Go back

What does the future of cybersecurity look like?

published by James Olsen. 15:32:35GMT+10 Wed, March 26

In 2024 the Australian and Queensland governments confirmed a $1B investment into the production of a working quantum computer; meanwhile Microsoft and IBM continued to experience breakthroughs in this ongoing technological arms race [1][2][3]. We are rapidly approaching the point of commercial quantum computers, yet few organisations are prepared for these significant changes.

With these threats to cybersecurity growing increasingly relevant, post-quantum cryptography is needed sooner rather than later. In this article we will explore the challenges that quantum technology will bring to our cyber environment, and how CyberDefence Advisory is preparing for this future.

What are quantum computers?

They have been talked about for decades and feature heavily in science-fiction, but they are very much real and becoming more real with each passing year. Working quantum computers that are commercially viable are not yet ready but there is certainly no shortage of funding and investment across the world to ensure they are ready as soon as possible.

So, why the investment? Quantum computers are capable of performing certain functions that a classical computer (i.e. the device you are reading this on) can't perform... or would take until the heat death of the universe to perform [4]. While a lot of the applications of quantum computing remain theoretical or academic, one application that has already been proven on a smaller scale is the cracking of cryptographic algorithms [5][6].

What impact will this have?

Significant amounts of all internet traffic currently circulating the world relies on a cryptographic algorithm known as RSA [7]. At its base, RSA utilises the fact that it is simple to multiply 2 large prime numbers, but practically impossible (for a classical computer) to find which 2 large prime numbers were multiplied together to create the result (assuming no prior knowledge of either of the 2 numbers) [4]. Such simple and efficient cryptography allows for any data to be easily encrypted and only decrypted by those with the necessary key.

However, Shor's Algorithm describes how quantum computers can discover these 2 prime numbers, and hence decrypt any encrypted data without the necessary key [5]. Assuming a working quantum computer all data encrypted with RSA would immediately be vulnerable to those with malicious intent.

What can be done?

It is here where the risk lies for the future, and where CyberDefence Advisory is working hard to prevent such potential threats. There are numerous post-quantum cryptographic algorithms being developed across the world, but most aren't close to being ready for commercial use or aren't compatible with most use-cases. We are currently developing post-quantum cryptographic algorithms designed with the needs of individuals and organisations in mind, to suit these use-cases that are so far being missed. Such research and development is informed by NIST's and ASD's standards [8][9].

If you are interested in finding out more and what CyberDefence Advisory can do to protect you or your organisation, contact us here.