{"id":35961,"date":"2023-08-10T14:22:01","date_gmt":"2023-08-10T13:22:01","guid":{"rendered":"https:\/\/www.innovationnewsnetwork.com\/?p=35961"},"modified":"2024-09-04T20:18:10","modified_gmt":"2024-09-04T19:18:10","slug":"preparing-for-the-rise-of-quantum-computing-in-identity-and-cybersecurity","status":"publish","type":"post","link":"https:\/\/www.innovationnewsnetwork.com\/preparing-for-the-rise-of-quantum-computing-in-identity-and-cybersecurity\/35961\/","title":{"rendered":"Preparing for the rise of quantum computing in identity and cybersecurity"},"content":{"rendered":"
Earlier this year, in his Spring Statement speech, the chancellor announced the UK Government\u2019s new National Quantum Strategy<\/a>, an ambitious ten-year strategy backed by \u00a32.5bn of public funding to support the rise of quantum computing in the UK.<\/p>\n This isn\u2019t the government\u2019s only commitment to quantum innovation. It has also created the Department for Science, Innovation and Technology (DSIT), which has a mission to support the country\u2019s ambition to be the most innovative economy in the world and a science and technology superpower<\/a>. Quantum technology is essential for this mission, not only as one of the five leading future technologies \u2013 quantum computing, AI, engineering biology, semiconductors, and future telecoms \u2013 but also because it will enable every other technology on the list to reach its full potential.<\/p>\n Quantum computing is still in its early stages of maturity, with some experts predicting it will take more than a decade for quantum computers to run fault-free. Nevertheless, organisations are starting to take quantum computing seriously; indeed, IBM alone has deployed more than 60 quantum computers, enabling Fortune 500 companies, start-ups, academic institutions and research labs to explore practical applications.<\/p>\n This new era of computing will be transformative<\/a> to many of these organisations. However, with every new technological advancement, it is vital that they also identify and mitigate all potential security risks.<\/p>\n Quantum computing is inherently different from traditional computing, using an entirely new approach to calculation, based on principles of fundamental physics, to solve extremely complex problems very quickly. This quantum speed is expected to boost productivity and reduce costs in scientific research, engineering, finance, logistics, and manufacturing sectors. At the same time, supply chains and transportation networks are also predicted to benefit.<\/p>\n But while the rise of quantum computing will pave the way to discoveries and innovations, it will likely generate many new security risks. It\u2019s hard to predict exactly what these threats will look like, as that will depend on how the technology develops. Nevertheless, organisations using or considering quantum must be cognisant of the potential threats and introduce new strategies to bolster their cyber defences.<\/p>\n The speed at which quantum computers can make calculations could shorten the time required to break encryption keys. This will risk sensitive data, including financial records, intellectual property or even state secrets. Worse still, if quantum computers can break most of the encryption methods commonly used today, they could lose trust in digital systems and services altogether.<\/p>\n Threat actors will likely utilise the rise of quantum computing to target systems like encryption and to launch more fine-grained attacks targeted at particular users or machines. This means identity-based security will be vital for organisations across all sectors.<\/p>\n With many identity systems relying on cryptographic techniques to protect data and authenticate users, the main challenge for identity solutions will be mitigating the risk posed by cryptographic vulnerabilities. As quantum computing gets more powerful, the likelihood of breaking the cryptographic methods will increase, compromising the security of identity systems.<\/p>\n Another great risk is the potential of quantum to dramatically improve biometric spoofing techniques, which could be used to bypass verification systems. Attackers could conceivably create synthetic biometric data that is indistinguishable from real people’s data, granting them access to protected systems and datasets.<\/p>\n While the rise of quantum computing is still in its early stages, and the associated risks are still to be defined, organisations should pay close attention to government and regulatory guidance.<\/p>\n Although there\u2019s no legislation currently in place, the UK\u2019s National\u00a0 Quantum Strategy states that the National Protective Security Agency (NPSA)<\/a> and the National Cyber Security Centre (NCSC)<\/a> will develop and introduce digital and physical security measures that protect assets and support growth.<\/p>\n Meanwhile, the National Institute of Standards and Technology (NIST) in the US started a process to standardise quantum-safe algorithms for key agreement and digital signatures in 2016 and has narrowed down a field of candidate algorithms, with draft standards expected in 2024.<\/p>\n According to NCSC<\/a>, this extended period allows for thorough public scrutiny of the various proposals, while some experts argue it provides more time to close some of the gaps in the NIST guidance. These gaps are related to:<\/p>\n These regulatory efforts are certainly vital for the future of developing technology. But organisations must take a holistic approach to quantum security when preparing for its arrival. This should include maintaining an updated information flow about the latest developments, security risk profiling of the organisation and taking a more proactive stance towards mitigating vulnerabilities.<\/p>\n Additionally, organisations are well advised to develop an encryption roadmap so they are ready to update their cryptographic protocols as necessary.\u00a0 These roadmaps typically include steps on how to:<\/p>\n With quantum computing technology still in development, it is the duty of security leaders to stay informed on the latest legislative guidance and key insights provided by experts in this field.<\/p>\n NCSC provides regular updates around quantum computing, including whitepapers and articles. At the same time, IBM, for example \u2013 which developed<\/a> three of the four algorithms currently standardised by NIST for quantum-safe encryption \u2013 is another valuable resource for news on the progress of quantum computing development. Technological progress takes time, so it will take time for the rise of quantum computing to reach its full potential.<\/p>\n However, it\u2019s never too early for organisations to start preparing for the risks and rewards of this transformative technology.<\/p>\n","protected":false},"excerpt":{"rendered":" Learn more about the steps governments and organisations are taking in anticipation of the rise of quantum computing.<\/p>\n","protected":false},"author":22,"featured_media":35962,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[24615],"tags":[530,793],"acf":[],"yoast_head":"\nAdvantages of the rise of quantum computing<\/h3>\n
Identity and security risks in the quantum realm<\/h3>\n
Preparing for the quantum future<\/h3>\n
\n
\n
For now, governments should take precautions<\/h3>\n