Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Threat Intelligence

02:00 PM
Bernard Brode
Bernard Brode
Connect Directly
E-Mail vvv

How Nanotechnology Will Disrupt Cybersecurity

Tangible solutions related to cryptography, intelligent threat detection and consumer security are closer than you think.

It sometimes feels like nanotechnology is a solution looking for a problem. Though there has been much speculation about the potential applications of nanotechnology, many benefits the technology remain quite underdeveloped. One exception is in the area of cybersecurity.

While I don't expect nanotech attacks or nanotech-based security strategies to appear this year, one of the major cybersecurity lessons the industry is learning from the COVID-19 pandemic is that the threat landscape, and the way organizations respond to it, is more dynamic than ever. Here are three areas where nanotechnology is likely to influence cybersecurity, and my best guess at how quickly we are likely to see tangible nanotech solutions.

Nanotech for Cryptography
The first major way in which nanotechnology is contributing to cybersecurity is by allowing the development of more complex cryptographic schemes. Each year ushers in a higher level of cybersecurity threat to the online landscape, adding to the undeniable evidence that current encryption protocols are increasingly breakable. Because of this, some organizations have turned to more exotic solutions to secure their communications.

One of these is quantum cryptography. Recent research has shown that advances in nanoscale technologies might soon allow the creation of quantum chips that will be far more secure than traditional cryptographic hardware. This is because CMOS transistors — which still form the basic building blocks of modern computing hardware — tend to "leak" information on their state when they turn on or off. Nanoscale quantum chips, in contrast, can be made essentially uncrackable.

Intelligent Threat Detection
Another promising area of crossover for nanotechnology and cybersecurity relates to the development of truly intelligent threat detection systems. Many organizations are pursuing research that examines the potential benefits of using nanotechnology to replicate biological systems in digital computers. The US government is a heavy backer of this idea.

This application of nanotechnology builds on the success of neural networks over the past decade, a success that has seen them become all but ubiquitous wherever large amounts of data need to be processed. By leveraging nanotechnology, researchers claim, we could build computers inspired by the structure of the human brain, which would offer far greater predictive abilities than the neural networks already on the market.

Many of the applications of these "intelligent" systems would be military in nature. They could help organizations monitor energy or weapons systems that require software so complicated that it exceeds a human's ability to write and verify the software and its performance. However, scientists could also use this technology to quickly create personalized treatments for individual patients.

From a cybersecurity perspective, nanoscale AI systems hold much promise. Not only could they allow emerging threats to be quickly identified and isolated, but they could also be programmed to take proactive measures to shut down incoming threats. In this way, nanotech and AI might solve the skills shortage that plagues the cybersecurity industry.

Consumer Security
Beyond exotic applications such as quantum cryptography and improved AI, nanotechnology could have significant implications for the safety and security of the average consumer. One of the goals of nanotechnology researchers for the past few decades has been to build full systems-on-chips that are small enough to be ingested or implanted in the human body.

At the moment, these systems are used for a limited number of tasks, mainly to monitor patients within a healthcare context. Biomaterials scientists at MIT, for instance, are testing a tiny pill that combines a microphone, a thermometer, and a battery to collect several measures at once from inside a body.

Such embedded systems could, however, advance consumer-level security practices considerably. In the same way that browser-based password managers and consumer-focused encryption programs seek to harden consumer devices against attack, an implanted device could be used for authentication and encryption while being nearly impossible to steal. Though there are still obvious privacy issues to be solved, expect to see this idea become mainstream in the next decade.

The Future
Some of these applications of nanotechnology in cybersecurity are already upon us: Several banks, for instance, already use quantum cryptography based on nanoscale architectures. Others, such as a world where communications are secured by implanted chips, remain speculative for now. What is clear, however, is that nanotech is certainly one of the disruptive trends changing cybersecurity, one that cybersecurity professionals can't afford to ignore.

Related Content:



Register now for this year's fully virtual Black Hat USA, scheduled to take place August 1–6, and get more information about the event on the Black Hat website. Click for detail on conference information and to register.

Bernard Brode is a product researcher at Microscopic Machines and remains eternally curious about where the intersection of AI, cybersecurity, and nanotechnology will eventually take us. View Full Bio

Recommended Reading:

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 10/13/2020
Where Are the 'Great Exits' in the Data Security Market?
Dave Cole, Cofounder and CEO, Open Raven,  10/13/2020
Overcoming the Challenge of Shorter Certificate Lifespans
Mike Cooper, Founder & CEO of Revocent,  10/15/2020
Register for Dark Reading Newsletters
White Papers
Current Issue
Special Report: Computing's New Normal
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
How IT Security Organizations are Attacking the Cybersecurity Problem
How IT Security Organizations are Attacking the Cybersecurity Problem
The COVID-19 pandemic turned the world -- and enterprise computing -- on end. Here's a look at how cybersecurity teams are retrenching their defense strategies, rebuilding their teams, and selecting new technologies to stop the oncoming rise of online attacks.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2020-10-19
A prototype pollution vulnerability has been found in `object-path` <= 0.11.4 affecting the `set()` method. The vulnerability is limited to the `includeInheritedProps` mode (if version >= 0.11.0 is used), which has to be explicitly enabled by creating a new instance of `object-path` and settin...
PUBLISHED: 2020-10-19
On Windows the Veyon Service before version 4.4.2 contains an unquoted service path vulnerability, allowing locally authenticated users with administrative privileges to run malicious executables with LocalSystem privileges. Since Veyon users (both students and teachers) usually don't have administr...
PUBLISHED: 2020-10-19
An exploitable denial of service vulnerability exists in the ENIP Request Path Logical Segment functionality of Allen-Bradley Flex IO 1794-AENT/B 4.003. A specially crafted network request can cause a loss of communications with the device resulting in denial-of-service. An attacker can send a malic...
PUBLISHED: 2020-10-19
An exploitable denial of service vulnerability exists in the ENIP Request Path Logical Segment functionality of Allen-Bradley Flex IO 1794-AENT/B 4.003. A specially crafted network request can cause a loss of communications with the device resulting in denial-of-service. An attacker can send a malic...
PUBLISHED: 2020-10-19
A flaw was found in Infinispan version 10, where it permits local access to controls via both REST and HotRod APIs. This flaw allows a user authenticated to the local machine to perform all operations on the caches, including the creation, update, deletion, and shutdown of the entire server.