{"id":32578,"date":"2017-07-18T12:41:16","date_gmt":"2017-07-18T16:41:16","guid":{"rendered":"http:\/\/www.opensource.im\/uncategorized\/quantum-computing-could-make-todays-encryption-obsolete-data-center-knowledge.php"},"modified":"2017-07-18T12:41:16","modified_gmt":"2017-07-18T16:41:16","slug":"quantum-computing-could-make-todays-encryption-obsolete-data-center-knowledge","status":"publish","type":"post","link":"https:\/\/euvolution.com\/open-source-convergence\/encryption\/quantum-computing-could-make-todays-encryption-obsolete-data-center-knowledge.php","title":{"rendered":"Quantum Computing Could Make Today&#8217;s Encryption Obsolete &#8211; Data Center Knowledge"},"content":{"rendered":"<p><p>    This is the first post in our new regular series on data    center security. Scroll to the bottom of the article to learn    more about the column and its author.  <\/p>\n<p>    Researchers at top university and corporate    labs around the world are in a furious race to create the first    practical, usable quantum computer. Quantum computers  which    use quantum bits, or qubits  are capable of running    computations impossible for existing technology. It promises to    open up new possibilities in areas like medical research,    artificial intelligence, and security.  <\/p>\n<p>    Oh, and they would also easily crack current encryption    algorithms.  <\/p>\n<p>    How close are quantum computers to becoming reality? The point    at which quantum computers would surpass our current computers    in capability is at about 50 cubits.  <\/p>\n<p>    In March, IBM announced that it had a 20-qubit quantum    computer, and that outside researchers and developers could    already start running simulations on the IBM    Quantum Experience.  <\/p>\n<p>    In June, Google raised the ante. Alan Ho, an engineer from    Googles quantum AI lab, told a conference in Germany that    Google already had a 20-qubit system, and was planning to built    a     49-qubit computer by the end of the year.  <\/p>\n<p>    See also:Googles    Quantum Computing Push Opens New Front in Cloud Battle  <\/p>\n<p>    Quantum computers are now commercially available if you have a    lot of money, said Mike Stute, chief scientist at Masergy, a    networking, security and cloud communications technology    company headquartered in Plano, Texas.  <\/p>\n<p>    The problem is that dealing with qubits requires some tricky    engineering involving quantum physics. Plus, quantum computers    require built-in error correction to deal with the fact that    qubits are not as well-behaved as the traditional zero-or-one    bits of classical computing. These two challenges combine to    make the development of larger quantum computer a difficult    task.  <\/p>\n<p>    Meanwhile, its not enough to just surpass current computers.    In order to crack todays encryption, quantum computers have to    be a lot better than what we have today.  <\/p>\n<p>    That will take between 500 and 2,000 qubits, said Kevin Curran,    a senior member at IEEE and cybersecurity professor at Ulster    University.  <\/p>\n<p>    See also:One    Click and Voil, Your Entire Data Center is Encrypted  <\/p>\n<p>    So, run-of-the-mill hackers wont be breaking into banking    systems right away. Government agencies, however, may have    quantum computing technology a generation or two ahead of    whats commercially available, said Masergys Stute.  <\/p>\n<p>    That means companies protecting data of interest to China,    Russia, or the NSA might need to be particularly careful.  <\/p>\n<p>    Current encryption is based on the idea that there are some    mathematical problems that are really hard for computers to    solve.  <\/p>\n<p>    For example, public-key encryption  where one key is used to    encrypt the data, and a different key to unlock it  typically    relies on just those kinds of problems.  <\/p>\n<p>    When quantum computing becomes a reality, then many public-key    algorithms will be obsolete, said Curran.  <\/p>\n<p>    Symmetric encryption, where the same key is used to both    encrypt and decrypt the data, is more robust and will last    longer.  <\/p>\n<p>    Companies that have data they want to protect may want to start    planning ahead to make more use of symmetric encryption, as    well as switch to longer keys.  <\/p>\n<p>    In addition, researchers are already working on new,    quantum-proof encryption methods and will start testing them as    soon as quantum computers become more widely available.  <\/p>\n<p>    For companies that depend on having good encryption in place    the most important thing is not to hard-wire encryption systems    into their applications.  <\/p>\n<p>    Instead, they need to adopt a modular approach, so that they    can easily replace old, obsolete algorithms with new, effective    ones. With some advanced planning, thats not hard to do.  <\/p>\n<p>    Cyberattacks with wide-reaching consequences are now    commonplace. Last months attack on FedExs TNT Express will    hurt its quarterly results. The same month, thousands of    members of the British Parliament and their staff lost access    to email as a precautionary measure taken to limit the damage    from a massive cyberattack on the legislative body. If your job    has anything to do with your organizations data centers,    cybersecurity is becoming a bigger and bigger part of it, which    is why were introducing a new column focused exclusively on    data center security.  <\/p>\n<p>    Its a great pleasure to introduce Maria Korolov, who will    author the column. She is a Massachusetts-based technology    journalist who writes about cybersecurity and virtual reality.  <\/p>\n<p>    During her 20 years of experience covering financial technology    and cybersecurity she wrote for Computerworld, was a columnist    for Securities Industry News, ran a business news bureau in    China, and founded a publication covering virtual reality. She    has reported for the Chicago Tribune, Reuters, UPI, and the    Associated Press.  <\/p>\n<p>    Before switching to business and technology journalism, she was    a war correspondent in the republics of the former Soviet Union    and has reported from Chechnya, Afghanistan, and other war    zones.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>See more here:<br \/>\n<a target=\"_blank\" href=\"http:\/\/www.datacenterknowledge.com\/archives\/2017\/07\/18\/quantum-computing-could-make-todays-encryption-obsolete\/\" title=\"Quantum Computing Could Make Today's Encryption Obsolete - Data Center Knowledge\">Quantum Computing Could Make Today's Encryption Obsolete - Data Center Knowledge<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> This is the first post in our new regular series on data center security. Scroll to the bottom of the article to learn more about the column and its author. Researchers at top university and corporate labs around the world are in a furious race to create the first practical, usable quantum computer. <\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[45],"tags":[],"class_list":["post-32578","post","type-post","status-publish","format-standard","hentry","category-encryption"],"_links":{"self":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/32578"}],"collection":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/comments?post=32578"}],"version-history":[{"count":0,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/32578\/revisions"}],"wp:attachment":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/media?parent=32578"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/categories?post=32578"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/tags?post=32578"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}