www.welivesecurity.com
Open in
urlscan Pro
2a02:26f0:3500:12::1730:1797
Public Scan
Submitted URL: https://app.security.eset.com/e/er?utm_campaign=UK_B2B_Enterprise-AQ_Newsletter-12-2023&utm_medium=email&utm_source=Eloqua&s=1...
Effective URL: https://www.welivesecurity.com/en/cybersecurity/quantum-computing-will-it-break-crypto-security-within-a-few-years/?utm_campaig...
Submission: On December 05 via manual from GB — Scanned from NL
Effective URL: https://www.welivesecurity.com/en/cybersecurity/quantum-computing-will-it-break-crypto-security-within-a-few-years/?utm_campaig...
Submission: On December 05 via manual from GB — Scanned from NL
Form analysis
3 forms found in the DOMGET https://www.welivesecurity.com/en/search
<form data-v-ed6a42ae="" id="searchform" method="get" action="https://www.welivesecurity.com/en/search" autocomplete="off" role="search">
<div data-v-ed6a42ae="" class="search-area"><input data-v-ed6a42ae="" name="term" class="searchbar-input form-control" type="text"
placeholder="Search WeLiveSecurity"><a data-v-ed6a42ae="" class="search-icon-trigger"><span data-v-ed6a42ae="" class="search-icon"></span></a><!----><!----></div><!---->
</form>
GET https://www.welivesecurity.com/en/search
<form data-v-ed6a42ae="" id="searchform" method="get" action="https://www.welivesecurity.com/en/search" autocomplete="off" role="search">
<div data-v-ed6a42ae="" class="search-area"><input data-v-ed6a42ae="" name="term" class="searchbar-input form-control" type="text"
placeholder="Search WeLiveSecurity"><a data-v-ed6a42ae="" class="search-icon-trigger"><span data-v-ed6a42ae="" class="search-icon"></span></a><!----><!----></div><!---->
</form>
POST https://enjoy.eset.com/pub/rf
<form action="https://enjoy.eset.com/pub/rf" class="basic-searchform col-md-12 col-sm-12 col-xs-12 no-padding newsletter px-0" target="_blank" method="post" role="search">
<div class="search-input clearfix">
<input type="text" name="EMAIL_ADDRESS_" value="" placeholder="Your Email Address" required="">
<input type="checkbox" id="TOPIC" name="TOPIC" value="We Live Security Ukraine Newsletter">
<label for="TOPIC">Ukraine Crisis newsletter</label>
<input type="checkbox" id="NEWSLETTER" name="NEWSLETTER" value="We Live Security">
<label for="NEWSLETTER">Regular weekly newsletter</label>
<input type="hidden" name="_ri_" value="X0Gzc2X%3DAQpglLjHJlTQGgXv4jDGEK4KW2uhw0qgUzfwuivmOJOPCgzgo9vsI3VwjpnpgHlpgneHmgJoXX0Gzc2X%3DAQpglLjHJlTQGzbD6yU2pAgzaJM16bkTA7tOwuivmOJOPCgzgo9vsI3">
<input type="hidden" name="_ei_" value="Ep2VKa8UKNIAPP_2GAEW0bY">
<input type="hidden" name="_di_" value="m0a5n0j02duo9clmm4btuu5av8rdtvqfqd03v1hallrvcob47ad0">
<input type="hidden" name="EMAIL_PERMISSION_STATUS_" value="0">
<input type="hidden" name="CONTACT_SOURCE_MOST_RECENT" value="WLS_Subscribe_Form">
<button type="submit" class="redirect-button primary">Subscribe</button>
</div>
</form>
Text Content
Award-winning news, views, and insight from the ESET security community English Español Deutsch Português Français * * TIPS & ADVICE -------------------------------------------------------------------------------- * BUSINESS SECURITY -------------------------------------------------------------------------------- * ESET RESEARCH About ESET ResearchBlogpostsPodcastsWhite papersThreat reports -------------------------------------------------------------------------------- * FEATURED Ukraine crisis – Digital security resource centerWe Live ProgressCOVID-19ResourcesVideos -------------------------------------------------------------------------------- * TOPICS Digital SecurityScamsHow toPrivacyCybercrimeKids onlineSocial mediaInternet of ThingsMalwareRansomwareSecure codingMobile securityCritical infrastructureThreat research -------------------------------------------------------------------------------- * ABOUT US About WeLiveSecurityOur ExpertsContact Us -------------------------------------------------------------------------------- * English EspañolDeutschPortuguêsFrançais * Award-winning news, views, and insight from the ESET security community Digital Security, We Live Progress, Privacy QUANTUM COMPUTING: WILL IT BREAK CRYPTO SECURITY WITHIN A FEW YEARS? Current cryptographic security methods watch out - quantum computing is coming for your lunch. Cameron Camp 01 Aug 2023 • , 3 min. read If the rapid pace at which groups like Google are spooling up amped-up quantum computers continues, so too drops the shot clock to fix or replace cryptographic algorithms used to secure just about everything before they become quite crackable. The reason: The fundamental structure of computing – the bit – gets revamped to contain massive amounts of data each in a thing called qubit (short for ‘quantum bit’). After claiming quantum supremacy back in 2019, Google Quantum AI has now built the second generation of a computer that can digest and process an insane amount of them in record time, allowing them to hammer away at authentication until it breaks. And this is just the beginning. Quantum computing is a famously quirky – but promising – technology, highly susceptible to tricky noise problems that have bedeviled the tech, which tend to cause them to go berserk. But get them quiet enough to be maximally useable, and you fundamentally change computing power, by orders of magnitude. To do that, a new system of minimizing noise and still getting usable information processed utilizes a scheme called random circuit sampling (RCS), which allows 70-qubit processing, vs. the last generation’s 53-qubit on the Sycamore quantum processor. That’s a HUGE difference in processing power. There are substantial efforts to push toward even higher qubit processing if the tech can either make quantum less noisy, optimize its performance amidst increased noise, or, most likely, both. Even with the current level of computing power, however, the team estimates, “we conclude that our demonstration is firmly in the regime of beyond-classical quantum computation.” Basically, that means whatever supercomputers the world is using now will rapidly become dinosaurs, somewhat akin to condensing the computing power of yesterday’s mainframe into a smartphone you probably have sitting in your pocket. And it’s not just the scale of the computing speed: quantum computing is by nature massively parallel, with qubits able to effectively compute many things at the same time. Source: Google AI Blog Looking like the set of a sci-fi movie, the latest entrant by Google’s team is setting compelling speed records and promises more. It kind of also looks like a birthing facility for machine battery drones of the future, but so far none of that. That means the cryptography we use every day that makes up the authentication we use for – everything – to make authentication too tricky to guess or reverse engineer just got more reverse engineerable. Current cryptographic tokens in wide use base their security breakability on whether current practical computing platforms could iterate through enough combinations to guess the right combination to crack the lock within some practical timeframe. Even using modern supercomputers with modern cryptography in wide use, guessing the right combination could take years, possibly many years. But what modern supercomputers can guess in many years, the second generation of Sycamore processor using RCS can guess in seconds or minutes, meaning it can conceivably break current “classical computer” security algorithms. What will we use next for encryption? There is a field of study using quantum computing to generate these far more complex computations that would be more difficult to guess. This partially due to increasing the current practical limitations of what is considered a “random number” by classical computing, which then becomes the seed for far more secure algorithms used in cryptography. Even then, when the new quantum “killer app” happens, it will take years to roll out. That favors the attacker. Even if it did roll out quickly, it is very unlikely that the swarms of security gadgets out there (think routing hardware for the whole internet, or government-level cryptographic token tech) will be initially able to adopt the new schemas without significant hardware upgrades. Not that the bad actors will run out and build a quantum supercomputer – they’re huge and expensive – but the usual nation-state suspects are most certainly interested in placing an order. Quantum computing also promises to rapidly accelerate AI/ML engines in ways difficult to conceptualize. Add to this solving amazingly complex problems like weather modeling, or making sense of giant piles of data that seem daunting, like finding complex threats, and you can see the allure. Meanwhile, we’re still trying to get folks to adopt multi-factor authentication, so the security basics still apply, and will for some time into the future. But a quantum computing platform will be in your future. Maybe, one day it will be in your pocket as an iPhone 73. -------------------------------------------------------------------------------- LET US KEEP YOU UP TO DATE Sign up for our newsletters Ukraine Crisis newsletter Regular weekly newsletter Subscribe RELATED ARTICLES -------------------------------------------------------------------------------- Digital Security Very precisely lost – GPS jamming Digital Security Very precisely lost – GPS jamming • -------------------------------------------------------------------------------- Digital Security Your voice is my password Digital Security Your voice is my password • -------------------------------------------------------------------------------- Digital Security Fuel for thought: Can a driverless car get arrested? Digital Security Fuel for thought: Can a driverless car get arrested? • SIMILAR ARTICLES Quantum Computation: A cryptography armageddon? -------------------------------------------------------------------------------- ESET research Rob Slade: The truth about quantum cryptography - and what it means for privacy -------------------------------------------------------------------------------- Digital Security RSA: Will your next phone have quantum cryptographic 2FA? -------------------------------------------------------------------------------- SHARE ARTICLE DISCUSSION Award-winning news, views, and insight from the ESET security community About us ESET Contact us Privacy Policy Legal Information Manage Cookies RSS Feed Copyright © ESET, All Rights Reserved Your account, your cookies choice We and our partners use cookies to give you the best optimized online experience, analyze our website traffic, and serve you with personalized ads. You can agree to the collection of all cookies by clicking "Accept all and close" or adjust your cookie settings by clicking "Manage cookies". You also have the right to withdraw your consent to cookies anytime. For more information, please see our Cookie Policy. Accept all and close Manage cookies Essential cookies These first-party cookies are necessary for the functioning and security of our website and the services you require. They are usually set in response to your actions to enable the use of certain functionality, such as remembering your cookie preferences, logging in, or holding items in your cart. You can´t opt out of these cookies, and blocking them via a browser may affect site functionality. Basic Analytical Cookies These first-party cookies enable us to measure the number of visitors/users of our website and create aggregated usage and performance statistics with the help of our trusted partners. We use them to get the basic insight into our website traffic and our campaign performance and to solve bugs on our website. Advanced Analytical Cookies These first or third-party cookies help us understand how you interact with our website and each offered service by enriching our datasets with data from third-party tools. We use these cookies to improve our website, services, and user experience, find and solve bugs or other problems with them, and evaluate our campaigns´ effectiveness. Marketing cookies These third-party cookies allow our marketing partners to track some of your activities on our website (for example, when you download or buy our product) to learn about your interests and needs and to show you more relevant targeted ads. Accept and close Back