29 Oct 2021

Post-Quantum Cybersecurity: protecting our future

CyberHive explore the post-quantum era and the protection of data as part of techUK's Quantum Commercialisation week #QuantumUK

The promise of Quantum Computing is firmly on the horizon, advancements in development are already being reported with escalating momentum, and organisations large and small vying to deliver commercially viable quantum computing applications. 

The appetite for this ‘future’ technology is great and applications endless, however, where some see the potential for widening the field of discovery and positive transformation, others see the potential for misuse and self-serving gains.  A downside of quantum computing is its potential to break existing encryption standards - a game changer for cybercriminals and a headache for CISOs the world over. 

From symmetric (i.e. AES) to asymmetric encryption (i.e. RSA), there are several encryption techniques to choose from, depending on your business. All encrypted connections rely on both ends either knowing a shared key or being able to use a public/private keypair.   

For HTTPS encrypted connections there are two popular mechanisms for exchanging the session encryption key used to protect traffic - RSA and Diffie-Hellman. 

Public/private key encryption algorithms such as RSA have been in use for over four decades and form a foundation of internet security. The public key can be known to everyone and is used for encrypting, while the private key is needed to decrypt. Their strength is due to the fact that solving certain types of mathematical problem, such as Prime Factorization, have always proved intractable. 

Diffie-Hellman, also in use for over four decades, works differently by allowing each endpoint to agree on a pre-shared secret, a type of mathematical security known as the discrete logarithm problem, but the result is the same - a key that, in theory, can be used to encrypt data which can only be decrypted by the intended recipient. 

The erosion of this mathematical certainty began in 1994 when Peter Shor created a factorization algorithm used to show that quantum computers would be able to solve these types of hard problems. Shor's algorithm was first publicly demonstrated running on a functional quantum computer in 2001.  Following that, research into quantum computing has improved and expanded: 

2006 First 12-qubit quantum computer demonstrated by MIT 
2018 Google announced the production of a 72-qubit quantum chip 
2021 Harvard researchers revealed their 256-qubit quantum computer 
2021 Goldman Sachs invested in quantum technology with a goal of creating a several thousand qubit quantum computer in the next five years 
 
The current gold standard of cryptography today is, in essence, already outdated and today’s communication devices could be vulnerable. Worryingly, data traffic can be recorded today and stored, to be cracked later when more capable quantum computers are available. 

It’s a race against time to protect our data and to develop new post-quantum resistant encryption. The recommendation is not to wait until the technology is here, but to plan and level-up security provisions as soon as possible before they become obsolete. 

The evolution in algorithms is a good starting place but government security protocols and standards need to be ratified and implemented.  Both the NCSC (National Cyber Security Centre) and the NSA (National Security Agency) agree that the best mitigation against this threat is post-quantum cryptography. In fact, a NIST (National Institute of Standards and Technology) Post-Quantum Cryptography Standardization Project is in its final stages, with official standards expected to be announced shortly. 

CyberHive is developing solutions to help prepare for the post-quantum era by leading the development of quantum-resistant cryptographic solutions for hardware, software and applications across business and industrial verticals.  

 

Quantum Commercialisation Week

Click here to read more insights published during techUK's Quantum Commercialisation Week

Click Here

 

Laura Foster

Laura Foster

Programme Manager, Technology and Innovation, techUK

Laura is techUK’s Programme Manager for Technology and Innovation.

She supports the application and expansion of emerging technologies across business, including Geospatial Data, Quantum Computing, AR/VR/XR and Edge technologies.

Before joining techUK, Laura worked internationally in London, Singapore and across the United States as a conference researcher and producer covering enterprise adoption of emerging technologies. This included being part of the strategic team at London Tech Week.

Laura has a degree in History (BA Hons) from Durham University, focussing on regional social history. Outside of work she loves reading, travelling and supporting rugby team St. Helens, where she is from.

Email:
[email protected]
LinkedIn:
www.linkedin.com/in/lauraalicefoster

Read lessmore

Zoe Brockbank

Programme Coordinator, Policy, Tech and Innovation, techUK

Zoe is a Programme Assistant, supporting techUK's work across Policy, Technology and Innovation.

The team makes the tech case to government and policymakers in Westminster, Whitehall, Brussels and across the UK on the most pressing issues affecting this sector and supports the Technology and Innovation team in the application and expansion of emerging technologies across business, including Geospatial Data, Quantum Computing, AR/VR/XR and Edge technologies.

Before joining techUK, Zoe worked as a Business Development and Membership Coordinator at London First and prior to that Zoe worked in Partnerships at a number of Forex and CFD brokerage firms including Think Markets, ETX Capital and Central Markets.

Zoe has a degree (BA Hons) from the University of Westminster and in her spare time, Zoe enjoys travelling, painting, keeping fit and socialising with friends.

Email:
[email protected]
Phone:
020 7331 2174
Website:
www.techuk.org

Read lessmore

 

Related topics