News

Quantum Computing Will Speed Up Everything, Including Hacking

Reading Time: 3 minutes

As quantum computing becomes more available, hackers will be able to crack encryptions in seconds. How can we prepare for the future?

From VentureBeat. Hackers are waiting for the moment quantum computing breaks cryptography and enables the mass decryption of years of stolen information. In preparation, they are harvesting even more encrypted data than usual. Here is what businesses can do in response.

Post a prayer for your state!

Why are hackers harvesting encrypted data?

Most modern organizations encrypt multiple critical aspects of their operations. In fact, about eight in 10 businesses extensively or partially use enterprise-level encryption for databases, archives, internal networks and internet communications. After all, it is a cybersecurity best practice.

Alarmingly, cybersecurity experts are growing increasingly concerned that cybercriminals are stealing encrypted data and waiting for the right time to strike. …

The “harvest now, decrypt later” phenomenon in cyberattacks — where attackers steal encrypted information in the hopes they will eventually be able to decrypt it — is becoming common. As quantum computing technology develops, it will only grow more prevalent.

How ‘harvest now, decrypt later’ works

Quantum computers make the “harvest now, decrypt later” phenomenon possible. …

Whereas classical computers operate using binary digits — bits — that can either be a one or a zero, their quantum counterparts use quantum bits called qubits. Qubits can exist in two states simultaneously, thanks to superposition.

Since qubits may be a one and a zero, quantum computers’ processing speeds far outpace the competition. …

While a classical computer would take 300 trillion years or more to decrypt a 2,048-bit Rivest-Shamir-Adleman encryption, a quantum one could crack it in seconds, thanks to qubits. The catch is that this technology isn’t widely available — only places like research institutions and government labs can afford it.

That does not deter cybercriminals, as quantum computing technology could become accessible within a decade. In preparation, they use cyberattacks to steal encrypted data and plan to decrypt it later.

What types of data are hackers harvesting?

Hackers usually steal personally identifiable information like names, addresses, job titles and social security numbers because they enable identity theft. Account data — like company credit card numbers or bank account credentials — are also highly sought-after. …

What can enterprises do to protect themselves?

There are a few steps business leaders should take in preparation for quantum computing cracking cryptography.

1. Adopt post-quantum ciphers

The Cybersecurity and Infrastructure Security Agency (CISA) and the National Institute of Standards and Technology (NIST) soon plan to release post-quantum cryptographic standards. The agencies are leveraging the latest techniques to make ciphers quantum computers cannot crack. …

2. Enhance breach detection

Indicators of compromise — signs that show a network or system intrusion occurred — can help security professionals react to data breaches swiftly, potentially making data useless to the attackers. …

3. Use a quantum-safe VPN

A quantum-safe virtual private network (VPN) protects data in transit, preventing exfiltration and eavesdropping. One expert claims consumers should expect them soon, stating they are in the testing phase as of 2024. …

4. Move sensitive data

Decision-makers should ask themselves whether the information bad actors steal will still be relevant when it is decrypted. They should also consider the worst-case scenario to understand the risk level. From there, they can decide whether or not to move sensitive data.

One option is to transfer the data to a heavily guarded or constantly monitored paper-based filing system, preventing cyberattacks entirely. The more feasible solution is to store it on a local network not connected to the public internet, segmenting it with security and authorization controls. …

How is this article stirring you to pray? Share your prayers and scriptures in the comments below.

(Excerpt from VetureBeat. Photo Credit: U.S. Air Force AFRL by Keith C Lewis)

Previous ArticleNext Article