March 15, 2018 By Walid Rjaibi 2 min read

Large-scale quantum computers are not here yet, but quantum computing is one of today’s hottest research fields in the technology world. IBM launched the IBM Q Experience prototype five-qubit machine in the cloud in 2016 and made it available for the world to use, learn from and explore. A year later, IBM added a second device with 16 qubits and announced it had successfully built and tested two new machines. One is a 20-qubit machine for clients, and the other is a prototype with 50 qubits, which will be the basis of future IBM Q systems.

With their vast increase in computing power, quantum computers promise to revolutionize many fields, including artificial intelligence (AI), medicine and space exploration. Quantum computing also holds the potential to bring significant advances to the world of cybersecurity.

Despite the expected benefits, however, much of today’s rhetoric focuses on the risks this technology could pose to widespread security practices, such as encryption. It’s likely that these risks are a decade or more away from being immediate threats, since large-scale quantum computers will not be available for commercial use for quite some time. However, it is important to understand what these risks are and why they exist — so we may begin considering ways to future-proof our systems.

Quantum Computing 101

Let’s begin by taking a look at how quantum computing works. Classical computers encode information in bits, which take the value of 1 or 0, while quantum computers are based on qubits. This technology adheres to two key principles of quantum physics: superposition, which means a qubit can represent both 1 and 0 simultaneously, and entanglement, which means the state of one qubit can be correlated with the state of another. These two principles enable quantum computers to solve complex problems that are beyond the capabilities of today’s computers.

Quantum Computing Versus Today’s Cryptography

Due to their ability to solve much more complex problems in far less time, large-scale quantum computers have the potential to severely impact cryptography. However, the degree of impact varies depending on the type of cryptographic algorithms used.

Asymmetric cryptographic algorithms, such as RSA and Diffie-Hellman, base their security on the fact that factoring large numbers and calculating discrete logarithms are tough mathematical problems. In fact, factoring a large number can take thousands of years — even with today’s most powerful computers. Unfortunately, this changes when running Shor’s algorithm, which can factor large numbers in days (or even hours), on a quantum computer.

Symmetric algorithms, such as Advanced Encryption Standard (AES), do not face the same existential threat as asymmetric algorithms, but the key sizes need to be doubled to provide the same level of protection. This is because Grover’s algorithm running on a quantum computer could provide a quadratic improvement in brute-force attacks on symmetric encryption algorithms.

What’s Next?

What can security professionals do in response to these risks? First and foremost, it is important to remember that the impact of quantum computing on cybersecurity will likely not be felt for many years. Right now, one important step is to understand the nature of these potential risks so that we can prepare to address them. There are also defensive measures being developed as we speak (e.g., post-quantum cryptography) and research being conducted to determine how quantum computing can be used to improve cybersecurity capabilities far beyond what is possible today.

The aforementioned risks are only part of the much larger story of quantum computing’s impact on the security world. The other side of the coin is its potential to revolutionize our capacity to safeguard business-critical and personal data.

More from Data Protection

3 Strategies to overcome data security challenges in 2024

3 min read - There are over 17 billion internet-connected devices in the world — and experts expect that number will surge to almost 30 billion by 2030.This rapidly growing digital ecosystem makes it increasingly challenging to protect people’s privacy. Attackers only need to be right once to seize databases of personally identifiable information (PII), including payment card information, addresses, phone numbers and Social Security numbers.In addition to the ever-present cybersecurity threats, data security teams must consider the growing list of data compliance laws…

How data residency impacts security and compliance

3 min read - Every piece of your organization’s data is stored in a physical location. Even data stored in a cloud environment lives in a physical location on the virtual server. However, the data may not be in the location you expect, especially if your company uses multiple cloud providers. The data you are trying to protect may be stored literally across the world from where you sit right now or even in multiple locations at the same time. And if you don’t…

From federation to fabric: IAM’s evolution

15 min read - In the modern day, we’ve come to expect that our various applications can share our identity information with one another. Most of our core systems federate seamlessly and bi-directionally. This means that you can quite easily register and log in to a given service with the user account from another service or even invert that process (technically possible, not always advisable). But what is the next step in our evolution towards greater interoperability between our applications, services and systems?Identity and…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today