Electronic Design
  • Resources
  • Directory
  • Webinars
  • CAD Models
  • Video
  • Blogs
  • More Publications
  • Advertise
    • Search
  • Top Stories
  • Tech Topics
  • Analog
  • Power
  • Embedded
  • Test
  • AI / ML
  • Automotive
  • Data Sheets
  • Topics
    - TechXchange Topics --- Markets --AutomotiveAutomation-- Technologies --AnalogPowerTest & MeasurementEmbedded
    Resources
    Electronic Design ResourcesTop Stories of the WeekNew ProductsKit Close-UpElectronic Design LibrarySearch Data SheetsCompany DirectoryBlogsContribute
    Members
    ContentBenefitsSubscribeDigital editions
    Advertise
    https://www.facebook.com/ElectronicDesign
    https://www.linkedin.com/groups/4210549/
    https://twitter.com/ElectronicDesgn
    https://www.youtube.com/channel/UCXKEiQ9dob20rIqTA7ONfJg
    1. Technologies
    2. Embedded
    3. Security

    Why Quantum Cybersecurity is Imperative

    Oct. 30, 2023
    QuProtect leverages quantum-safe cryptography for secure communications wherever data travels, with complete cryptographic control for adaptive protection against classical and emerging threats.
    Alix Paultre
    Related To: Electronic Design

    This video is part of the TechXchanges: Cybersecurity and Quantum Computing and Security.

    With the ability to simulate highly complex systems and interactions, the game-changing capabilities of quantum computers is making the creation of up-to-date cybersecurity solutions more challenging. Addressing this challenge, Qusecure has created QuProtect, which can be adapted to suit specific business and industry requirements and challenges. The all-in-one software-based solution can secure your data assets and gain additional control over your cryptography.

    QuProtect leverages quantum-safe cryptography for secure communications wherever data travels with complete cryptographic control for adaptive protection against classical and emerging threats. In this third part of a three-part series, we talk to Skip Sanzeri, Co-Founder, Board Chair, and COO of QuSecure, about quantum computing and cybersecurity in today's cloud-based data-oriented world.

    The Quantum Cryptography Threat

    When it comes to the binary-based security currently used in connected systems, its utility fades rapidly in the face of quantum computing. For example, the internet was built on systems whose security came from factoring large numbers. However, a quantum computer can break that when they become powerful enough, and that time is rapidly approaching.

    In terms of the number of qubits needed to crack RSA, 2,048 is about 4,100, which is still over the horizon. People are finding workarounds to that, though, using approaches like entangled multiple quantum computers. So by using 14 quantum computers, each with 300 qubits, you can entangle all of those together and run one process to access that "secured" data.

    It may be a decade before we have a 4,100-qubit quantum computer, but there will probably be 300-qubit versions in a few years. This is an issue because certain data may be stolen or harvested that's currently encrypted, but could be decrypted in the future using quantum systems. And some data has a long shelf life of 25, 50, or 75 years or more, like banking information, military secrets, and healthcare information. Thus, that data is going to be valuable and has to be protected.

    Many international players are taking data in, and if and when they can crack that data may only be a matter of time. This is why we need quantum-computing safety and quantum cybersecurity solutions in place right now. Otherwise, any data that gets stolen today is going to be at risk in the future. 

    Quantum Algorithms

    Companies like QuSecure are developing quantum algorithms for security solutions. One example of these new algorithms uses technology called lattice-based infrastructures, where the key is hidden somewhere in a 400-dimension space. Even a quantum computer runs up against problems with that.

    NIST has approved an algorithm called Kyber, so that if they take your data, it's secured with this post quantum algorithm. Even if it's stolen, the data will have decades of resilience. The resilience is key—it's not about stopping every single hack, but having resilience for that data cannot be cracked. There are even processes being developed using entanglement itself as a means of detecting intrusion.

    Part 1: Cybersecurity from the Developer's Seat

    Part 2: What's So Special Special About Quantum Computing?

    Part 3: Why Quantum Cybersecurity is Imperative (video above)

    Related links:

    • QuSecure
    • TechXchange: Cybersecurity
    • TechXchange: Quantum Computing and Security

    Continue Reading

    What’s So Special About Quantum Computing?

    High-Level Synthesis Drives Next-Gen Edge AI Accelerators

    Sponsored Recommendations

    Designing automotive-grade camera-based mirror systems

    Dec. 2, 2023

    Design security cameras and other low-power smart cameras with AI vision processors

    Dec. 2, 2023

    Automotive 1 TOPS vision SoC with RGB-IR ISP for 1-2 cameras, driver monitoring, dashcams

    Dec. 2, 2023

    AM62A starter kit for edge AI, vision, analytics and general purpose processors

    Dec. 2, 2023

    Comments

    To join the conversation, and become an exclusive member of Electronic Design, create an account today!

    I already have an account

    New

    Bob Pease on Analog Vol. 3

    Environmental Sensors Target Air Quality

    Whitepaper: IoT Connectivity Considerations and Wi-Fi 6E

    Most Read

    Celebrating Field Engineers: The Unsung Heroes of Innovation

    More Bob Pease on Analog

    2023 Nobel Prizes for Physics and Chemistry Have Direct EE Relevance


    Sponsored

    Edge AI retail scanner demo: SoC selection and power usage

    STM32WBA - 2.4GHz wireless microcontroller with SESIP Level 3 security

    What’s the best type of computer vision for AI applications?

    Electronic Design
    https://www.facebook.com/ElectronicDesign
    https://www.linkedin.com/groups/4210549/
    https://twitter.com/ElectronicDesgn
    https://www.youtube.com/channel/UCXKEiQ9dob20rIqTA7ONfJg
    • About Us
    • Contact Us
    • Advertise
    • Do Not Sell or Share
    • Privacy & Cookie Policy
    • Terms of Service
    © 2023 Endeavor Business Media, LLC. All rights reserved.
    Endeavor Business Media Logo