Ongoing digitization, legal requirements such as the EU General Data Protection Regulation, or new internal processes – the plan of decision-makers and IT managers is extended. So it is more than understandable to relocate future topics such as quantum computing exactly there – into the future. But be careful: once the supercomputers are available to cybercriminals, it could be too late for some protective measures. Future-proof solutions, for example, offer options for post-quantum cryptography in the form of hardware security modules (HSM).
Experts estimate that quantum computers will be commercially available in the next five to fifteen years. First of all, that’s good news because the enormous computing power opens up completely new dimensions, such as handling big data, image analysis, or optimizing supply networks.
The downside, however, is that hackers and data spies will also abuse this potential for their purposes – for example, to crack complex encryption procedures and access encrypted data. It is particularly dangerous that this point in time could come before the mass use of quantum computers.
Because once cracked, an algorithm is no longer trustworthy and therefore worthless. Asymmetric cryptographic systems, so-called public-key systems, are primarily at risk. The shared encryption standard is used in countless applications, such as electronic door locking systems, smartphones, security cameras and sensors in building technology, smartwatches, smart meters, and intelligent entertainment electronics systems.
There is still no immediate danger for companies and public institutions. But it would be dangerous to put the topic at the bottom of the list of upcoming IT tasks. On the contrary: decision-makers and those responsible for IT security are well-advised to prepare for the age of quantum computers and post-quantum cryptography today.
One reason: the life cycle of systems and products such as machines, vehicles, or satellites is often ten years or more. As part of Industry 4.0 projects, these components are networked with one another and with IT systems and exchange data. Encryption protects such environments from attacks. However, when planning and purchasing encryption solutions such as hardware security modules, it is essential to ensure that they are still secure at the end of the life cycle of the systems and products.
Crypto experts recommend considering the following factors when choosing an encryption solution:
So the motto is to act. Companies of all sizes and from all industries have to deal with their risks and post-quantum cryptographic technologies. Only those who know their chances can minimize them with the solutions that are now available. Regardless of when quantum computers will be public – the right security strategy must be available at all times.
There is not an industrial sector or a company that is not being transformed today… Read More
Although its logistics capabilities have been known for some time, RFID technology is now ready… Read More
There is great expectation for the future reform of the ePrivacy directive, which concerns the… Read More
How Many Steps Does Market Research Involve? The best technique for doing statistical surveying is… Read More
On September 9 and 10, Silicon is organizing two days of web conferences to share… Read More
Today's unpredictable business world presents serious security breaches and data theft threats as constant risks;… Read More