By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
TechgoonduTechgoonduTechgoondu
  • Audio-visual
  • Enterprise
    • Software
    • Cybersecurity
  • Gaming
  • Imaging
  • Internet
  • Media
  • Mobile
    • Cellphones
    • Tablets
  • PC
  • Telecom
Search
© 2023 Goondu Media Pte Ltd. All Rights Reserved.
Reading: Quantum-safe networks: A vital first step in securing the future 
Share
Font ResizerAa
TechgoonduTechgoondu
Font ResizerAa
  • Audio-visual
  • Enterprise
  • Gaming
  • Imaging
  • Internet
  • Media
  • Mobile
  • PC
  • Telecom
Search
  • Audio-visual
  • Enterprise
    • Software
    • Cybersecurity
  • Gaming
  • Imaging
  • Internet
  • Media
  • Mobile
    • Cellphones
    • Tablets
  • PC
  • Telecom
Follow US
© 2023 Goondu Media Pte Ltd. All Rights Reserved.
Techgoondu > Blog > Cybersecurity > Quantum-safe networks: A vital first step in securing the future 
CybersecurityEnterprise

Quantum-safe networks: A vital first step in securing the future 

Grace Chng
Last updated: December 11, 2024 at 9:50 AM
Grace Chng
Published: December 11, 2024
7 Min Read
SHARE
A 3D render of a quantum computer core. ILLUSTRATION: Unsplash

While everyone’s gaze has been firmly on AI in the past two years, Google surprised the world yesterday with a quantum computing chip that could bring practical quantum computing closer to reality.

Called Willow, the chip does in minutes what it would take leading supercomputers 10 septillion years – longer than the existence of the universe – to complete. It can accelerate drug discovery, fusion energy and battery design among other areas.

Google has been fast to state that a Willow-based quantum computer is still years away. What’s clear to those who have been watching the development of such breakthroughs is that it’s time to accelerate those quantum-safe efforts.

By quantum-safe, it means creating cybersecurity tools that are safe from the encryption-breaking power of new quantum computers. This encryption that has been protecting private data, from banking details to personal data, as it is transmitted across the Net today is in peril otherwise.

Notably, the first wave of tools to protect networks against cryptographic attacks from quantum computers mark the beginning of a new chapter in cybersecurity.  Published as standards in September by the United States National Institute of Standards and Technology (NIST), these tools cover general encryption and protecting digital signatures.

As quantum computing technology advances, the urgency to secure digital communications against potential breaches becomes increasingly critical. Introduced as a series of standards, the tools are not merely a final solution but rather the beginning of a broader journey towards comprehensive cryptographic security.

NIST collaborated with industry and academia on the standards development. IBM’s two algorithms, ML-KEM and ML-DSA, have been formally recognised in NIST’s standards. These algorithms are designed to withstand the anticipated capabilities of future quantum computers.

Lory Thorpe, IBM’s quantum research lead, pointed out during a recent visit to Singapore, that while the new standards provide essential building blocks, they cannot be seen as the sole protection against threats posed by cryptographically relevant quantum computers.

“We need to consider the breadth of applications and requirements in cryptographic capabilities,” she explained, underscoring the diverse ways encryption is used across industries. 

Her insights highlight the complexity of implementing these standards. For instance, in telecommunications, where she has two decades of experience, she noted that applying the standards effectively requires a granular understanding of the specific use cases.

In telecom networks, factors such as latency, resource constraints, and compatibility with IoT devices present unique challenges. 

This complexity isn’t limited to telcos. Financial services, healthcare, and other sectors face their own hurdles. “It’s not just about cryptography migration,” Thorpe said. “It needs to be embedded into a broader business transformation process, which takes time.” 

As organisations begin to think about these new standards, they must also grapple with the concept of a “quantum-safe network”. This term refers to systems designed to be resistant to attacks from quantum computers capable of breaking traditional encryption methods.

Experts predict that such quantum capabilities could emerge within the next decade, leading to concerns about data that is currently protected potentially being compromised in the future through “harvest now, decrypt later” strategies.

While commercial quantum computers are expected around 2030, governments worldwide have begun to take varied approaches to quantum safety. The US has set timelines for organisations to implement quantum-safe measures. Canada has issued detailed guidelines to aid implementation. 

Singapore authorities are no laggard here. The Monetary Authority of Singapore has already begun mandating quantum-safe network tests especially for the financial services sector. The Cyber Security Agency of Singapore too will be setting guidelines to prepare for quantum safe systems.

The pressing concern arises from quantum computing’s ability to exponentially increase computational power, enabling it to crack the encryption algorithms that currently safeguard sensitive data and critical systems worldwide.

The path to quantum safety isn’t always straightforward. Many organisations lack the extra capital for extensive testing and upgrades.

A parallel can be drawn to the Y2K crisis – organisations that delayed preparations ended up spending significantly more as the year 2000 loomed. The lesson? Starting early not only saves money but also ensures smoother transition. 

Thorpe warned that those who delay adopting quantum-safe measures may find themselves facing more severe consequences down the line.

The ultimate goal is not to create impenetrable networks—an impossible standard—but to build resilience. Quantum-safe standards is not a one-and-done solution.

As Thorpe succinctly pointed out: “I would be thinking more in terms of how resilient networks are to an attack, rather than, is this going to be safe forever?” 

IBM, for example, is advocating for automation in discovering and remediating cryptographic implementations within networks. By streamlining this process, organisations can more efficiently adapt their systems without having to build entirely new solutions from scratch.

Automating the discovery of cryptography use within networks and applying remediation patterns efficiently will be critical in scaling adoption. Enterprises need to move beyond viewing standards as a compliance checkbox and embrace them as a foundation for more agile and robust cybersecurity frameworks. 

The path forward necessitates collaboration among stakeholders across various sectors to ensure that all networks can work seamlessly within a quantum-safe framework. 

Aligning global standards is crucial for interoperability and backward compatibility, issues that will become increasingly complex as hybrid quantum-classical systems emerge.

Ultimately, the key thing is to view quantum-safe standards as an evolving story. The recently published standards in the US represent an important milestone, a critical starting point for a much larger, ongoing effort.

Since it takes a several years for organisations to fully transition to a quantum-safe network, they must start now or face a growing risk of cyber attacks in future.

Salesforce bolsters cloud services with platform moves
Get your team on SkyDesk Projects
Internet of Things gains momentum amid challenges
Facing cyber threats, businesses can run apps securely with Parallels Desktop for Mac
VMware, start-ups racing to dominate the hyper convergence era
TAGGED:encryptionIBMquantum computingquantum-safethinktop

Sign up for the TG newsletter

Never miss anything again. Get the latest news and analysis in your inbox.

By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Whatsapp Whatsapp LinkedIn Copy Link Print
Avatar photo
ByGrace Chng
Follow:
A seasoned writer, author and industry observer, Grace was the key tech writer for The Straits Times for more than three decades. She co-founded and edited Computer Times, later renamed Digital Life. She helmed this publication, the de facto national IT magazine, for nearly 19 years. Grace is also the editor and co-curator of Intelligent Island: The Untold Story of Singapore’s Tech Journey, a book highlighting Singapore’s ICT development.
Previous Article Stalker 2 review: Walking in a nuclear winter wonderland
Next Article Google Agentspace promises to simplify enterprise AI workflows
Leave a Comment

Leave a ReplyCancel reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Stay Connected

FacebookLike
XFollow

Latest News

A*Star, GlobalFoundries partnership pushes envelop on advanced packaging
Enterprise
May 22, 2025
Clair Obscur: Expedition 33 review: Rage against aging
Gaming
May 22, 2025
Computex 2025: A glimpse of the machines inside Nvidia’s “AI factories”
Enterprise
May 22, 2025
The three megatrends shaping society and technology
Enterprise Internet
May 21, 2025

Techgoondu.com is published by Goondu Media Pte Ltd, a company registered and based in Singapore.

.

Started in June 2008 by technology journalists and ex-journalists in Singapore who share a common love for all things geeky and digital, the site now includes segments on personal computing, enterprise IT and Internet culture.

banner banner
Everyday DIY
PC needs fixing? Get your hands on with the latest tech tips
READ ON
banner banner
Leaders Q&A
What tomorrow looks like to those at the leading edge today
FIND OUT
banner banner
Advertise with us
Discover unique access and impact with TG custom content
SHOW ME

 

 

POWERED BY READYSPACE
The Techgoondu website is powered by and managed by Readyspace Web Hosting.

TechgoonduTechgoondu
© 2024 Goondu Media Pte Ltd. All Rights Reserved | Privacy | Terms of Use | Advertise | About Us | Contact
Join Us!
Never miss anything again. Get the latest news and analysis in your inbox.

Zero spam, Unsubscribe at any time.
 

Loading Comments...
 

    Welcome Back!

    Sign in to your account

    Username or Email Address
    Password

    Lost your password?