Eskenzi PR ad banner Eskenzi PR ad banner
  • About Us
Monday, 16 May, 2022
IT Security Guru
Eskenzi PR banner
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2021
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2021
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
IT Security Guru
No Result
View All Result

White House warns of cryptography-cracking quantum computers

President Biden has signed a national security memorandum calling for stricter measures to mitigate risk from quantum computers

by Guru Writer
May 6, 2022
in Cyber Bites
keyboard keys
Share on FacebookShare on Twitter

President Joe Biden signed a national security memorandum (NSM) on Thursday calling for government agencies to implement measures to mitigate risks posed by guantum computers to US national cyber security.

The NSM highlights the dangers of cryptanalytically relevant quantum computers (CRQC), including their potential ability to brake public-key cryptography.

Immediate risks include:

  • Endangering civilian and military communications.
  • Undermining supervisory and control systems for critical infrastructure.
  • Defeating security protocols for the vast majority of Internet-based financial transactions.

Jamie Boote, software security consultant at Synopsys Software Integrity Group, explains why quantum computers pose such a threat:

“While it can take unrealistically long times for traditional computers to attack currently recommended encryption algorithms, quantum computers are expected to be able to break such encryption in trivial amounts of time. This means that when quantum computing leaves the lab, all currently encrypted data will be vulnerable to confidentiality breaches. This is another step on the march of progress. In my career, I have seen MD5 hashing go from recommended to obsolete due to advances in computing. The same is true for sha-1. I’ve also seen SSL 1-3 and several TLS versions become obsolete due to exploitable or potentially exploitable weaknesses which prevent their use in protecting sensitive data. Advances in quantum computing will do the same for everything out there now.”

The NSM has been welcomed by security experts, who believe it is a major step in the right direction for preparing the US from the threats that quantum computers pose.

Roger Grimes, data-driven defence evangelist at KnowBe4, notes why preparing for the threat of quantum computers is so important:

“While no one, at least publicly, knows when the threat of quantum computers will be realised, we all know that it is sooner rather than later. Most quantum experts put the eventuality of quantum computers breaking much of today’s cryptography at 10 years or less. I do not think anyone would be shocked if it happened in five years or less. Me, personally, I think we are talking only a few years. The question is if we and the rest of the world will be ready…and have quantum-resistant cryptography and systems in place before the quantum cryptographic break happens? Every single company in the world should right now be preparing to convert their systems to quantum-resistant protections. They need to start with taking an inventory of what important data is protected by what quantum cryptography and key sizes. Just that process alone will likely take most companies half a year to years to do right. They need to start NOW! And almost no company is doing anything. Most are not even aware of the coming problem at all. It is a problem. It is a growing problem as the clock continues to tick down to when the quantum threat becomes a realised problem. President Biden is taking a good step in declaring, “Get going!”. But how many people are listening and understanding?”

FacebookTweetLinkedIn
ShareTweetShare
Previous Post

South Korea joins NATO Cyber Defence Centre

Next Post

US government offers up to $15m for Conti info

Recent News

eu flag

EU announces provisional cybersecurity directive

May 16, 2022
man looking sad

Security pros say their mental health has declined

May 13, 2022
@ symbol

NCSC launches free email security check

May 12, 2022
warning colours

Five Eyes urges organisations to secure supply chains

May 12, 2022

The IT Security Guru offers a daily news digest of all the best breaking IT security news stories first thing in the morning! Rather than you having to trawl through all the news feeds to find out what’s cooking, you can quickly get everything you need from this site!

Our Address: 10 London Mews, London, W2 1HY

Follow Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2021
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

This site uses functional cookies and external scripts to improve your experience.

Privacy settings

Privacy Settings / PENDING

This site uses functional cookies and external scripts to improve your experience. Which cookies and scripts are used and how they impact your visit is specified on the left. You may change your settings at any time. Your choices will not impact your visit.

NOTE: These settings will only apply to the browser and device you are currently using.

GDPR Compliance

Powered by Cookie Information