Emily Newton September 27, 2024

Collected at: https://datafloq.com/read/will-quantum-computers-outpace-our-ability-to-secure-data/

Numerous research and development programs have dedicated themselves to advancing quantum computing technology. As exciting as these advancements are, they are also troubling. Soon, threat actors will use this technology to crack cryptography or launch massive botnets. Will professionals be able to keep up?

What Makes Quantum Computing a Security Threat

Quantum computing is a security threat because of quantum parallelism – the ability to process a massive number of operations simultaneously. Unlike conventional machines, they can rapidly process, analyze or perform calculations on big data. Even modern hardware will soon seem slow in comparison.

Entanglement is a fundamental principle of quantum mechanics that makes quantum parallelism possible. It transfers information at approximately 3 trillion meters per second. Particles entangled on a quantum level are permanently interconnected regardless of their distance. If one changes states, so does the other.

Unlike their classical counterparts, these machines do not use bits. Instead, they use quantum bits – qubits – which can simultaneously exist as a one and a zero thanks to superposition. Units of information that exist in multiple states at once create novel computing possibilities.

Together, superposition and entanglement accelerate operations, enabling rapid processing of massive datasets. They make quantum technology uniquely capable of advanced problem-solving. In the wrong hands, unprecedented speed and technical complexity are dangerous.

Quantum Computing’s Effect on Data Center Security

As more organizations move to the cloud for scalability and ease of management, data center security becomes critical. Encryption has remained one of the leading defenses against cloud threats because it secures sensitive information without requiring a significant financial or labor investment. It also protects storage systems from third-party vulnerabilities.

Unfortunately, good things never last long in this field, and encryption has quickly become outdated. It is only a matter of time before quantum computers crack cryptography. Thanks to superposition and entanglement, these machines can solve the complex mathematical properties behind today’s leading encryption algorithms.

RSA – the most common encryption scheme – may soon be broken. According to one estimate, a classic computer would need approximately 300 trillion years to crack an RSA-2048-bit encryption key. A 4,099-qubit quantum computer could solve the same problem in 10 seconds, give or take.

Machines that size are theoretical but may not stay that way for long. The world’s leading engineers continuously find ways to innovate, increasing qubit quantity. Some have even discovered technical workarounds, enabling them to scale processing power rapidly.

Quantum hacking is another threat. Adversaries with unprecedented computational abilities will soon be able to launch massive botnets or run disproportionately powered artificial intelligence. They will have the upper hand with hardware countless times more advanced than a data center’s technology stack.

Why Decision-Makers Must Begin Preparing Now 

Many industry leaders are reluctant to invest in solutions today because quantum computing’s security risks seem like a distant problem. While most are aware outdated equipment increases their cyberattack risk, it may take them time to get used to the reality that classic computers will soon become legacy technology.

Just a few years ago, experts assumed quantum technology would not become commercially available within their lifetime. Now, many believe they will enter consumer markets in the next few decades. This might be an optimistic projection, but it is entirely possible. As exciting as this development may be, the risk that these machines will end up in the wrong hands is high.

Data storage security is fundamental to the field of big data, so decision-makers should begin preparations now. While investing in quantum-resistant technologies and policies may seem valueless now, it will pay off when these advanced machines become commercially viable

Realistically, only one well-funded threat group has to purchase a quantum computer for this technology to become a threat to information security. They would quickly generate demand for a cyberattack-as-a-service model, with adversaries paying top dollar for unparalleled computing power. It would create a positive feedback loop, funding operations, upkeep and repairs.

Will Companies Have Enough Time to Prepare?

Quantum computers may outpace professionals’ ability to secure data, as they can only do so much in the face of technological superiority. Besides, even though threat groups do not yet have these machines, many are engaging in “harvest now, decrypt later” schemes, prioritizing exfiltration for when they gain access to such technology.

Many post-quantum computing security solutions remain in the trial-and-error phase. For instance, the National Institute of Standards and Technology (NIST) revealed quantum-resistant cryptographic algorithms in 2022. By 2023, researchers had already cracked one.

One research group broke the CRYSTALS-Kyber algorithm for general encryption using side-channel attacks and artificial intelligence. The problem is NIST accepted semantic secrecy over perfect secrecy, meaning some information about the plaintext could be extracted from the ciphertext. Given enough effort, threat actors can crack it – it’s just a matter of time.

Currently, no one-way function in cryptography exists. While there are candidates, the reality is anything based in mathematics can be solved with mathematics. It becomes an issue of computing power, which is a problem when quantum technology is on the horizon.

Big Data Stands to Benefit From a Quantum Future

While the threat of exfiltration will increase exponentially with the emergence of commercially viable quantum computing, this technology may still benefit big data professionals. Aside from the fact that it can help them analyze or perform calculations on massive datasets with ease, it allows them to fight fire with fire, so to speak.

Currently, post-quantum computing security is focused on advancing cryptography. The next level is to use these machines against each other. They can be the first line of defense, protecting data centers and on-premises storage systems from well-equipped adversaries.

The concept of quantum data centers is relatively new, so it has yet to catch on. Twenty-seven percent of organizations are interested in the idea but have yet to take action. These buildings can last for decades, and quantum computers are inordinately expensive, so decision-makers do not consider them practical. However, they may be the next step in big information security.

Utilizing Quantum Computing as a Security Tool

The first step toward utilizing quantum computing as a security tool is reimagining data centers. After all, the potential return for deploying a one-story-tall machine for on-premises protection is not exactly high. However, server warehouses are loud and can get hot, and heat and noise affect qubits, causing high error rates.

Leveraging this technology to level the playing field begins with stabilizing and securing hardware. Fortunately, researchers are already developing devices to simplify deployment. For example, one group created a tool that converts heat into electrical voltage at temperatures near absolute zero.

Notably, given the resources needed to perform complex calculations and the scarcity of this advanced hardware, output is valuable. Threat actors will seek to gain unauthorized access. Professionals who use their computers to perform calculations or extract insights from big data must secure their findings and computational resources.

Securing Data Storage in a Post-Quantum World

With the threat of quantum computing looming, professionals should act quickly. Relying on solutions from reputable institutions like NIST should be considered the baseline. Enterprises working with proprietary information or particularly sensitive datasets should strongly consider developing defenses to prepare for a post-quantum world.

Leave a Reply

Your email address will not be published. Required fields are marked *

0 0 votes
Article Rating
Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments