Cyberlink Security
  • home
  • services
  • about us
  • blog
  • get in touch
  • home
  • services
  • about us
  • blog
  • get in touch

Cyberlink Security

Solutions to make your life easier

Will quantum computers break today’s encryption?

hacker for cc

Short overview between classical computing and quantum computing.

Classical computers carry out logical operations using the definite position of a physical state. These are usually binary, meaning its operations are based on one of two positions. A single state – such as on or off, up or down, 1 or 0 – is called a bit.

Quantum computers perform calculations based on the probability of an object’s state before it is measured – instead of just 1s or 0s.

This means that quantum computers have the potential to process exponentially more data compared to classical computers.

bits

Quantum computers on cybersecurity.

In cybersecurity, quantum computers are depicted as the breakers of the current encryption running our world, making our data private, guarding it against prying eyes. Should we be afraid? The short answer is no, although the potential for quantum computers to break RSA 2048 (one of today’s most powerful and secure encryption forms) in as little as 8 hours is possible, for it to happen quantum computing technology would have to advance much more.
As it stands right now our state-of-the-art quantum computers can use 70 qubits, to reach the 8-hour cracking time researchers estimate that a 20 million-qubit quantum computer would be required.

NIST predicts that quantum computing regarding the cracking of RSA will take 15 years, while some researchers predict as little as 5 years.

So, should we be worried about the next 5 or 15 years? Thankfully the answer is also no, quantum technology is not exactly new, and a lot of theory is already available, as such security researchers have already developed what are called post-quantum codes that even a quantum computer would not be able to crack. So, it is already possible to safeguard data today against future attacks by quantum computers. But these encryption methods are not yet used as standard.

hacker

What about data previosly captured on traffic?.

In 5 or 15 years, whenever or if advanced quantum technology would be plentifully available to the public, there is a risk that data captured by a malicious actor, could then in the future be decrypted. For the average person, this is not worrisome, for example, data decrypted regarding credit card data would be worthless in the future, however for governments and entities that rely on secrecy this could arise to be a very big issue, as disclosure of classified data even if 5, 15 years old could be very impactful.

Conclusion.

Although quantum computing is relatively far away in order to disturb our present ecosystem in the digital world, measures and standards should be implemented in a timely manner(post-quantum codes) in order to safeguard future data.

By Andre Gomes

Related Articles

  • Cork University Hospital Cybersecurity
    Ransomware attack on Cork University Hospital computers
  • gdpr
    A look into GDPR and the late Easy Jet Breach

Recent Posts

  • Ransomware attack on Cork University Hospital computers
  • Will quantum computers break today’s encryption?
  • A look into GDPR and the late Easy Jet Breach
  • What am I protecting my cybers from? (part 2)
  • Are the browser wars over?
  • Why so many bitcoin scams? They are cheap, easy, and efficient to execute.
  • What does it take to build good pentest boxes to test cyber security skills?
  • What am I protecting my cybers from? (part 1)
  • What do I need to protect with cybersecurity?
  • Why are we seeing such high profile failures of cybersecurity?
  • What happens to my cybersecurity if I use cloud services to outsource my IT?
  • Who are my Cyber Stakeholders?
  • Why should my organisation have a cybersecurity strategy?
  • Is ISO27001 a good basis for your Cyber Security Strategy?
  • PECB United Kingdom has signed a partnership agreement with CyberLink
  • Four reasons why traditional information security fails in agile environments
  • Vulnerabilities to exploit a Chinese IP camera
  • Verizon issues their 2020 Mobile Security Index report
  • Why Traditional Information Security Fails
  • Why is Cyber Security Important?
We use cookies to ensure that we give you the best experience on our website. You can choose to accept or decline. OkNo Thank You