Cybersecurity & Cryptography
Double-Encryption Mitigates Quantum Threat?
Quantum is coming. When is up for debate. If tomorrow a nation-state announced it had a quantum computer breaking encryption in mere minutes or seconds, would your data be secure? There are ways to mitigate the threat now, before it actually arrives. Crypto-agility is a relatively new term which implies the ability to rapidly change the encryption algorithm being used to encrypt data, be it the data is in motion or at rest. Double-encryption is another method. Employing post-quantum cryptographic algorithms is still, another.
A Big Concern: Ugly Threat from Quantum
Though the threats from quantum computing are being construed in many different ways, this quote sums up one of the greatest: “Hackers, with many of them supported by nation-states, are actively skimming and stealing encrypted data right now, even though it would take them thousands of years to crack it with current technology.” And they’re storing it so when it can be decrypted [hacked], it will be.
Going Practical. Personal Quantum Random Number Generator.
Spinoff technology from quantum computing research has produced what is hoped to be a game-changer in cryptographic key security. Quantum Base, a spinoff company from Lancaster University’s Quantum Technology Centre, believe they have solved the problem of true random number generation; made it scalable, and reduced its size such that it can fit in any tech device.
Fresh Reminder…A Quantum Computing Primer
Time to remind ourselves — or just learn — what quantum computing is about fundamentally.
Quantum Random Number Generation
In encryption, the one-time pad is known as the most secure method to maintain confidentiality of data — unbreakable with completely random numbers. Acting as the cryptographic key, random numbers must be truly random or the risk to the encrypted data becomes an issue.
Quantum Key Distribution Service for the U.S.
In a first for the United States, a private firm, Quantum Xchange, has launched a quantum key distribution service. Expected to serve the Northeast from D.C. to Boston, the network will be connecting Wall Street with financial operations in New Jersey. The network model is to provide quantum keys on demand; making QKD available to many economic sectors.
Encryption Is In Danger; What About Hashing?
“The goal of a good hash function is to make it extremely difficult for attackers to find ways of generating inputs that hash to the same value…” Quantum computing is certainly a veritable threat to encryption. But what about its sister cryptographic apparatus, the hash? Arguably as important as encryption, the hash provides vital services to verifying data integrity. How much of a threat is quantum computing to this function?
Cybersecurity and Quantum Key Distribution
The concept of Alice and Bob communicating is back in the spotlight with quantum key distribution added to it. This team from the University of York developed a process which involves displacing the data detectors – the point where information must be read – to a location separate from the sender and receiver. Doing so reduces probability of a hacker attacking the device. See the layperson’s article at ScienceDaily and the original study at the Cornell University Library site.
Finland Approves PQC-ready Device
Finland’s National Cyber Security Authority has approved a firewall and virtual private network appliance which claims compatibility for post-quantum cryptographic algorithms. The approval and considerations for cryptographic resilience in a quantum computer world lend strength to the growing international concern over quantum supremacy’s arrival. It’s just a matter of when…because quantum is coming.