TECHNOLOGY

Underestimated Risk: Quantum Computers Can Crack Encryption

Ongoing digitization, legal requirements such as the EU General Data Protection Regulation, or new internal processes – the plan of decision-makers and IT managers is extended. So it is more than understandable to relocate future topics such as quantum computing exactly there – into the future. But be careful: once the supercomputers are available to cybercriminals, it could be too late for some protective measures. Future-proof solutions, for example, offer options for post-quantum cryptography in the form of hardware security modules (HSM).

Experts estimate that quantum computers will be commercially available in the next five to fifteen years. First of all, that’s good news because the enormous computing power opens up completely new dimensions, such as handling big data, image analysis, or optimizing supply networks.

The downside, however, is that hackers and data spies will also abuse this potential for their purposes – for example, to crack complex encryption procedures and access encrypted data. It is particularly dangerous that this point in time could come before the mass use of quantum computers.

Because once cracked, an algorithm is no longer trustworthy and therefore worthless. Asymmetric cryptographic systems, so-called public-key systems, are primarily at risk. The shared encryption standard is used in countless applications, such as electronic door locking systems, smartphones, security cameras and sensors in building technology, smartwatches, smart meters, and intelligent entertainment electronics systems.

Sit Out? Just Don’t!

There is still no immediate danger for companies and public institutions. But it would be dangerous to put the topic at the bottom of the list of upcoming IT tasks. On the contrary: decision-makers and those responsible for IT security are well-advised to prepare for the age of quantum computers and post-quantum cryptography today.

One reason: the life cycle of systems and products such as machines, vehicles, or satellites is often ten years or more. As part of Industry 4.0 projects, these components are networked with one another and with IT systems and exchange data. Encryption protects such environments from attacks. However, when planning and purchasing encryption solutions such as hardware security modules, it is essential to ensure that they are still secure at the end of the life cycle of the systems and products.

That Makes A Sustainable Solution

Crypto experts recommend considering the following factors when choosing an encryption solution:

  • Updates should also work in the field, for example, by reloading firmware or scripts with new algorithms. In this way, new (post-quantum) encryption techniques can be implemented with reasonable effort; necessary certifications are retained.
  • The solution should support considerable vital lengths.
  • The computing power should be generous, as replacing hardware components for encryption is often tricky.

So the motto is to act. Companies of all sizes and from all industries have to deal with their risks and post-quantum cryptographic technologies. Only those who know their chances can minimize them with the solutions that are now available. Regardless of when quantum computers will be public – the right security strategy must be available at all times.

Tech Rushs

Tech Rushs is the place for next-level and talented Content writers, who want people to listen to them and admire the Trend.

Recent Posts

What If Artificial Intelligence Was The Solution To Performance Problems?

There is not an industrial sector or a company that is not being transformed today… Read More

3 months ago

How To Transform Your Store With RFID Technology

Although its logistics capabilities have been known for some time, RFID technology is now ready… Read More

5 months ago

ePrivacy Regulation And Cookies, The Importance Of The New Rules For The World Of Online Advertising

There is great expectation for the future reform of the ePrivacy directive, which concerns the… Read More

6 months ago

What Are The Steps To Doing Market Research?

How Many Steps Does Market Research Involve? The best technique for doing statistical surveying is… Read More

7 months ago

Digital Workplace: How To Meet New Challenges

On September 9 and 10, Silicon is organizing two days of web conferences to share… Read More

8 months ago

Maximizing Workplace Efficiency Through Integrated Security Solutions

Today's unpredictable business world presents serious security breaches and data theft threats as constant risks;… Read More

8 months ago