www.welivesecurity.com Open in urlscan Pro
2a02:26f0:3500:12::1730:1797  Public Scan

Submitted URL: https://app.security.eset.com/e/er?utm_campaign=UK_B2B_Enterprise-AQ_Newsletter-12-2023&utm_medium=email&utm_source=Eloqua&s=1...
Effective URL: https://www.welivesecurity.com/en/cybersecurity/quantum-computing-will-it-break-crypto-security-within-a-few-years/?utm_campaig...
Submission: On December 05 via manual from GB — Scanned from NL

Form analysis 3 forms found in the DOM

GET https://www.welivesecurity.com/en/search

<form data-v-ed6a42ae="" id="searchform" method="get" action="https://www.welivesecurity.com/en/search" autocomplete="off" role="search">
  <div data-v-ed6a42ae="" class="search-area"><input data-v-ed6a42ae="" name="term" class="searchbar-input form-control" type="text"
      placeholder="Search WeLiveSecurity"><a data-v-ed6a42ae="" class="search-icon-trigger"><span data-v-ed6a42ae="" class="search-icon"></span></a><!----><!----></div><!---->
</form>

GET https://www.welivesecurity.com/en/search

<form data-v-ed6a42ae="" id="searchform" method="get" action="https://www.welivesecurity.com/en/search" autocomplete="off" role="search">
  <div data-v-ed6a42ae="" class="search-area"><input data-v-ed6a42ae="" name="term" class="searchbar-input form-control" type="text"
      placeholder="Search WeLiveSecurity"><a data-v-ed6a42ae="" class="search-icon-trigger"><span data-v-ed6a42ae="" class="search-icon"></span></a><!----><!----></div><!---->
</form>

POST https://enjoy.eset.com/pub/rf

<form action="https://enjoy.eset.com/pub/rf" class="basic-searchform col-md-12 col-sm-12 col-xs-12 no-padding newsletter px-0" target="_blank" method="post" role="search">
  <div class="search-input clearfix">
    <input type="text" name="EMAIL_ADDRESS_" value="" placeholder="Your Email Address" required="">
    <input type="checkbox" id="TOPIC" name="TOPIC" value="We Live Security Ukraine Newsletter">
    <label for="TOPIC">Ukraine Crisis newsletter</label>
    <input type="checkbox" id="NEWSLETTER" name="NEWSLETTER" value="We Live Security">
    <label for="NEWSLETTER">Regular weekly newsletter</label>
    <input type="hidden" name="_ri_" value="X0Gzc2X%3DAQpglLjHJlTQGgXv4jDGEK4KW2uhw0qgUzfwuivmOJOPCgzgo9vsI3VwjpnpgHlpgneHmgJoXX0Gzc2X%3DAQpglLjHJlTQGzbD6yU2pAgzaJM16bkTA7tOwuivmOJOPCgzgo9vsI3">
    <input type="hidden" name="_ei_" value="Ep2VKa8UKNIAPP_2GAEW0bY">
    <input type="hidden" name="_di_" value="m0a5n0j02duo9clmm4btuu5av8rdtvqfqd03v1hallrvcob47ad0">
    <input type="hidden" name="EMAIL_PERMISSION_STATUS_" value="0">
    <input type="hidden" name="CONTACT_SOURCE_MOST_RECENT" value="WLS_Subscribe_Form">
    <button type="submit" class="redirect-button primary">Subscribe</button>
  </div>
</form>

Text Content

Award-winning news, views, and insight from the ESET security community

English
Español
Deutsch
Português
Français

 * 
 * TIPS & ADVICE

   --------------------------------------------------------------------------------

 * BUSINESS SECURITY

   --------------------------------------------------------------------------------

 * ESET RESEARCH
   About ESET ResearchBlogpostsPodcastsWhite papersThreat reports

   --------------------------------------------------------------------------------

 * FEATURED
   Ukraine crisis – Digital security resource centerWe Live
   ProgressCOVID-19ResourcesVideos

   --------------------------------------------------------------------------------

 * TOPICS
   Digital SecurityScamsHow toPrivacyCybercrimeKids onlineSocial mediaInternet
   of ThingsMalwareRansomwareSecure codingMobile securityCritical
   infrastructureThreat research

   --------------------------------------------------------------------------------

 * ABOUT US
   About WeLiveSecurityOur ExpertsContact Us

   --------------------------------------------------------------------------------

 * English
   EspañolDeutschPortuguêsFrançais
 * 



Award-winning news, views, and insight from the ESET security community

Digital Security, We Live Progress, Privacy


QUANTUM COMPUTING: WILL IT BREAK CRYPTO SECURITY WITHIN A FEW YEARS?

Current cryptographic security methods watch out - quantum computing is coming
for your lunch.

Cameron Camp

01 Aug 2023  •  , 3 min. read



If the rapid pace at which groups like Google are spooling up amped-up quantum
computers continues, so too drops the shot clock to fix or replace cryptographic
algorithms used to secure just about everything before they become quite
crackable. The reason: The fundamental structure of computing – the bit – gets
revamped to contain massive amounts of data each in a thing called qubit (short
for ‘quantum bit’). After claiming quantum supremacy back in 2019, Google
Quantum AI has now built the second generation of a computer that can digest and
process an insane amount of them in record time, allowing them to hammer away at
authentication until it breaks.

And this is just the beginning.

Quantum computing is a famously quirky – but promising – technology, highly
susceptible to tricky noise problems that have bedeviled the tech, which tend to
cause them to go berserk. But get them quiet enough to be maximally useable, and
you fundamentally change computing power, by orders of magnitude.

To do that, a new system of minimizing noise and still getting usable
information processed utilizes a scheme called random circuit sampling (RCS),
which allows 70-qubit processing, vs. the last generation’s 53-qubit on the
Sycamore quantum processor. That’s a HUGE difference in processing power. There
are substantial efforts to push toward even higher qubit processing if the tech
can either make quantum less noisy, optimize its performance amidst increased
noise, or, most likely, both.

Even with the current level of computing power, however, the team estimates, “we
conclude that our demonstration is firmly in the regime of beyond-classical
quantum computation.” Basically, that means whatever supercomputers the world is
using now will rapidly become dinosaurs, somewhat akin to condensing the
computing power of yesterday’s mainframe into a smartphone you probably have
sitting in your pocket. And it’s not just the scale of the computing speed:
quantum computing is by nature massively parallel, with qubits able to
effectively compute many things at the same time.

Source: Google AI Blog

Looking like the set of a sci-fi movie, the latest entrant by Google’s team is
setting compelling speed records and promises more. It kind of also looks like a
birthing facility for machine battery drones of the future, but so far none of
that.

That means the cryptography we use every day that makes up the authentication we
use for – everything – to make authentication too tricky to guess or reverse
engineer just got more reverse engineerable. Current cryptographic tokens in
wide use base their security breakability on whether current practical computing
platforms could iterate through enough combinations to guess the right
combination to crack the lock within some practical timeframe. Even using modern
supercomputers with modern cryptography in wide use, guessing the right
combination could take years, possibly many years.
But what modern supercomputers can guess in many years, the second generation of
Sycamore processor using RCS can guess in seconds or minutes, meaning it can
conceivably break current “classical computer” security algorithms.

What will we use next for encryption? There is a field of study using quantum
computing to generate these far more complex computations that would be more
difficult to guess. This partially due to increasing the current practical
limitations of what is considered a “random number” by classical computing,
which then becomes the seed for far more secure algorithms used in cryptography.
Even then, when the new quantum “killer app” happens, it will take years to roll
out. That favors the attacker.

Even if it did roll out quickly, it is very unlikely that the swarms of security
gadgets out there (think routing hardware for the whole internet, or
government-level cryptographic token tech) will be initially able to adopt the
new schemas without significant hardware upgrades.

Not that the bad actors will run out and build a quantum supercomputer – they’re
huge and expensive – but the usual nation-state suspects are most certainly
interested in placing an order.

Quantum computing also promises to rapidly accelerate AI/ML engines in ways
difficult to conceptualize. Add to this solving amazingly complex problems like
weather modeling, or making sense of giant piles of data that seem daunting,
like finding complex threats, and you can see the allure.

Meanwhile, we’re still trying to get folks to adopt multi-factor authentication,
so the security basics still apply, and will for some time into the future. But
a quantum computing platform will be in your future. Maybe, one day it will be
in your pocket as an iPhone 73.

--------------------------------------------------------------------------------


LET US KEEP YOU
UP TO DATE

Sign up for our newsletters

Ukraine Crisis newsletter Regular weekly newsletter Subscribe

RELATED ARTICLES

--------------------------------------------------------------------------------

Digital Security

Very precisely lost – GPS jamming



Digital Security

Very precisely lost – GPS jamming

•

--------------------------------------------------------------------------------

Digital Security

Your voice is my password



Digital Security

Your voice is my password

•

--------------------------------------------------------------------------------

Digital Security

Fuel for thought: Can a driverless car get arrested?



Digital Security

Fuel for thought: Can a driverless car get arrested?

•


SIMILAR ARTICLES

Quantum Computation: A cryptography armageddon?



--------------------------------------------------------------------------------

ESET research

Rob Slade: The truth about quantum cryptography - and what it means for privacy



--------------------------------------------------------------------------------

Digital Security

RSA: Will your next phone have quantum cryptographic 2FA?



--------------------------------------------------------------------------------


SHARE ARTICLE





DISCUSSION



Award-winning news, views, and insight from the ESET security community

About us ESET Contact us Privacy Policy Legal Information Manage Cookies RSS
Feed

Copyright © ESET, All Rights Reserved
Your account, your cookies choice
We and our partners use cookies to give you the best optimized online
experience, analyze our website traffic, and serve you with personalized ads.
You can agree to the collection of all cookies by clicking "Accept all and
close" or adjust your cookie settings by clicking "Manage cookies". You also
have the right to withdraw your consent to cookies anytime. For more
information, please see our Cookie Policy.
Accept all and close
Manage cookies
Essential cookies
These first-party cookies are necessary for the functioning and security of our
website and the services you require. They are usually set in response to your
actions to enable the use of certain functionality, such as remembering your
cookie preferences, logging in, or holding items in your cart. You can´t opt out
of these cookies, and blocking them via a browser may affect site functionality.
Basic Analytical Cookies
These first-party cookies enable us to measure the number of visitors/users of
our website and create aggregated usage and performance statistics with the help
of our trusted partners. We use them to get the basic insight into our website
traffic and our campaign performance and to solve bugs on our website.
Advanced Analytical Cookies
These first or third-party cookies help us understand how you interact with our
website and each offered service by enriching our datasets with data from
third-party tools. We use these cookies to improve our website, services, and
user experience, find and solve bugs or other problems with them, and evaluate
our campaigns´ effectiveness.
Marketing cookies
These third-party cookies allow our marketing partners to track some of your
activities on our website (for example, when you download or buy our product) to
learn about your interests and needs and to show you more relevant targeted ads.
Accept and close
Back