Mapping Out Strategies to Mitigate Quantum Risks
Govciooutlook

Mapping Out Strategies to Mitigate Quantum Risks

By Gov CIO Outlook | Monday, February 18, 2019

Cyber technologies can enhance productivity and enable existing enterprises to focus on new capabilities. This increased access to information and almost total dependence on cyber technology, however, involves unprecedented vulnerabilities from a variety of threats to cyber attacks. Cybersecurity tools prevent these vulnerabilities from undermining the value of cyber-technology. Organizations must ensure that the critical cyber systems and information assets are protected from the growing threat landscape, including the emerging quantum computing technology.

Quantum computers are based on quantum mechanics principles and are powerful machines. They take advantage of the complex laws of nature which are always present, but not always visible or which can't be calculated by conventional computers. Quantum computing can very easily and quickly process complex algorithms. It is easy to lead in materials and drug discovery, artificial intelligence and much more complex human-made systems to revolutionary break-through. It is so complex in its very nature that no classical computer can fully understand its molecular structure or features, and this is one of the many complicated tasks to be performed by a quantum computer.

The cyber defenses of today depend heavily on the need to unlock the cryptographic algorithms which protect data, computer networks, and other digital systems, including the most potent traditional supercomputers. Computers using quantum bits or qubits, however, promise to provide exponential processing power leaps that can break the best encryption today.   National Institute of Standards and Technology of the United States works to develop standards for cryptographic quantum-proof algorithms. The greatest challenge is to get them widely adopted. Academy experts say negotiating standards and convincing vendors to follow them. Then, organizations can upgrade their hardware and software for years. Old information will also need re-encryption or destruction.

Banks, hospitals, government agencies, utilities, and airlines must now consider achieving safety and encryption that resists a quantum attack. They should ensure that all data flows are protected by quantum-safe protection, which is the turning point in cybersecurity. The prospect of integrating high-speed quantum encryption into the existing internet framework for cybersecurity appears to be potentially positive and promising with the currently available tools in the market.

Weekly Brief

New Editions