Going to take a quick detour from my planned post to discuss a question one of my friends brought up (yes, mom I do have REAL friends!). So, the other day I saw this: https://lnkd.in/dNB7VCMk There is a lot to unpack there with quantum computing and the like, which we will cover in future posts. The big takeaway to everyone from this though should be that if and when quantum computers are ready, we will need new algorithms that protect our data. If you are like me, you may say “algorithms, what is this, algebra class? What do algorithms have to do with cybersecurity?” First off, this starts with encryption. Think of encryption as scrambling. I send you a message that says “I love you” but I encrypt it so it says “skjhdsajh.” When you receive my message, you will need to know how I encrypted it so you can decrypt it and read it. Hopefully you send back “I love you too,” but it’s ok if you don’t, I’ll just cry about it in my room. The reason we encrypt is so that only the sender and receiver get the message. If anyone else were to listen, they would just see the jumble and not “I love you.” (I wouldn’t want anyone else getting jealous). Now, if I know that my message is just meant for you and I know everything about you, we can make the encryption easy and just agree on our methods (such as keys, ciphers, etc) offline. But let’s say I am a website. I don’t know who is going to be wanting to access my content or how they will access it. So in this case, we need a common, but secure, algorithm that encrypts the data as well as ensures that the website you are talking to is who they say they are. That is where algorithms like RSA and AES come in. With current technology (pre-quantum), these algorithms are very secure and will take a long time to be broken. What the above article is saying is that with quantum, they could be broken. The good news is, there is quantum-ready encryption algorithms already being implemented. The point of the above article is to push companies into using that those algorithms. This will be good and make the internet more secure even if the promise of quantum is not achieved. We’ll dive deeper into a lot of this in other posts, but I do recommend this series from The Art of the Problem to learn more about cryptography: https://lnkd.in/djkS_YHA Feel free to send me any questions you have on this. In the meantime, have a great night and I will talk to you tomorrow. #QuantumComputing #CyberSecurity #Encryption #RSAencryption #AESencryption #QuantumResistance #DataProtection #Cryptography #TechInnovation #DigitalSecurity
Justin Melloni’s Post
More Relevant Posts
-
🚨 The Death of Encryption? Quantum Computing’s Threat to Cybersecurity 🚨 Quantum computing isn’t just the future—it’s here. But what happens when this revolutionary technology can break the encryption protecting your data, bank accounts, and secrets? In my latest blog, I explore: 🔐 How quantum computers threaten today’s encryption ⚡ The groundbreaking Willow chip and its implications 🛡️ What we can do to prepare for the quantum future 💡 Don’t wait for the future to catch up with you. Read it now:👉 https://lnkd.in/eSB24pKA Let’s talk! What do you think about quantum computing and cybersecurity? Leave a comment and share your thoughts. 📩 Don’t forget to subscribe for more deep dives into cybersecurity and AI. #Cybersecurity #QuantumComputing #Encryption #TechFuture
To view or add a comment, sign in
-
Heading into 2025 we are moving further into the digital age and #quantum computing is expected to revolutionise industries, but its arrival is sparking significant concern in #cybersecurity circles. While its ability to process complex computations at unprecedented speeds offers exciting potential, quantum computing also delivers a seismic challenge to the way we secure digital information. While #quantumcomputing is still in its infancy, its development is accelerating. Businesses must take a proactive approach to prepare for a post-quantum world: ✅ Assess Current Cryptographic Systems: Conduct a comprehensive audit of existing encryption protocols to identify vulnerabilities. ✅ Adopt Post-Quantum Standards: Begin transitioning to #NIST-recommended algorithms to ensure long-term security. ✅ Invest in Quantum Research: Partner with cybersecurity firms specialising in quantum-safe technologies to stay ahead of the curve. ✅ Educate Teams: Train IT and security personnel on quantum computing’s potential impact and how to mitigate #cyberrisks. https://lnkd.in/d-bEmHvN #sccybersecurity #sccssummit #ciso #tprm #supplychainsecurity #cyberresilience #infosec #riskassessment #riskmanagement #AI
Quantum computing: The next cybersecurity frontier
businesscloud.co.uk
To view or add a comment, sign in
-
🔐 Key Cybersecurity Trends & NIST Updates for 2025 As we head into 2025, the cybersecurity landscape is evolving rapidly. Here are the top trends and standards to watch: 1️⃣ Cybersecurity Mesh Architecture: Flexible, decentralized security frameworks enhance adaptability across complex systems. 2️⃣ AI & Machine Learning: Smarter tools for faster threat detection and proactive defenses. 3️⃣ Zero Trust: The "never trust, always verify" model is now essential for securing all users and devices. 4️⃣ Post-Quantum Cryptography: Preparing for the quantum era with encryption that resists quantum attacks. 5️⃣ Stricter Ransomware Regulation: Global policies, like the EU’s NIS2 Directive, demand rapid breach reporting and tough penalties. NIST Updates: 🔑 Post-Quantum Encryption Standards: Released to protect against future quantum hacking. 🛡️ Cybersecurity Framework 2.0: Designed to simplify risk management for organizations of all sizes. 💡 Read more: https://lnkd.in/eRyhN9ut https://lnkd.in/eUu2Rnrg https://lnkd.in/e6zBqw8E. How is your organization preparing for these changes? Let’s discuss! 👇 #CyberSecurity #NIST #DigitalTransformation
Why experts are warning businesses to prepare for quantum now – or face critical cyber risks when it arrives
itpro.com
To view or add a comment, sign in
-
𝗣𝗿𝗲𝗽𝗮𝗿𝗶𝗻𝗴 𝗳𝗼𝗿 𝘁𝗵𝗲 𝗤𝘂𝗮𝗻𝘁𝘂𝗺 𝗘𝗿𝗮 – 𝗪𝗵𝗮𝘁 𝗜’𝘃𝗲 𝗟𝗲𝗮𝗿𝗻𝗲𝗱 𝗔𝗯𝗼𝘂𝘁 𝗗𝗮𝘁𝗮 𝗦𝗲𝗰𝘂𝗿𝗶𝘁𝘆 Recently, I’ve been diving deep into the fascinating yet concerning topic of quantum computing and its implications for cybersecurity. Here’s a summary of what I’ve learned, along with how governments and organizations are responding to this emerging challenge. 𝗧𝗵𝗲 𝗤𝘂𝗮𝗻𝘁𝘂𝗺 𝗧𝗵𝗿𝗲𝗮𝘁: "𝗦𝘁𝗼𝗿𝗲 𝗡𝗼𝘄, 𝗗𝗲𝗰𝗿𝘆𝗽𝘁 𝗟𝗮𝘁𝗲𝗿" Quantum computers, while still in their early stages, promise unprecedented computational power. One of their most alarming capabilities is the potential to break modern encryption methods like RSA and ECC, which secure much of our online data. 𝗧𝗵𝗲 𝗰𝗼𝗻𝗰𝗲𝗽𝘁 𝗼𝗳 "𝘀𝘁𝗼𝗿𝗲 𝗻𝗼𝘄, 𝗱𝗲𝗰𝗿𝘆𝗽𝘁 𝗹𝗮𝘁𝗲𝗿" 𝗵𝗶𝗴𝗵𝗹𝗶𝗴𝗵𝘁𝘀 𝘁𝗵𝗶𝘀 𝗿𝗶𝘀𝗸: - Attackers intercept encrypted data today, storing it for future use. - Once quantum computers become powerful enough, they could decrypt that stored data, exposing sensitive information—even years after it was captured. - This means that data we assume is secure now may become vulnerable in the quantum future. 𝗧𝗵𝗲 𝗨𝗦 𝗤𝘂𝗮𝗻𝘁𝘂𝗺 𝗖𝗼𝗺𝗽𝘂𝘁𝗶𝗻𝗴 𝗖𝘆𝗯𝗲𝗿𝘀𝗲𝗰𝘂𝗿𝗶𝘁𝘆 𝗣𝗿𝗲𝗽𝗮𝗿𝗲𝗱𝗻𝗲𝘀𝘀 𝗔𝗰𝘁 Governments are taking this threat seriously. For example, the Quantum Computing Cybersecurity Preparedness Act, passed in the U.S. in December 2022, mandates federal agencies to: - Identify systems that rely on vulnerable cryptographic methods. - Transition to quantum-resistant encryption standards developed by organizations like NIST. - NIST has already selected promising algorithms, such as CRYSTALS-Kyber and CRYSTALS-Dilithium, as the foundation for future quantum-resistant systems. 𝗪𝗵𝗮𝘁 𝗧𝗵𝗶𝘀 𝗠𝗲𝗮𝗻𝘀 𝗳𝗼𝗿 𝗨𝘀? - The transition to quantum-safe cryptography isn’t just for governments or large organizations; it’s a call to action for anyone involved in IT, cybersecurity, or handling sensitive data. - Start preparing today by understanding which systems and data could be at risk. - Stay informed about post-quantum cryptography (PQC) developments to future-proof your security strategies. 𝗠𝘆 𝗞𝗲𝘆 𝗧𝗮𝗸𝗲𝗮𝘄𝗮𝘆𝘀 Learning about this topic has been eye-opening. As someone exploring the cybersecurity field, I see the quantum challenge as both a technical and strategic issue. The journey has deepened my understanding of encryption, quantum computing, and the importance of proactive measures to protect our digital world. I believe this learning aligns with our goals to help secure digital environments and contribute to long-term cybersecurity solutions. What are your thoughts on the quantum computing challenge? Are you preparing for this shift in your field? Let’s discuss in the comments! #QuantumComputing #Cybersecurity #PostQuantumCryptography #LearningJourney
To view or add a comment, sign in
-
🚨 Quantum Threat Alert: Is Your Data Safe? 🔐 The quantum revolution is here, and it's not just about technological breakthroughs. It's about safeguarding our digital future! Did you know? • Quantum computers could break current encryption in hours • Critical infrastructure and sensitive data are at risk • The time to prepare is now, not when quantum computers arrive Don't wait for the quantum apocalypse. Act now to secure your future! 💪 #QuantumSecurity #Cybersecurity #FutureProof #TechInnovation
Managing the Quantum Cybersecurity Threat
deloitte.com
To view or add a comment, sign in
-
The message couldn't be clearer and right from the top - the World Economic Forum. All cybersecurity professionals and boards need to start tuning in and taking action on the quantum safe transition from NOW... "NIST urges cybersecurity firms to adopt the encryption standards IMMEDIATELY, as quantum computing poses SIGNIFICANT CYBERSECURITY RISKS that could render current encryption tools obsolete. The rise of quantum computing has created a need for post-quantum cybersecurity mechanisms, particularly in industries like finance." https://lnkd.in/gQ8-VC3j
US unveils new tools to withstand encryption-breaking quantum
weforum.org
To view or add a comment, sign in
-
Well, It Finally Happened: Quantum Computers Are Cracking Classical Encryption—And Cybersecurity Will Never Be the Same For years, experts have warned that quantum computing will eventually break through our most trusted encryption systems. That day has come. Researchers from Shanghai University have demonstrated how D-Wave's quantum annealing systems can successfully break classical encryption. This isn't science fiction—it's real and happening now. The research team has already factored in a 22-bit RSA integer and cracked algorithms like AES, which are the foundation of global encryption standards. The implications are staggering: this is the first time a quantum computer has posed a genuine threat to multiple encryption systems still in widespread use today. Why Does This Matter for Cybersecurity? Encryption forms the bedrock of data security in nearly every industry. Classical encryption protects trillions of dollars worth of data from online banking to government communications. If quantum machines can break these encryption systems, the very foundation of cybersecurity will be at risk. Experts like Prabhjyot Kaur warn that this breakthrough signals an urgent need to develop quantum-safe cryptographic solutions. The danger is twofold: future quantum computers can crack current encryption, and hackers may already be stockpiling encrypted data, waiting for quantum tech to mature to decrypt it. The Growing Threat: What's Next? The race to prepare for the quantum era has intensified. According to the U.S. National Institute of Standards and Technology (NIST), transitioning to quantum-resistant encryption algorithms could take years, and the clock is ticking. Forbes recently reported that the White House has launched the National Quantum Initiative to accelerate post-quantum encryption efforts as industries grapple with the risk of quantum hacks. If organizations don't start adapting now, they could be blindsided by quantum technology's growing capabilities. Companies like IBM and Google are already pushing the envelope with quantum advancements, and Gartner predicts that 20% of global organizations will be budgeting for post-quantum cryptography by 2025. Cybersecurity as We Know It Will Never Be the Same This breakthrough shows that the future of data privacy has fundamentally shifted. As quantum computing advances, the legacy encryption methods we've relied on for decades will no longer be enough. Businesses, governments, and individuals alike must act now. Developing and implementing quantum-safe solutions isn't just a recommendation—it's a necessity. The clock is ticking. #QuantumComputing #Encryption #Cybersecurity #DataPrivacy #QuantumThreats #PostQuantum #TechBreakthroughs #DWave #Doomsday
To view or add a comment, sign in
-
🔑 Is quantum computing the end of internet security? Here's why you shouldn't panic—and how to stay quantum-safe.⚛️ I'm a former USAF cryptographer and massive quantum computing/cryptography nerd, & I’ve seen the panic over Google’s Willow supercomputer and headlines warning of encryption’s collapse. It’s easy to feel like your data is at risk—but here’s the truth: quantum computers are not internet destroyers. With smart strategies, we can stay ahead. Let's cut through the hype, break down the risks, and show you how to quantum-proof your cybersecurity with confidence.👇 Why This Matters: Quantum computers exploit unique principles like superposition and entanglement, solving problems exponentially faster than classical computers. This poses a risk to widely-used cryptographic systems protecting HTTPS, VPNs, and digital signatures. However, post-quantum cryptography—led by NIST standards—is ready to combat these risks. What Should You Do? 🔍 Inventory Your Systems: Identify where cryptography is used and assess data sensitivity. 🛠️ Adopt Crypto-Agility: Ensure systems can transition to new cryptographic standards without major overhauls. 🔒 Strengthen Encryption: Upgrade to AES-256 for now, as it’s robust against quantum attacks. 📜 Follow NIST Standards: Implement quantum-resistant algorithms like CRYSTALS-Kyber (FIPS 203) CRYSTALS Dilithium (FIPS 204), and SPHINCS+ (FIPS 205) as they become available. 🛡️ Integrate Zero Trust: Limit attackers’ movements with segmentation, continuous authentication, and least-privilege access. The Bottom Line: Quantum threats are serious but manageable. By preparing now—understanding risks, transitioning to post-quantum cryptography aka PQC , and embracing Zero Trust—you’ll future-proof your security. Need help navigating quantum security? Let’s connect and strategize your post-quantum transition.
To view or add a comment, sign in
-
Is Quantum Computing a Threat or an Opportunity for Cybersecurity? https://lnkd.in/efx2pT2a. - I was reading this article that was published by KPMG. Quantum computers promise breakthroughs but also threaten current encryption standards. Pro: Investing in quantum-resistant cryptography today can secure tomorrow’s data. Con: Quantum computing is years away from mainstream use—should we focus on immediate threats instead? Do you believe the industry is ready for the quantum revolution? #QuantumComputing #Cryptography #CyberSecurity
Quantum is coming — and bringing new cybersecurity threats with it
kpmg.com
To view or add a comment, sign in
-
🚨 Quantum Computing: The Next Big Threat to Encryption? 🚨 Chinese researchers have claimed a breakthrough in using D-Wave’s quantum annealing systems to attack classical encryption, particularly SPN-based algorithms like AES, Present, and Gift-64. This raises significant concerns about the future of data protection, as quantum computing edges closer to breaking modern encryption standards. 🔓 While predictions vary on when this might happen, the urgency to develop quantum-safe encryption is clear. Companies and cybersecurity professionals must stay ahead of this evolving threat. #QuantumComputing #CyberSecurity #Encryption #DataProtection #QuantumThreat #InfoSec #CyberAwareness #EncryptionBreaking #QuantumSafe #HostBreach https://lnkd.in/eD2F69v8
Chinese researchers claim quantum encryption attack
theregister.com
To view or add a comment, sign in