about firewalls and antivirus software. A holistic approach involves risk assessment, vulnerability management, identity and access management, and continuous monitoring. Collaboration across IT, development, and business units is essential.

7. AI and Quantum Computing

Innovations like artificial intelligence (AI) and quantum computing are game-changers. AI enhances threat detection, automates routine tasks, and augments human decision-making. Quantum computing promises to revolutionize encryption and decryption methods.

Quantum Technology: Implications for Digital Security

 


In our modern, highly connected world, where online transactions are everywhere, the looming presence of quantum computing casts a momentous shadow. Unlike classical computers, which rely on bits to process information, quantum computers leverage the peculiar properties of quantum mechanics to perform calculations at unprecedented speeds. While this promises advancements in various fields, it also poses a formidable challenge to cybersecurity.

The Vulnerability of Current Encryption Methods

At the heart of digital security lies encryption, a complex process that transforms sensitive information into indecipherable code. Traditional encryption algorithms, such as those based on factoring large numbers, are effective against classical computers but vulnerable to quantum attacks. Quantum computers, with their ability to perform vast numbers of calculations simultaneously, could render conventional encryption obsolete, posing a grave risk to sensitive data.

The Hunt for Quantum-Resistant Encryption

Recognising the imminent threat posed by quantum computing, researchers are tirelessly working to develop encryption methods resistant to quantum attacks. The US National Institute of Standards and Technology has been at the forefront of this effort, soliciting proposals for "quantum-proof" encryption algorithms. However, progress has been incremental, with few algorithms proving robust under rigorous scrutiny.

Lattice-Based Cryptography: A Promising Solution

Among the promising avenues for quantum-resistant encryption is lattice-based cryptography. Imagine lattices as grids or matrices in a multidimensional space. These structures offer a unique framework for securing data by hiding secret information within them. Picture it like a complex maze where the secret lies concealed within the intricate lattice structure. Even with the formidable processing power of quantum computers, navigating through these lattices to uncover the hidden secrets is a challenging task. This approach provides a robust defence against potential quantum attacks, offering hope for the future of digital security.

Challenges and Controversies

Recent research by cryptographer Yilei Chen has put weight on potential vulnerabilities in lattice-based encryption. Chen's findings suggested that quantum computers might exploit certain weaknesses in lattice-based algorithms, raising concerns within the cryptographic community. However, subsequent analysis revealed flaws in Chen's work, highlighting the complexity of developing quantum-resistant encryption.

The Critical Role of Mathematics

As the race to reinforce digital security against quantum threats intensifies, the role of mathematics cannot be overstated. Countries investing in quantum technology, such as Australia, must prioritise mathematical research to complement advancements in quantum computing. Only by understanding the intricate mathematical principles underlying encryption can we hope to safeguard sensitive data in an increasingly quantum-powered world.

Conclusion

In the face of rapidly advancing quantum technology, securing our digital infrastructure has never been more critical. By fostering innovation, embracing mathematical rigour, and continually refining encryption methods, we can navigate the perplexing questions posed by quantum computing and safeguard the integrity of our digital ecosystem.


The Future of Quantum Computers: Challenging Space Encryption with Light

 

In the realm of technology and communications, the race for supremacy between quantum computers and space encryption is intensifying. 

While quantum computers hold the promise of unprecedented processing power, space encryption, leveraging light to beam data around, presents a formidable challenge. 

The advent of the first satellite slated for launch in 2025 heralds a new era in secure communication. Quantum computers, with their ability to perform complex calculations at speeds far surpassing traditional computers, have long been hailed as the future of computing. 

However, their potential to unravel existing encryption methods poses a significant threat to data security. With the ability to quickly factor large numbers, quantum computers could potentially break conventional encryption algorithms, jeopardizing sensitive information across various sectors. 

On the other hand, space-based encryption offers a robust solution to this dilemma. By harnessing the properties of light to encode and transmit data, space encryption provides an inherently secure method of communication. Unlike conventional methods that rely on mathematical algorithms, which could be compromised by quantum computing, light-based encryption offers a level of security that is theoretically unbreakable. 

The upcoming launch of the first satellite dedicated to space encryption marks a pivotal moment in the evolution of secure communication. Equipped with advanced photonics technology, this satellite will demonstrate the feasibility of transmitting data securely over long distances using quantum principles. 

By beaming encrypted data through space via light particles, it will lay the groundwork for a future where secure communication is not only possible but also practical on a global scale. One of the key advantages of space encryption lies in its resistance to interception and tampering. Unlike terrestrial communication networks, which are susceptible to eavesdropping and hacking, data transmitted via space-based encryption is inherently secure. 

The vast distances involved make it extremely difficult for unauthorized parties to intercept or manipulate the data without detection, providing a level of security unmatched by conventional methods. Furthermore, space encryption offers unparalleled reliability and speed. With data transmitted at the speed of light, communication delays are virtually nonexistent, making it ideal for applications where real-time transmission is critical. 

From financial transactions to government communications, the ability to transmit data quickly and securely is paramount, and space encryption delivers on both fronts. As quantum computers continue to advance, the need for secure communication methods becomes increasingly urgent. While quantum-resistant encryption algorithms are being developed, they may not be sufficient to withstand the full potential of quantum computing. 

In contrast, space encryption offers a solution that is not only resistant to quantum attacks but also provides a level of security that is unmatched by any other method. In conclusion, the future of quantum computers and space encryption is intertwined in a battle for supremacy in the realm of secure communication. While quantum computers hold the promise of unparalleled processing power, space encryption offers a robust solution to the threat of quantum attacks. 

With the launch of the first satellite dedicated to space encryption on the horizon, we stand at the cusp of a new era in secure communication—one where light reigns supreme. Search Description: Explore the future of quantum computers challenging space encryption with light-based data transmission, as the first satellite launch in 2025 heralds a new era in secure communication.

The Rising Energy Demand of Data Centres and Its Impact on the Grid

 



In a recent prediction by the National Grid, it's anticipated that the energy consumption of data centres, driven by the surge in artificial intelligence (AI) and quantum computing, will skyrocket six-fold within the next decade. This surge in energy usage is primarily attributed to the increasing reliance on data centres, which serve as the backbone for AI and quantum computing technologies.

John Pettigrew, the Chief Executive of National Grid, emphasised the urgent need for proactive measures to address the escalating energy demands. He highlighted the necessity of transforming the current grid infrastructure to accommodate the rapidly growing energy needs, driven not only by technological advancements but also by the rising adoption of electric cars and heat pumps.

Pettigrew underscored the pivotal moment at hand, stressing the imperative for innovative strategies to bolster the grid's capacity to sustainably meet the surging energy requirements. With projections indicating a doubling of demand by 2050, modernising the ageing transmission network becomes paramount to ensure compatibility with renewable energy sources and to achieve net-zero emissions by 2050.

Data centres, often referred to as the digital warehouses powering our modern technologies, play a crucial role in storing vast amounts of digital information and facilitating various online services. However, the exponential growth of data centres comes at an environmental cost, with concerns mounting over their substantial energy consumption.

The AI industry, in particular, has garnered attention for its escalating energy needs, with forecasts suggesting energy consumption on par with that of entire nations by 2027. Similarly, the emergence of quantum computing, heralded for its potential to revolutionise computation, presents new challenges due to its experimental nature and high energy demands.

Notably, in regions like the Republic of Ireland, home to numerous tech giants, data centres have become significant consumers of electricity, raising debates about infrastructure capacity and sustainability. The exponential growth in data centre electricity usage has sparked discussions on the environmental impact and the need for more efficient energy management strategies.

While quantum computing holds promise for scientific breakthroughs and secure communications, its current experimental phase underscores the importance of addressing energy efficiency concerns as the technology evolves.

In the bigger picture, as society embraces transformative technologies like AI and quantum computing, the accompanying surge in energy demand poses critical challenges for grid operators and policymakers. Addressing these challenges requires collaborative efforts to modernise infrastructure, enhance energy efficiency, and transition towards sustainable energy sources, ensuring a resilient and environmentally conscious energy landscape for future generations.


Here's How Quantum Computing can Help Safeguard the Future of AI Systems

 

Algorithms for artificial intelligence are rapidly entering our daily lives. Machine learning is already or soon will be the foundation of many systems that demand high levels of security. To name a few of these technologies, there are robotics, autonomous vehicles, banking, facial recognition, and military targeting software. 

This poses a crucial question: How resistant to hostile attacks are these machine learning algorithms? 

Security experts believe that incorporating quantum computing into machine learning models may produce fresh algorithms that are highly resistant to hostile attacks.

Data manipulation attacks' risks

For certain tasks, machine learning algorithms may be extremely precise and effective. They are very helpful for categorising and locating visual features. But they are also quite susceptible to data manipulation assaults, which can be very dangerous for security. 

There are various techniques to conduct data manipulation assaults, which require the very delicate alteration of image data. An attack could be conducted by introducing erroneous data into a dataset used to train an algorithm, causing it to pick up incorrect information. In situations where the AI system continues to train the underlying algorithms while in use, manipulated data can also be introduced during the testing phase (after training is complete). 

Even from the physical world, people are capable of committing such attacks. To trick a self-driving car's artificial intelligence into thinking a stop sign is a speed restriction sign, someone may apply a sticker to it. Or, soldiers may wear clothing on the front lines that would make them appear to be natural terrain features to AI-based drones. Attacks on data manipulation can have serious repercussions in any case.

For instance, a self-driving car may mistakenly believe there are no people on the road if it utilises a machine learning algorithm that has been compromised. In reality, there are people on the road.

What role quantum computing can play 

In this article, we discuss the potential development of secure algorithms known as quantum machine learning models through the integration of quantum computing with machine learning. In order to detect certain patterns in image data that are difficult to manipulate, these algorithms were painstakingly created to take advantage of unique quantum features. Resilient algorithms that are secure from even strong attacks would be the outcome. Furthermore, they wouldn't call for the pricey "adversarial training" that is currently required to train algorithms to fend off such assaults. Quantum machine learning may also provide quicker algorithmic training and higher feature accuracy.

So how would it function?

The smallest unit of data that modern classical computers can handle is called a "bit," which is stored and processed as binary digits. Bits are represented as binary numbers, specifically 0s and 1s, in traditional computers, which adhere to the principles of classical physics. On the other hand, quantum computing adheres to the same rules as quantum physics. Quantum bits, or qubits, are used in quantum computers to store and process information. Qubits can be simultaneously 0, 1, or both 0 and 1.

A quantum system is considered to be in a superposition state when it is simultaneously in several states. It is possible to create smart algorithms that take advantage of this property using quantum computers. Although employing quantum computing to protect machine learning models has tremendous potential advantages, it could potentially have drawbacks.

On the one hand, quantum machine learning models will offer vital security for a wide range of sensitive applications. Quantum computers, on the other hand, might be utilised to develop powerful adversarial attacks capable of readily misleading even the most advanced traditional machine learning models. Moving forward, we'll need to think carefully about the best ways to defend our systems; an attacker with early quantum computers would pose a substantial security risk. 

Obstacles to overcome

Due to constraints in the present generation of quantum processors, current research shows that quantum machine learning will be a few years away. 

Today's quantum computers are relatively small (fewer than 500 qubits) and have substantial error rates. flaws can occur for a variety of causes, including poor qubit manufacture, flaws in control circuitry, or information loss (referred to as "quantum decoherence") caused by interaction with the environment. 

Nonetheless, considerable progress in quantum hardware and software has been made in recent years. According to recent quantum hardware roadmaps, quantum devices built in the coming years are expected to include hundreds to thousands of qubits. 

These devices should be able to run sophisticated quantum machine learning models to help secure a wide range of sectors that rely on machine learning and AI tools. Governments and the commercial sector alike are increasing their investments in quantum technology around the world. 

This month, the Australian government unveiled the National Quantum Strategy, which aims to expand the country's quantum sector and commercialise quantum technology. According to the CSIRO, Australia's quantum sector might be valued A$2.2 billion by 2030.

ChatGPT's Effective Corporate Usage Might Eliminate Systemic Challenges

 

Today's AI is highly developed. Artificial intelligence combines disciplines that make an effort to essentially duplicate the capacity of the human brain to learn from experience and generate judgments based on that experience. Researchers utilize a variety of tactics to do this. In one paradigm, brute force is used, where the computer system cycles through all possible solutions to a problem until it finds the one that has been proven to be right.

"ChatGPT is really restricted, but good enough at some things to provide a misleading image of brilliance. It's a mistake to be depending on it for anything essential right now," said OpenAI CEO Sam Altman when the software was first launched on November 30. 

According to Nicola Morini Bianzino, global chief technology officer at EY, there's presently no killer use case for ChatGPT in the industry which will significantly affect both the top and bottom lines. They projected that there will be an explosion of experimentation over the next six to twelve months, particularly after businesses are able to develop over the top of ChatGPT utilizing OpenAI's API.

While OpenAI CEO Sam Altman has acknowledged that ChatGPT and other generative AI technologies face several challenges, ranging from possible ethical implications to accuracy problems.

According to Bianzino, this possibility for generative AI's future will have a big impact on enterprise software since companies would have to start considering novel ways to organize data inside an enterprise that surpasses conventional analytics tools. The ways people access and use information inside the company will alter as ChatGPT and comparable tools advance and become more capable of being trained on an enterprise's data in a secure manner.

As per Bianzino, the creation of text and documentation will also require training and alignment to the appropriate ontology of the particular organization, as well as containment, storage, and control inside the enterprise. He stated that business executives, including the CTO and CIO, must be aware of these trends because, unlike quantum computing, which may not even be realized for another 10 to 15 years, the actual potential of generative AI may be realized within the next six to twelve months.

Decentralized peer-to-peer technology mixed with blockchain and smart contracts capabilities overcome the traditional challenges of privacy, traceability, trust, and security. By doing this, data owners can share insights from data without having to relocate or otherwise give up ownership of it.



Singapore Increases its Investment in Quantum Computing, to Keep Ahead of Security Risks

 

Singapore aims to improve its quantum computing capabilities through new initiatives to build necessary skill sets and quantum equipment. It emphasises the importance of doing so in order to keep encryption technology resilient and capable of withstanding "brute force" attacks. 

The Singapore government announced on Tuesday that it will set aside SG$23.5 million (17.09 million) to support three national platforms under its Quantum Engineering Programme (QEP) for a period of up to 3.5 years. The scheme is a component of the country's Research, Innovation, and Enterprise 2020 (RIE2020) strategy. 

Two of these platforms were presented today, including the National Quantum Computing Hub, which will pool knowledge and resources from the Centre for Quantum Technologies (CQT), as well as local universities and research institutes, to strengthen key skill sets. 

Teams from CQT, the National University of Singapore, Nanyang Technological University, A*STAR's Institute of High Performance Computing (IHPC), and the National Supercomputing Centre (NSCC) would seek to establish international collaborations and train new talent in order to address a skills shortage in the emerging industry. CQT and IHPC researchers would also create quantum computing hardware and middleware, with potential applications in finance, supply chain, and chemistry. 

The National Supercomputing Center (NSCC) would offer the supercomputing capacity required to design and train algorithms for usage on quantum computers. A second initiative, National Quantum Fabless Foundry, was launched to facilitate the micro and nano-fabrication of quantum devices in cleanrooms run by industrial partners. 

The platform, which would be hosted at A*STAR's Institute of Materials Research and Engineering, would aid in the creation of products in quantum computations, communication, and sensing. Singapore's Deputy Prime Minister and Coordinating Minister for Economic Policies, Heng Swee Keat, stated in his address announcing the new efforts that the country needs to stay alert in the face of growing dangers. Heng compared cyber threats to a "cat and mouse game," saying that efforts were made to keep ahead of hostile actors who were always looking for new holes to attack. 

With the cyber world rapidly developing, he believes quantum technology has the potential to be a "game changer." "Strong encryption is key to the security of digital networks. The current encryption standard, AES 256, has held up, as few have the computing power to use brute force to break the encryption. But this could change with quantum computing," he cautioned. 

"For some cryptographic functions, the fastest quantum computer is more than 150 million times faster than the fastest supercomputer. Quantum computers can solve in minutes a problem which takes a supercomputer 10,000 years." 

This underscored the importance of quantum technology research, the minister said. "Our investment in quantum computing and quantum engineering is part of our approach of trying to anticipate the future and proactively shaping the future that we want." 

He said that as digitalisation increased, so did cyber concerns and that Singapore must continue to spend to keep ahead of possible threats. He went on to say that the fabless foundry will use the country's manufacturing skills to create quantum devices that would tackle "real-world difficulties" in collaboration with industry partners.

In the Future, Quantum Computing will Increase Cybersecurity Risks

 

While dealing with the immediate threat posed by hackers, US government officials are also planning for a longer-term threat: attackers who are collecting sensitive, encrypted material now in the hopes of being able to decrypt it later. Quantum computers, which work in a totally different way than the conventional computers we use, pose a threat. They use quantum bits instead of regular bits made up of 1s and 0s, which can represent multiple values at the same time.

Quantum computers' complexity could make them significantly faster at specific tasks, allowing them to solve issues that are currently hard for modern machines to handle, such as cracking many of the encryption schemes used to safeguard sensitive data including personal, trade, and state secrets. 

“For all the dramatic advances offered by quantum computing, it could create a huge threat to the security of our data,” Terry Halvorsen, IBM’s general manager for client and solutions development in the Federal and Public market. “It offers the powerful potential to break certain types of cryptography that safeguards many critical communications." 

Despite the fact that quantum computers are still in their infancy, are extremely expensive, and are riddled with issues, officials say attempts to protect the country from this long-term threat must begin immediately. 

“The threat of a nation-state adversary getting a large quantum computer and being able to access your information is real,” says Dustin Moody, a mathematician at the National Institute of Standards and Technology (NIST). “The threat is that they copy down your encrypted data and hold on to it until they have a quantum computer.” Faced with this "harvest now, decipher later" policy, officials are working to create and implement new encryption algorithms to protect secrets from a new breed of supercomputers. The Department of Homeland Security, for example, claims to be leading a long and challenging transition to post-quantum cryptography.

Quantum computers may be able to defeat asymmetric encryption systems based on integer factorization or discrete logarithms in a matter of seconds. Everyone, from financial services corporations to government organizations, is concerned about this. To protect electronic mortgage data, digital signatures may need to be secure for up to 30 years. 

Experts estimate that quantum computers will take a decade or more to achieve anything significant, but with money flowing into the field in both China and the United States, the race is on to make it happen—and to create better defenses against quantum attacks. According to Moody, who oversees NIST's research on post-quantum cryptography, the US has been sponsoring a contest through NIST since 2016 with the goal of producing the first quantum-computer-proof algorithms by 2024.

NSA Issues FAQs on Quantum Computing and Post-Quantum Cryptography

 

As concerns regarding quantum computing and post-quantum cryptography are overtaking the forefront of cryptographic discussions, especially in areas associated with national defense, the National Security Agency (NSA) has published a document comprising of the most frequently asked questions about Quantum Computing and Post-Quantum Cryptography, in which the agency studied the probable ramifications for national security in the event of the introduction of a "brave new world" far beyond the traditional computing domain. 

This 8-page report provides a summary of quantum computing, its connection with cryptography, the Commercial National Security Algorithm Suite, Commercial Solutions for Classified (CSfC), and the National Information Assurance Partnership (NIAP), as well as forthcoming techniques and cryptography. 

With the advancements the competition for quantum computing also heats up, with a slew of players vying for quantum dominance via diverse, eccentric scientific inquiry avenues, the NSA document examines the possible security risks raised by the establishment of a “Cryptographically Relevant Quantum Computer” (CRQC). 

"NSA does not know when or even if a quantum computer of sufficient size and power to exploit public key cryptography (a CRQC) will exist," it stated. 

A CRQC is the emergence of a quantum-based supercomputer strong and sophisticated enough to bypass conventional encryption techniques developed for classical computing. Whereas these strategies are practically uncrackable with existing or even prospective supercomputers, a quantum computer does not abide by the same rules given the nature of the beast, as well as the superposition, asserts readily accessible to its computing unit, the qubit. 

Considering that governments and labs are striving to develop crypto-busting quantum computers, the NSA stated it was developing “quantum-resistant public key” algorithms for private suppliers to the US government to employ, as part of its Post-Quantum Standardization Effort, which has been in operation since 2016. 

The world depends on public cryptography for strong encryption, such as TLS and SSL, which underpins the HTTPS protocol and help to safeguard user browsing data against third-party spying. 

Eric Trexler, VP of global governments at security shop Forcepoint, told The Register: "Progress on quantum computers has been steadily made over the past few years, and while they may not ever replace our standard, classical computing, they are very effective at solving certain problems. This includes public-key asymmetric cryptography, one of the two different types of cryptosystems in use today." 

Consequently, an agency such as the NSA, which guarantees the security of the United States' technological infrastructure, must cope up with both current and future risks - as one would assume, updating organizations as large as an entire country's key government systems requires an incredible amount of time. 

The NSA wrote, in theory, quantum computers can perform some mathematical calculations tenfold quicker than traditional computers. Quantum computers use “qubits” instead of regular bits, which react and interact as per the laws of quantum mechanics. This quantum-physics-based characteristic might allow a reasonably large quantum computer to do precise mathematical calculations that would have been impossible for any conventional computer to execute. 

According to the NSA, "New cryptography can take 20 years or more to be fully deployed to all National Security Systems (NSS)". And as the agency writes in its document, "(...) a CRQC would be capable of undermining the widely deployed public key algorithms used for asymmetric key exchanges and digital signatures. National Security Systems (NSS) — systems that carry classified or otherwise sensitive military or intelligence information — use public-key cryptography as a critical component to protect the confidentiality, integrity, and authenticity of national security information. Without effective mitigation, the impact of adversarial use of a quantum computer could be devastating to NSS and our nation, especially in cases where such information needs to be protected for many decades." 

In its document, the NSA rests the decision of which post-quantum cryptography would be deployed by the United States' national infrastructure solely on the shoulders of the National Institute of Standards and Technologies (NIST), which is "in the process of standardizing quantum-resistant public key in their Post-Quantum Standardization Effort, which started in 2016. This multi-year effort is analyzing a large variety of confidentiality and authentication algorithms for inclusion in future standards," the NSA says.