Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Threat Intelligence

02:00 PM
Bernard Brode
Bernard Brode
Connect Directly
E-Mail vvv

How Nanotechnology Will Disrupt Cybersecurity

Tangible solutions related to cryptography, intelligent threat detection and consumer security are closer than you think.

It sometimes feels like nanotechnology is a solution looking for a problem. Though there has been much speculation about the potential applications of nanotechnology, many benefits the technology remain quite underdeveloped. One exception is in the area of cybersecurity.

While I don't expect nanotech attacks or nanotech-based security strategies to appear this year, one of the major cybersecurity lessons the industry is learning from the COVID-19 pandemic is that the threat landscape, and the way organizations respond to it, is more dynamic than ever. Here are three areas where nanotechnology is likely to influence cybersecurity, and my best guess at how quickly we are likely to see tangible nanotech solutions.

Nanotech for Cryptography
The first major way in which nanotechnology is contributing to cybersecurity is by allowing the development of more complex cryptographic schemes. Each year ushers in a higher level of cybersecurity threat to the online landscape, adding to the undeniable evidence that current encryption protocols are increasingly breakable. Because of this, some organizations have turned to more exotic solutions to secure their communications.

One of these is quantum cryptography. Recent research has shown that advances in nanoscale technologies might soon allow the creation of quantum chips that will be far more secure than traditional cryptographic hardware. This is because CMOS transistors — which still form the basic building blocks of modern computing hardware — tend to "leak" information on their state when they turn on or off. Nanoscale quantum chips, in contrast, can be made essentially uncrackable.

Intelligent Threat Detection
Another promising area of crossover for nanotechnology and cybersecurity relates to the development of truly intelligent threat detection systems. Many organizations are pursuing research that examines the potential benefits of using nanotechnology to replicate biological systems in digital computers. The US government is a heavy backer of this idea.

This application of nanotechnology builds on the success of neural networks over the past decade, a success that has seen them become all but ubiquitous wherever large amounts of data need to be processed. By leveraging nanotechnology, researchers claim, we could build computers inspired by the structure of the human brain, which would offer far greater predictive abilities than the neural networks already on the market.

Many of the applications of these "intelligent" systems would be military in nature. They could help organizations monitor energy or weapons systems that require software so complicated that it exceeds a human's ability to write and verify the software and its performance. However, scientists could also use this technology to quickly create personalized treatments for individual patients.

From a cybersecurity perspective, nanoscale AI systems hold much promise. Not only could they allow emerging threats to be quickly identified and isolated, but they could also be programmed to take proactive measures to shut down incoming threats. In this way, nanotech and AI might solve the skills shortage that plagues the cybersecurity industry.

Consumer Security
Beyond exotic applications such as quantum cryptography and improved AI, nanotechnology could have significant implications for the safety and security of the average consumer. One of the goals of nanotechnology researchers for the past few decades has been to build full systems-on-chips that are small enough to be ingested or implanted in the human body.

At the moment, these systems are used for a limited number of tasks, mainly to monitor patients within a healthcare context. Biomaterials scientists at MIT, for instance, are testing a tiny pill that combines a microphone, a thermometer, and a battery to collect several measures at once from inside a body.

Such embedded systems could, however, advance consumer-level security practices considerably. In the same way that browser-based password managers and consumer-focused encryption programs seek to harden consumer devices against attack, an implanted device could be used for authentication and encryption while being nearly impossible to steal. Though there are still obvious privacy issues to be solved, expect to see this idea become mainstream in the next decade.

The Future
Some of these applications of nanotechnology in cybersecurity are already upon us: Several banks, for instance, already use quantum cryptography based on nanoscale architectures. Others, such as a world where communications are secured by implanted chips, remain speculative for now. What is clear, however, is that nanotech is certainly one of the disruptive trends changing cybersecurity, one that cybersecurity professionals can't afford to ignore.

Related Content:



Register now for this year's fully virtual Black Hat USA, scheduled to take place August 1–6, and get more information about the event on the Black Hat website. Click for detail on conference information and to register.

Bernard Brode is a product researcher at Microscopic Machines and remains eternally curious about where the intersection of AI, cybersecurity, and nanotechnology will eventually take us. View Full Bio

Recommended Reading:

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 8/10/2020
Pen Testers Who Got Arrested Doing Their Jobs Tell All
Kelly Jackson Higgins, Executive Editor at Dark Reading,  8/5/2020
Researcher Finds New Office Macro Attacks for MacOS
Curtis Franklin Jr., Senior Editor at Dark Reading,  8/7/2020
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Current Issue
Special Report: Computing's New Normal, a Dark Reading Perspective
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
The Changing Face of Threat Intelligence
The Changing Face of Threat Intelligence
This special report takes a look at how enterprises are using threat intelligence, as well as emerging best practices for integrating threat intel into security operations and incident response. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2020-08-11
FusionSphere OpenStack 8.0.0 have a protection mechanism failure vulnerability. The product incorrectly uses a protection mechanism. An attacker has to find a way to exploit the vulnerability to conduct directed attacks against the affected product.
PUBLISHED: 2020-08-10
A cross-site scripting (XSS) vulnerability in the Credential Manager component in SAINT Security Suite 8.0 through 9.8.20 could allow arbitrary script to run in the context of a logged-in user when the user clicks on a specially crafted link.
PUBLISHED: 2020-08-10
An SQL injection vulnerability in the Assets component of SAINT Security Suite 8.0 through 9.8.20 allows a remote, authenticated attacker to gain unauthorized access to the database.
PUBLISHED: 2020-08-10
An SQL injection vulnerability in the Analytics component of SAINT Security Suite 8.0 through 9.8.20 allows a remote, authenticated attacker to gain unauthorized access to the database.
PUBLISHED: 2020-08-10
A cross-site scripting (XSS) vulnerability in the Permissions component in SAINT Security Suite 8.0 through 9.8.20 could allow arbitrary script to run in the context of a logged-in user when the user clicks on a specially crafted link.