Skip to main content
Contact us
Contact us
quantum cryptography
Article

Will Quantum Cryptography Make or Break Modern Cyber Security?

Far more powerful and capable of a great deal more than ‘traditional’ computers, quantum computers may be the natural next step in technological development. However, they also pose a considerable risk to existing cybersecurity measures.

Here, we take a look at whether developments in quantum computing and quantum cryptography will result in the creation of appropriate security technology, or whether they will put individuals, businesses and government software in unprecedented danger.

The Risks

Modern cybersecurity is largely based on the practice of cryptography. Simply put, this is the use of large numbers and complex calculations to create complex keys that cannot be cracked easily. However, quantum computers’ ability to perform certain calculations at a much faster rate may render such defences useless.

In a world defined by digital technology, this has enormous ramifications.On a basic level, it leaves personal communications, finances, digital devices and internet applications open to attack. Developing Internet of Things technology means that everyday devices in the home, ranging from thermostats to lighting, are vulnerable. For businesses, it increases the likelihood of fraud and corporate espionage. On a global level, it puts nations at risk. After all, if no information is safe from your enemies, how secure can you be?

Developments in cybersecurity

Quantum computing demonstrates that cybersecurity threats are continually evolving and that so must our preventative actions. Fortunately, quantum mechanics itself may offer hope of a solution. Currently, there are two distinct directions in which post-quantum cybersecurity is heading.

The first is a new type of post-quantum cryptography that will be able to withstand the power of quantum computers. Second, there is a significant amount of research being conducted into quantum key distribution (QKD). QKD makes the most of an interesting characteristic inherent in sub-atomic particles that’s known as quantum indeterminacy. This is the idea that measuring something has an effect on its original state or alters it. QKD uniquely utilises this to guarantee the security of a transmission. If a hostile third party attempts to ‘listen in' on the transmission of data, they must identify and measure it, altering the qubits themselves and alerting the sender and recipient to any interference. Technically, this allows for data transfer over unsecured channels.

Conclusion

As with all technological progress, there are risks inherent in quantum computing – particularly regarding cybersecurity. However, such technology is also likely to contain the seed from which new cybersecurity measures are developed. At this moment in time, a significant amount of work is being conducted into new post-quantum security, and it seems probable that solutions will be found.

Unfortunately, this may not be the real risk. It is estimated that we are around 15-20 years from the proper implementation of quantum computers. In the grand scheme of things, this is not a long time. If businesses and governments don’t begin to consider their post-quantum security policy in the immediate future, we may find that quantum computing matures before our security response. That being the case, it’s vital we start taking steps to secure ourselves from this new threat as soon as possible.

To find out more about the quantum computing security threat, discover how you can begin shaping your response and ensure the integrity of your business’ digital systems, contact our experienced team of professionals.

Have a question?
Speak to an expert
сyber-security-services-head-min
Explore our cyber security services
cta Explore our cyber security services
Contact Us
  • We need your name to know how to address you
  • We need your phone number to reach you with response to your request
  • We need your country of business to know from what office to contact you
  • We need your company name to know your background and how we can use our experience to help you
  • Accepted file types: jpg, gif, png, pdf, doc, docx, xls, xlsx, ppt, pptx, Max. file size: 10 MB.
(jpg, gif, png, pdf, doc, docx, xls, xlsx, ppt, pptx, PNG)

We will add your info to our CRM for contacting you regarding your request. For more info please consult our privacy policy
  • This field is for validation purposes and should be left unchanged.

The breadth of knowledge and understanding that ELEKS has within its walls allows us to leverage that expertise to make superior deliverables for our customers. When you work with ELEKS, you are working with the top 1% of the aptitude and engineering excellence of the whole country.

sam fleming
Sam Fleming
President, Fleming-AOD

Right from the start, we really liked ELEKS’ commitment and engagement. They came to us with their best people to try to understand our context, our business idea, and developed the first prototype with us. They were very professional and very customer oriented. I think, without ELEKS it probably would not have been possible to have such a successful product in such a short period of time.

Caroline Aumeran
Caroline Aumeran
Head of Product Development, appygas

ELEKS has been involved in the development of a number of our consumer-facing websites and mobile applications that allow our customers to easily track their shipments, get the information they need as well as stay in touch with us. We’ve appreciated the level of ELEKS’ expertise, responsiveness and attention to details.

samer-min
Samer Awajan
CTO, Aramex