Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Threat Intelligence

02:00 PM
Bernard Brode
Bernard Brode
Connect Directly
E-Mail vvv

How Nanotechnology Will Disrupt Cybersecurity

Tangible solutions related to cryptography, intelligent threat detection and consumer security are closer than you think.

It sometimes feels like nanotechnology is a solution looking for a problem. Though there has been much speculation about the potential applications of nanotechnology, many benefits the technology remain quite underdeveloped. One exception is in the area of cybersecurity.

While I don't expect nanotech attacks or nanotech-based security strategies to appear this year, one of the major cybersecurity lessons the industry is learning from the COVID-19 pandemic is that the threat landscape, and the way organizations respond to it, is more dynamic than ever. Here are three areas where nanotechnology is likely to influence cybersecurity, and my best guess at how quickly we are likely to see tangible nanotech solutions.

Nanotech for Cryptography
The first major way in which nanotechnology is contributing to cybersecurity is by allowing the development of more complex cryptographic schemes. Each year ushers in a higher level of cybersecurity threat to the online landscape, adding to the undeniable evidence that current encryption protocols are increasingly breakable. Because of this, some organizations have turned to more exotic solutions to secure their communications.

One of these is quantum cryptography. Recent research has shown that advances in nanoscale technologies might soon allow the creation of quantum chips that will be far more secure than traditional cryptographic hardware. This is because CMOS transistors — which still form the basic building blocks of modern computing hardware — tend to "leak" information on their state when they turn on or off. Nanoscale quantum chips, in contrast, can be made essentially uncrackable.

Intelligent Threat Detection
Another promising area of crossover for nanotechnology and cybersecurity relates to the development of truly intelligent threat detection systems. Many organizations are pursuing research that examines the potential benefits of using nanotechnology to replicate biological systems in digital computers. The US government is a heavy backer of this idea.

This application of nanotechnology builds on the success of neural networks over the past decade, a success that has seen them become all but ubiquitous wherever large amounts of data need to be processed. By leveraging nanotechnology, researchers claim, we could build computers inspired by the structure of the human brain, which would offer far greater predictive abilities than the neural networks already on the market.

Many of the applications of these "intelligent" systems would be military in nature. They could help organizations monitor energy or weapons systems that require software so complicated that it exceeds a human's ability to write and verify the software and its performance. However, scientists could also use this technology to quickly create personalized treatments for individual patients.

From a cybersecurity perspective, nanoscale AI systems hold much promise. Not only could they allow emerging threats to be quickly identified and isolated, but they could also be programmed to take proactive measures to shut down incoming threats. In this way, nanotech and AI might solve the skills shortage that plagues the cybersecurity industry.

Consumer Security
Beyond exotic applications such as quantum cryptography and improved AI, nanotechnology could have significant implications for the safety and security of the average consumer. One of the goals of nanotechnology researchers for the past few decades has been to build full systems-on-chips that are small enough to be ingested or implanted in the human body.

At the moment, these systems are used for a limited number of tasks, mainly to monitor patients within a healthcare context. Biomaterials scientists at MIT, for instance, are testing a tiny pill that combines a microphone, a thermometer, and a battery to collect several measures at once from inside a body.

Such embedded systems could, however, advance consumer-level security practices considerably. In the same way that browser-based password managers and consumer-focused encryption programs seek to harden consumer devices against attack, an implanted device could be used for authentication and encryption while being nearly impossible to steal. Though there are still obvious privacy issues to be solved, expect to see this idea become mainstream in the next decade.

The Future
Some of these applications of nanotechnology in cybersecurity are already upon us: Several banks, for instance, already use quantum cryptography based on nanoscale architectures. Others, such as a world where communications are secured by implanted chips, remain speculative for now. What is clear, however, is that nanotech is certainly one of the disruptive trends changing cybersecurity, one that cybersecurity professionals can't afford to ignore.

Related Content:



Register now for this year's fully virtual Black Hat USA, scheduled to take place August 1–6, and get more information about the event on the Black Hat website. Click for detail on conference information and to register.

Bernard Brode is a product researcher at Microscopic Machines and remains eternally curious about where the intersection of AI, cybersecurity, and nanotechnology will eventually take us. View Full Bio

Recommended Reading:

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
Inside the Ransomware Campaigns Targeting Exchange Servers
Kelly Sheridan, Staff Editor, Dark Reading,  4/2/2021
Beyond MITRE ATT&CK: The Case for a New Cyber Kill Chain
Rik Turner, Principal Analyst, Infrastructure Solutions, Omdia,  3/30/2021
Register for Dark Reading Newsletters
White Papers
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2021-04-17
The overlayfs implementation in the linux kernel did not properly validate with respect to user namespaces the setting of file capabilities on files in an underlying file system. Due to the combination of unprivileged user namespaces along with a patch carried in the Ubuntu kernel to allow unprivile...
PUBLISHED: 2021-04-17
Shiftfs, an out-of-tree stacking file system included in Ubuntu Linux kernels, did not properly handle faults occurring during copy_from_user() correctly. These could lead to either a double-free situation or memory not being freed at all. An attacker could use this to cause a denial of service (ker...
PUBLISHED: 2021-04-17
A command injection vulnerability has been reported to affect QTS and QuTS hero. If exploited, this vulnerability allows attackers to execute arbitrary commands in a compromised application. We have already fixed this vulnerability in the following versions: QTS Build 20210202 and later Q...
PUBLISHED: 2021-04-17
An SQL injection vulnerability has been reported to affect QNAP NAS running Multimedia Console or the Media Streaming add-on. If exploited, the vulnerability allows remote attackers to obtain application information. QNAP has already fixed this vulnerability in the following versions of Multimedia C...
PUBLISHED: 2021-04-16
jose-node-esm-runtime is an npm package which provides a number of cryptographic functions. In versions prior to 3.11.4 the AES_CBC_HMAC_SHA2 Algorithm (A128CBC-HS256, A192CBC-HS384, A256CBC-HS512) decryption would always execute both HMAC tag verification and CBC decryption, if either failed `JWEDe...