breaking news
  • Taiwan: 9 Dead, Buildings Tilt, Bridges & Cars Shake In Island's Strongest Earthquake In 25 Yrs
  • Amit Shah to campaign in five TN LS constituencies on Thursday
  • Special module to prepare kids for formal education in UP
  • JFK Airport Taxi dispatchers charged with taking bribes
  • A million simulations show US debt is on an 'unsustainable' path
  • 'This could be 100 times worse than Covid': Bird flu warning from scientists who say HALF of infections with H5N1 in people are fatal

View Details

The South Asian Insider

India Needs to Equip Itself for the Age of Quantum Cybersecurity



A s the concept and applications of quantum computers transcend into the realm of reality, it is time that the world acknowledges the positive and negative impacts of such devices and technologies. While the potential of quantum computers is still being explored at large, there are specific instances of quantum computers having a massive impact on existing systems and technologies. With the commercial aspects and applications of quantum computing still remaining in their infancy, research using existing quantum computers provides an accurate glimpse into the effects of such devices in the near future.
One such area of definitive impact that quantum computing has remains the field of cybersecurity. While the prospects of quantum technologies provide a more secure and safe environment for the existing ecosystem, it also poses a variety of threats to cyberspace. With the development of defensive quantum capabilities such as quantum key distribution (QKD) techniques, there is a focus on providing security solutions against current and future quantum technology applications. However, this is eclipsed by the immense security risks that quantum computing poses for existing cryptographic systems.
In this quantum age, it is imperative to address the detrimental impact of quantum computing on cybersecurity, especially the ease with which such computers can break any in-use cryptographic models, techniques and protocols. With adversaries like China rapidly gaining and leading the quantum race, especially in the field of computing and communications, there is a need for increased focus on the particular field. India needs to provide more resources and funding for the conceptualisation, standardisation and development of ‘quantum resistant cryptography’ to ramp up its cybersecurity efforts.
FOCUS ON QUANTUM RESISTANT CRYPTOGRAPHY
Currently, the most commonly used cryptography model (and its different algorithms) remains the asymmetric/public-key encryption model. Public-key encryption uses a pair of keys, one for encrypting data and the other for decrypting it. The message is encoded using a public key, and it is decoded using a private key. Such encryption techniques like the RSA employ algorithms that permit the message to be decrypted by the legitimate holder of the private key. These keys are challenging for traditional computers to crack because information encoded for the recipient’s public key can only be unlocked by his private key.
These encryption techniques will be rendered useless against a modern-day quantum computer. Recent public-key cryptography techniques are predicated on the idea that while classical computers can compute enormous numbers, such as multiplying large prime numbers, they require years of processing to identify the factors of such a massive product. In other words, public-key cryptography is simple to use in one way but difficult to reverse. A professor at MIT, Peter Shor, devised a hypothesis in the 1990s that quantum computers could instantly divide huge numbers (integers) into their primes. This algorithm, known as Shor’s Algorithm, describes the ability of such systems to break down complex encryption techniques in very short time periods.
Although the commercial capability of quantum computers remains out of reach currently, the pace at which technological developments have taken place in recent times showcases the urgency of the situation. While the number of quantum computers (almost all housed at research institutes or tech companies) is in its infancy and mostly used for only research purposes, it is time that ‘post-quantum cryptography’ is paid due diligence considering the cybersecurity (especially offensive attacks on critical ICT infrastructure) vulnerabilities it poses.
US AND CHINA TAKING THE LEAD
In light of China’s recent ‘quantum leaps’ and rising cross-border cyberattacks, the US has taken the first steps towards increasing its preparedness for post-quantum cryptography. The National Security Agency (NSA) developed the first set of quantum-resistant encryption algorithms known as the ‘Suite B Quantum-Resistant Cryptography’. The National Institute for Standards and Technology (NIST) has also been engaged in developing a new set of encryption standards and tools to handle quantum computer attacks. Specifically, it has been working on combining four new encryption algorithms to form a new cryptographic standard by the year 2024.
This has not been the only development in the US. In early January 2023, President Biden officially signed the Quantum Computing Cybersecurity Preparedness Act. This was aimed at all federal agencies to prioritise shifting to post-quantum encryption systems in light of future cyber threats from quantum computers.
(Contd on page 22)