Quantum Computing Has a Cybersecurity Problem. Here’s How Experts Are Solving It

Quantum Computing Has a Cybersecurity Problem. Here’s How Experts Are Solving It

By Nicole Deng, Sharon Mok, Laura Wong and Andrea Kam

Quantum computing is fascinating, but in the wrong hands, it can be a bane for cybersecurity. Is cryptography a potential solution? Read on.

In 2019, Google used its quantum computer, the Sycamore machine, to prove that quantum computers can solve a problem in mere minutes. Experts working on the quantum computer found that their system could execute a calculation in 200 seconds, whereas a standard computer would take 10,000 years to complete. What on earth is this powerful tool? 

It’s quantum computing, a field of study centered on developing computer technology based on the principles of quantum theory—the area of physics that explains how matter and energy behave at different atomic levels. Computers developed using this technology are created to solve problems that are too complex for traditional computers. 

As great as they sound, quantum computers do have their downsides. Here’s a look at some of the disadvantages and the corrective action being taken to address them. 

The downsides of quantum computing

Despite the efficiency that quantum computing brings, it creates loopholes in the encryption system, i.e., the process of converting readable data into incomprehensible texts to boost security. Quantum computers can easily breach this encryption. 

Alongside Shor’s algorithm, a quantum computing algorithm created by Peter Shor in 1994 that inspired the development of quantum computing, quantum computers can break the RSA encryption system. The RSA cryptosystem was introduced by Ron Rivest, Adi Shamir and Leonard Adleman in 1977 and is widely used to secure data transmission through authentication and encryption. In the wrong hands, quantum computing can threaten cybersecurity by hacking your data and maybe even leaking it. 

Quantum-resistant cryptography: a potential solution to cybersecurity threats from quantum computing

Fortunately, experts have come up with quantum-resistant cryptography that may counteract such risks. It can boost the security of digital information, which is why it is often referred to as “quantum-proof” or “quantum-safe”. Quantum-resistant algorithms encrypt and protect the data in a way that only the right person will have the ability to decrypt it. These encrypted data become unreadable to the general public, allowing you to upload them on the open internet safely.

For instance, post-quantum cryptography ensures safety for online interactions by preventing eavesdropping. The server will generate a set of qubits—the basic units of quantum information—that are arranged either horizontally or vertically, and users need to guess and formulate the code to decode the data. When an eavesdropper would like to decode the information, they would need to decode the message the same way as its owner because of quantum mechanics, which is simply impossible due to its complexity. 

Are we at all safe even with quantum-resistant cryptography? 

Right now, it is difficult to predict how quantum computing will change our world, as there are not a lot of common applications around. Still, quantum-resistant cryptography could be highly beneficial to tech giants’ businesses, such as Google and Facebook, which store millions of customer data. Plus, considering the recent cybersecurity breaches of crypto exchange Binance or Australian health insurance company Medibank, it is evident that cybercrime-resistant technology is the need of the hour.  

We are venturing into an entirely new realm of physics, giving rise to use cases that we have never even thought of. Considering how classical computers transformed our world with a relatively simple use of bits (data on a computer)—comprising two options of 0 or 1—you can imagine the extraordinary possibilities when you have the processing power of qubits that perform millions of calculations at the same moment. For sure, it would be nothing short of revolutionary. 

Also read:

Header Image by Freepik

SHARE THIS STORY

Share on facebook
Share on twitter
Share on linkedin
Share on email

RELATED POSTS

How AI Threatens Your Password Security

Unlocking the Dangers: How AI Threatens Your Password Security

You may have heard of artificial intelligence (AI) technology’s many cool capabilities, such as assisting doctors or predicting the weather. However, there is something not-so-cool we need to discuss: AI could make our passwords less safe, which is concerning.

What Does Gen-Z Want in a Career

What Does Gen-Z Want in a Career?

Most managers feel that Gen-Z is “difficult to work with”, entitled and easily offended. The prevalent notion is that this generation is prone to distraction, lacks tech skills and is deficient in productivity and motivation. They want to butt heads, have their say and not listen. Harsh, yes. These studies perhaps ignore that most of the Gen-Z workforce graduated and entered the workforce during COVID-19.

Beyond-Pink-and-Blue

Beyond Pink and Blue: The Movement Towards Gender-Inclusive Toys

Before gifting that pink kitchen set for a girl or the transformer for a boy, pause for a moment. Historically, the toy industry has thrived on perpetuating gender stereotypes. As the French essayist and critic, Roland Barthes, expressed, toys are essentially a “microcosm of the adult world”, reflecting societal views.