Swapping Out Your Cryptographic Infrastructure: Complex, Costly, Herculean Effort
Informative piece if you have a limited understanding of how data is kept secure. Punctuates the need to get moving on your post-quantum data security plan. Because Quantum is Coming. Qubit
How to Protect Embedded Systems from the Quantum Apocalypse
+ Labeled as the ‘Quantum Cryptographic Apocalypse,’ this imminent point is the inevitable day when quantum computing renders existing de facto cryptographic techniques obsolete. Specifically, the RSA and ECC encryption algorithms that are fundamental to our modern security, communication and identification systems will be vulnerable to attacks from quantum computers.
The good news, however, is that it is not too late to avert this crisis. Efforts are currently underway to implement new, quantum safe crypto algorithms. The Quantum Cryptographic Apocalypse will require a complete retooling of PKI systems throughout all aspects of industry to use these new crypto algorithms. Doing so will keep our digital systems safe and functional.
+ Researchers like Michele Mosca, from the University of Waterloo, are predicting that the rate at which quantum computing is advancing will continue to accelerate and that we will get from 50 qubits today to 500 qubits, to 1,000 qubits, to 5,000 qubits, to 10,000 qubits, in a fairly linear progression.
+ And it is then, when we achieve 5,000 to 10,000 qubits, that current crypto algorithms will be broken.
+ Predictions on time vary, but most experts agree that quantum computers will break RSA encryption somewhere in the timeframe of 2026 to 2031.
+ For most systems, there is still time to develop solutions, but 2026 is extremely close. Six years to swap out our entire complex infrastructure is a Herculean task, especially since quantum-safe crypto algorithms will not be standardized for several more years.
Content may have been edited for style and clarity. The “+” to the left of paragraphs or other statements indicates quoted material from “Source:” document. Boldface title is original title from “Source:” Italicized statements are directly quoted from “Source:” document. Image sources are indicated as applicable.[DISPLAY_ULTIMATE_SOCIAL_ICONS]