The Shorts | 10/26/21 | Cybersecurity and Cryptography in Quantum Computing

Einstein 1921 Portrait

The rate at which quantum computing is hitting the media stream is ever-increasing. This piece is a collection of articles and reports covering various aspects of quantum computing from the lens of cybersecurity and cryptography. Mea Cubitt

When it comes to quantum computers, security should come first for financial institutions | From ATMs to high-frequency trading and the current fintech wave, technological innovation in the financial services industry has always had to balance risks like fraud and theft against the new opportunities it brings like access to capital, greater margins and new customers. The coming wave of quantum computers promises more of the same, though on an even greater scale. Worryingly there is a widespread lack of awareness in financial services of the cybersecurity risks posed by quantum technologies.   Source: ITProPortal.   When it comes to quantum computers, security should come first for financial institutions…

RESEARCHERS DISCOVER NEW APPROACH TO SIMULATE COMPLEXITY OF QUANTUM CRYPTOGRAPHIC ATTACKS VIA CLASSICAL COMPUTERS | Quantum computers may still be in their early infancy, but there is already some concern that they could break several existing cryptographic algorithms. To address these concerns, researchers have been exploring the mechanics of how quantum cryptographic algorithms work in practice, with their studies likely to lead to more secure algorithms as a result of improvements in the field of quantum computing.  Source: Saudi Shopper.   RESEARCHERS DISCOVER NEW APPROACH TO SIMULATE COMPLEXITY OF QUANTUM CRYPTOGRAPHIC ATTACKS VIA CLASSICAL COMPUTERS…

Protecting Data | In a recent interview discussing last year’s massive SolarWinds hack of multiple government agencies and major corporations, Phil Abraham, a cybersecurity and technology expert from Northville, warned that America’s infrastructure, public and private, was wide open for foreign hackers.  Source: dbusiness.   Protecting Data…

How Will Japan’s Cybersecurity Posture Impact its Relations With China? | Japan’s relations with China are underpinned by a delicate balance of economic and national security interests. According to data from the Japan External Trade Organization, China is Japan’s largest trading partner, to which it exported more than $141 billion worth of goods in 2020, compared with $118 billion to the United States. Yet, as highlighted by Japan’s Ministry of Defense, China is also Japan’s most significant geopolitical challenge, a concern shared by the country’s new Prime Minister Kishida Fumio.  Source: THE DIPLOMAT.   How Will Japan’s Cybersecurity Posture Impact its Relations With China?

Doge Protocol, a Community-Driven Blockchain Project, Released Its Quantum Resistance Whitepaper | The whitepaper on Doge Protocol’s quantum resistance blockchain states the following: It highlights the fact that without a post-quantum cryptographic scheme, not only blockchains but also internet security protocols like TLS will be broken by quantum computers. This is because the underlying cryptographic schemes used in TLS currently are RSA or ECDSA, which are vulnerable to quantum computer attacks using Shor’s algorithm.  Source: PR.com.   Doge Protocol, a Community-Driven Blockchain Project, Released Its Quantum Resistance Whitepaper…

Castle Shield Holdings, LLC Announces Aeolus VPN Performance Test Results | Castle Shield Holdings, LLC releases test results for its Aeolus VPN Solutions. As stated in our October 11, 2021 press release, Aeolus VPN supports Post-Quantum Cryptography (PQC) for asymmetric key exchange including three selectable symmetric encryption ciphers for TCP and UDP on the Windows, Linux, and macOS platforms.  Source: Le Lezard.   Castle Shield Holdings, LLC Announces Aeolus VPN Performance Test Results…

Cybersecurity: Protecting your operational technology | Most companies are familiar and equipped with information technology (IT) security infrastructure, but for factories and companies that have on-premises devices, operational technology (OT) security infrastructure is often ignored.  Source: msn money.   Cybersecurity: Protecting your operational technology…

Could Advanced Quantum Computing Pose A Risk To Bitcoin Security? | Could Advanced Quantum Computing Pose A Risk To Bitcoin Security?  Source: Nasdaq.   Could Advanced Quantum Computing Pose A Risk To Bitcoin Security?

Colab Aims to Create a Secured Quantum Internet Using Quantum Key Distribution | Recently, the discussion of how researchers are addressing the challenges of developing a quantum internet has been floating around. Despite the benefits presented with the possibilities of creating a quantum internet, a challenge still resides in its security. However, one way to help surmount the security challenges in a quantum network is to use quantum cryptography to provide security for encrypted traffic.  Source: ALL ABOUT CIRCUITS.   Colab Aims to Create a Secured Quantum Internet Using Quantum Key Distribution…

ISARA, Carillon and Crypto4A Partnership enables a world first Canadian fully integrated Quantum-Safe Now PKI solution | Crypto4A Technologies Inc., ISARA Corp., and Carillon Information Security Inc. today announced their partnership agreement focused on providing organizations with a next generation Quantum Safe NowTM Public Key Infrastructure (PKI) solution.  Source: Daily Journal.   ISARA, Carillon and Crypto4A Partnership enables a world first Canadian fully integrated Quantum-Safe Now PKI solution…

Share this article ...

Our Mission

At The Qubit Report, our mission is to promote knowledge and opinion of quantum computing from the casual reader to the scientifically astute.  Because Quantum is Coming.

Einstein Stroll