Attacks/Breaches

10/31/2018
02:30 PM
Rodney Joffe
Rodney Joffe
Commentary
Connect Directly
Twitter
LinkedIn
RSS
E-Mail vvv
50%
50%

How the Power of Quantum Can Be Used Against Us

There has been a palpable shift from volumetric attacks to "quantum attacks," and they look to be one of the biggest cybersecurity challenges on the rise today.

Quantum computing has the ability to shape our global information technology. Every day, enterprises are edging closer to harnessing the true power of quantum computing. Now that the technology is moving from research to practice, governments are getting involved too. In late September, the Department of Energy announced $218 million in funding for 85 quantum projects, while the National Science Foundation awarded $31 million for quantum research. Even with these developments, there is not yet a fully functioning quantum computer that can perform all standard computing tasks.

The processing power of quantum computers will fundamentally change the way we approach things. This new approach to processing data may one day lead to revolutionary breakthroughs within and across nations, and industries, solving problems we might not even consider problems today.

However, with any major technology innovation, quantum introduces risks to our current IT infrastructure. For example, quantum can render encryption useless. With encryption ineffective, sensitive data from financial institutions or governments could be made easily accessible. While these threats are not imminent, because quantum computers are still in the making, entire industries need to prepare for what the National Institute of Standards and Technology (NIST) calls the "era of post-quantum cryptography."

The Current Threat
There has been a palpable shift from volumetric attacks to "quantum attacks," and they are looking to be one of the biggest cybersecurity challenges on the rise today. The cybercriminals behind quantum attacks may start off small, but the attacks can quickly become highly complex by adding attack vectors, botnets, and ports.

Current quantum attacks are relatively small. An anomaly of 300 Mbps may probably not even be noticed by a company that is running hundreds of applications in the cloud, and such an attack won't trigger cloud failover. Attackers are familiar with this open window and they try to bypass security endpoints to avoid triggering cloud failover mitigation. These stronger attacks require quantum resources that have not been developed yet, which buys organizations some time. However, the faster quantum computing develops, the more complex attacks will become — and the challenges for companies working to defend against them increases as well. Consequently, it is important for security teams to update and develop a quantum security strategy.

The Future of the Enterprise
In order to understand how cybercriminals can utilize quantum technology to gain sensitive data, let's look at an example in "What Is Quantum Computing?" by the Information Technology & Innovation Foundation. Imagine a phonebook with 10 million entries. A standard search algorithm would have to try an average of 5 million times to find the entry it is looking for. A quantum computer only needs 1,000 operations — and hence is 5,000 times faster.

We don't know when the first major company or country will announce a fully functioning quantum computer, but we know it's not some farfetched fantasy. A quantum computer in the hands of a malicious attacker will be able to decrypt sensitive data currently protected by corporations and governments. So, despite all the current issues security teams are working on every day, it's not too soon to start planning for the post-quantum computing world.

Getting Quantum on Your Radar
To start, IT security professionals should begin monitoring quantum computing updates, trends, attacks, international quantum security standards, and protocols. Next, IT leaders should work together with experienced and reputable partners to help optimize organizations' IT environments and protect their data. NIST and others in the security industry have started to conduct research about quantum-safe cryptographies for classical computers that are capable of resisting quantum attacks. In addition, make sure your services and systems are continuously and fully updated. Only allow services to operate within your organization that are required, and don't leave unneeded services running — they could be a window for quantum attacks if not properly maintained.

It is time for governments and organizations to face the very real threats that come with the introduction of a revolutionary new technology like quantum computing. This isn't an easy problem to solve. Global IT experts will need to invent an entirely new approach to information security, and it will not happen overnight. But acknowledging that these threats are looming is the first step. Then comes action.

Related Content:

 

Black Hat Europe returns to London Dec. 3-6, 2018, with hands-on technical Trainings, cutting-edge Briefings, Arsenal open-source tool demonstrations, top-tier security solutions, and service providers in the Business Hall. Click for information on the conference and to register.

Rodney Joffe has been a sought-after cybersecurity expert who, among other notable accomplishments, leads the Conficker Working Group to protect the world from the Conficker worm. Providing guidance and knowledge to organizations from the United States government to the ... View Full Bio
Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
When Your Sandbox Fails
Kowsik Guruswamy, Chief Technology Officer at Menlo Security,  4/11/2019
Julian Assange Arrested in London
Dark Reading Staff 4/11/2019
8 'SOC-as-a-Service' Offerings
Steve Zurier, Freelance Writer,  4/12/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
5 Emerging Cyber Threats to Watch for in 2019
Online attackers are constantly developing new, innovative ways to break into the enterprise. This Dark Reading Tech Digest gives an in-depth look at five emerging attack trends and exploits your security team should look out for, along with helpful recommendations on how you can prevent your organization from falling victim.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-1840
PUBLISHED: 2019-04-18
A vulnerability in the DHCPv6 input packet processor of Cisco Prime Network Registrar could allow an unauthenticated, remote attacker to restart the server and cause a denial of service (DoS) condition on the affected system. The vulnerability is due to incomplete user-supplied input validation when...
CVE-2019-1841
PUBLISHED: 2019-04-18
A vulnerability in the Software Image Management feature of Cisco DNA Center could allow an authenticated, remote attacker to access to internal services without additional authentication. The vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vuln...
CVE-2019-1826
PUBLISHED: 2019-04-18
A vulnerability in the quality of service (QoS) feature of Cisco Aironet Series Access Points (APs) could allow an authenticated, adjacent attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to improper input validation on QoS fields within Wi-Fi fra...
CVE-2019-1829
PUBLISHED: 2019-04-18
A vulnerability in the CLI of Cisco Aironet Series Access Points (APs) could allow an authenticated, local attacker to gain access to the underlying Linux operating system (OS) without the proper authentication. The attacker would need valid administrator device credentials. The vulnerability is due...
CVE-2019-1830
PUBLISHED: 2019-04-18
A vulnerability in Locally Significant Certificate (LSC) management for the Cisco Wireless LAN Controller (WLC) could allow an authenticated, remote attacker to cause the device to unexpectedly restart, which causes a denial of service (DoS) condition. The attacker would need to have valid administr...