AI Content Chat (Beta) logo

Technology Vision 2023 | When Atoms meet Bits #TechVision Another serious security issue for every business later” threats. One of these countermeasures is to stems from quantum computing. Shor’s algorithm protect the distribution of keys, and here, quantum Companies are going provides a quantum-theoretical solution to prime computing becomes our security ally. For example, to want to get involved factorization, which can break public-key encryption in early 2022, researchers from JPMorgan Chase, in this compressed that we rely on today. Quantum computers simply Toshiba, and Ciena demonstrated the full viability aren’t advanced enough yet to do so, but they’re of a Quantum Key Distribution (QKD) network, innovation, and soon. 292 getting there at a breakneck pace. While some supporting 800 Gbps data rates—showing that ere’s no longer believe quantum computers will break encryption under real-world environmental conditions, this time to sit back and in the next 10 to 20 years, the reality is that smaller, network could enable secure communications and wait, the big bang of more targeted attacks will happen soon, and successfully defend against quantum computing- companies will need to have plans to address this based attacks.293 computing and science in the next two years. Already, there are serious is happening now. concerns that hackers are collecting data now to As the positive feedback loop between science decrypt later once quantum computing is ready, also and technology accelerates, understanding both referred to as “store now, decrypt later” schemes. the risks and the opportunities ahead is critical. Companies are going to want to get involved in this compressed innovation, and soon. There’s no longer Currently, NIST has identi昀椀ed some quantum- resistant algorithms, but predictions on their viable time to sit back and wait, the big bang of computing lifecycle vary. What we know is that these algorithms and science is happening now. will not last 20 years and we have to be agile with cryptographic methods, ready to upgrade at any time. In the meantime, companies should prepare to transition to post-quantum cryptography and potentially invest in countermeasures to reduce the immediate threat from “store now, decrypt

When Atoms meet Bits - Page 100 When Atoms meet Bits Page 99 Page 101