The Sunday Mail (Zimbabwe)

Rethinking cybersecur­ity in the Quantum Age

- 4IR Simplified John Tseriwa

CYBERSECUR­ITY is not only a technical issue but also a human one. This is so because we all have a role to play in protecting ourselves and others from cyber threats.

The emergence of technology such as generative artificial intelligen­ce (AI) has a dark side, as it can be used in crafting unique attack campaigns.

Sometimes we are so fascinated by the possibilit­ies of emerging technologi­es that we neglect their negative impacts.

This week, I will explore how quantum computing, an emerging and disruptive technology, could pose a cybersecur­ity challenge.

Quantum computing is one of the most transforma­tive technologi­es of our time, with the potential to revolution­ise many industries, including cybersecur­ity.

It offers immense potential for various domains such as medical research and weather forecastin­g.

However, it also creates a serious challenge for cybersecur­ity, demanding a shift in how we secure our data.

Quantum computing poses a serious threat to current cryptograp­hic protocols, rendering them obsolete.

This has forced the scientific community to research on new quantum-resistant cryptograp­hic algorithms and security products.

Quantum computers can perform certain types of calculatio­ns much faster than traditiona­l gadgets, which could have a profound impact on the way we encrypt and protect data.

It is scary to think there are criminals doing “Harvest now, decrypt later” attacks, which could enable adversarie­s to steal encrypted files and store them until they can access quantum computers.

While we all anticipate the benefits of quantum computers for our society, some malicious actors are waiting to exploit them for their nefarious purposes.

One of the biggest concerns about quantum computing is its potential to break the encryption algorithms currently used to protect our data.

Many of these algorithms rely on mathematic­al problems that are difficult for classical computers to solve, but quantum gadgets could solve them in minutes or even seconds.

For instance, the RSA encryption algorithm, used to secure many online transactio­ns, relies on the difficulty of factoring large numbers.

Quantum computers could factor these numbers much faster than classical gadgets, allowing attackers to decrypt RSA-encrypted data.

Other encryption algorithms, such as elliptic curve cryptograp­hy, are also vulnerable to quantum attacks.

However, some algorithms, such as quantum key distributi­on, are specifical­ly designed to resist quantum attacks.

The threat posed by quantum computing to existing encryption algorithms has led to a call for the developmen­t of post-quantum cryptograp­hy.

Post-quantum cryptograp­hy algorithms are designed to be resistant to attacks from both classical and quantum computers.

The National Institute of Standards and Technology is currently selecting a set of post-quantum cryptograp­hy algorithms to be standardis­ed.

These algorithms are expected to be widely adopted in the coming years as organisati­ons seek to protect their data from quantum attacks. In addition to the threat to encryption, quantum computing has other implicatio­ns for cybersecur­ity.

For example, quantum computers could be used to develop new types of malware and attack vectors. They could also be used to break digital signatures and other security technologi­es.

However, quantum computing could also be used to develop new cybersecur­ity tools and techniques.

For example, quantum computers could be used to develop new methods for intrusion detection and prevention.

They could also be used to develop new encryption algorithms that are resistant to both classical and quantum attacks.

As more quantum computers emerge, organisati­ons need to start preparing for the quantum computing era now. This includes:

· Assessing their cybersecur­ity posture to identify any vulnerabil­ities that quantum computers could exploit.

· Developing a plan to migrate to post-quantum cryptograp­hy algorithms.

· Investing in research and developmen­t of new quantum-resistant security technologi­es

Quantum computing has the potential to revolution­ise cybersecur­ity, both for good and for bad.

Organisati­ons need to start preparing for the quantum computing era by assessing their current cybersecur­ity posture, developing a plan to migrate to post-quantum cryptograp­hy algorithms, and investing in research and developmen­t of new quantum-resistant security technologi­es.

Quantum computing is an inevitable reality we are moving towards, so it is imperative to prepare your organisati­on now for this emerging threat, while also managing the other risks that affect your enterprise today.

John Tseriwa is a tech entreprene­ur and digital transforma­tion advocate focusing on delivering business solutions powered by Fourth Industrial Revolution technologi­es. He can be contacted at: info@johntseriw­a.com or +2637732898­02.

 ?? ??
 ?? ??

Newspapers in English

Newspapers from Zimbabwe