Security

Cybersecurity today for the quantum era of tomorrow

Share this post:

Author: Chris Hockings, CTO IBM Security, Australia and New Zealand

Chris Hockings

Just as quantum computing promises to deliver revolutionary growth in computing power, it also holds the potential for massive advancements in cybersecurity, helping detect and deflect attacks before they cause harm. But quantum computing may also create new vulnerabilities – for example, if malicious actors use its mathematical power to break encryption. But even though post-quantum cryptography standards aren’t yet finalised, businesses and other organisations can start preparing today.

How quantum computing could threaten encryption

While classical computers use binary bits of 0s and1s, quantum computers use quantum bits, or “qubits,” which can take on more than one state at the same time. This enhanced processing power means quantum computers are expected to have the capacity to solve problems that are “intractable” using classical computers. Currently, common asymmetric encryption methods are based on difficult mathematical problems which can take thousands of years on today’s most powerful supercomputers. But the same problem could theoretically be solved in days or hours on a large-scale quantum computer.

Harnessing the power of quantum computing for cybersecurity

Balancing its potential risks, quantum computing can also help improve our ability to protect critical and personal data, particularly concerning quantum machine learning and quantum random number generation. Machine learning can aid in behaviour anomaly detection, classifying entities and predicting threats, and random number generation is essential in cryptography.

There are four key steps for preparing for post-quantum cryptography:

  1. Identify, retrain or recruit people with the right skills to champion quantum cybersecurity within your organisation.
  2. Assess your potential quantum-era security exposure to identify where post-quantum security methods should be adopted.
  3. Keep up-to-date with advances in post-quantum cybersecurity standards and emerging security solutions.
  4. Work with encryption solution providers to deploy quantum-safe alternatives as they become available.

Exploring practical quantum applications with industry, researchers and academia

Recently we’ve launched the IBM Q Network, a collaboration of leading Fortune 500 companies, academic institutions like the University of Melbourne and national research labs who’ll work directly with IBM to explore practical quantum applications. The IBM Q Network will provide quantum expertise and resources, and cloud-based access to the most advanced and scalable universal quantum computing systems and technology stack available. That way the network will foster a growing quantum computing ecosystem based on IBM’s open source quantum software and developer tools.

The IBM Q Network will serve as a vehicle to make quantum computing more accessible to businesses and organisations through access to the most advanced IBM Q systems and quantum ecosystem. It’ll focus on discovering areas of quantum advantage by investigating practical applications of quantum computers with commercial, intellectual and societal benefit.

Learn how to bring your cybersecurity into the quantum age

With the right preparation, the quantum computing era promises to deliver both an expansion in computing power and new opportunities for improving cybersecurity. To find out how your organisation can adapt and thrive in the quantum age, download our report Wielding a double-edged sword – Preparing cybersecurity now for a quantum world.

Read the report

 

 

 

 

 

More Security stories

How IBM is helping to skill South Australian students for the jobs of the future

By Jade Moffat Herman, Corporate Social Responsibility Lead, IBM A/NZ After almost seven years at IBM Australia and New Zealand, you don’t need to tell me how rewarding a career in technology can be. In my role as Corporate Social Responsibility Lead, I am honoured to work closely with leading public sector, not-for-profit and educational […]

Continue reading

Four Australian teams lead the 2021 Call for Code to help combat climate change

By Alison Haire, Lead Developer Advocate, Hybrid Cloud Build Team Solving global challenges like climate change may seem never-ending, but we can draw inspiration and hope from communities that are making a difference. The open-source movement is one such community, involving hundreds of thousands of individuals and organisations around the world. Together, they have created […]

Continue reading

How to avoid data breaches while accelerating your digital transformation

Author: Chris Hockings, Chief Technology Officer (Cyber Security), IBM Australia and New Zealand  As the pandemic accelerated your need for digital transformation, you needed to act. And fast. And you were not alone. But new findings from the recent IBM-Ponemon Institute Cost of a Data Breach Report 2021 suggest that an organisation’s pace of change […]

Continue reading