<<

ExpertInsights@IBV

Wielding a double-edged sword

Preparing cybersecurity now for a world IBM Institute for Business Value 2 Wielding a double-edged sword

A call to action

Large-scale quantum computers will significantly expand computing power, creating new opportunities for improving cybersecurity. Quantum-era cybersecurity will wield the power to detect and deflect quantum-era cyberattacks before they cause harm. But it could become a double-edged sword, as may also create new exposures, such as the ability to quickly solve the difficult math problems that are the basis of some forms of . While post-quantum standards are still being finalized, businesses and other organizations can start preparing today. Wielding a double-edged sword 3

Here comes quantum computing

Quantum mechanics is a branch of physics algorithm. Adopted by the US government, How quantum computing that explores how the physical world works the AES algorithm supports three sizes: computes at a fundamental level. At the quantum level, 128 bits, 192 bits, and 256 bits.3 Symmetric particles can take on more than one state at algorithms typically are used for bulk encryption Instead of using binary bits of 0s and 1s, as classical computers do, quantum the same time, and they can have their states tasks, such as enciphering major databases, file computers use quantum bits, or “,” correlated even when separated by a large systems and object storage. as very complex switches. Due to their distance. Quantum computing harnesses these enhanced processing power, quantum quantum phenomena to process information in a In asymmetric encryption, data is encrypted computers are expected to solve prob- profoundly new way.1 The worldwide market for using one key (usually referred to as the public lems that are “intractable” using today’s machines.4 Two qubits can represent 4 quantum computing is predicted to be more key) and is decrypted using another key (usually values simultaneously. Three qubits can 2 referred to as the private key). Although the than USD 10 billion by 2024. represent 23 or 8 values simultaneously. private key and public key are different, they are Fifty qubits can represent more than one Today’s classical computers use two primary mathematically related. The widely employed quadrillion values simultaneously, and classes of algorithms for encryption: symmetric Rivest, Shamir, Adleman (RSA) algorithm is an 100 qubits can represent more than one and asymmetric. In symmetric encryption, example of an asymmetric algorithm. Even quadrillion squared.5 the same key is used to encrypt and decrypt a though it is slower than symmetric encryption, given piece of data. The Advanced Encryption asymmetric algorithms solve the problem of Standard (AES) is an example of a symmetric key distribution, which is an important issue in encryption. 4 Wielding a double-edged sword

Quantum risks to cybersecurity

The advent of quantum computing will lead to running Grover’s algorithm, which uses quantum A cryptographic future changes to encryption methods. Currently, the concepts to search databases very quickly, could The first interoperable data encryption most widely used asymmetric algorithms are provide a quadratic improvement in brute-force standard, called DES, and the ubiquitous based on difficult mathematical problems, such attacks on symmetric encryption algorithms, HMAC standard are the cornerstones 7 of most of today’s data authentication as factoring large numbers, which can take such as AES. To help withstand brute-force schemes. For the quantum era, new cryp- thousands of years on today’s most powerful attacks, key sizes should be doubled to support tographic algorithms that protect systems supercomputers. However, research conducted the same level of protection. For AES, this means against current and future threats are by Peter Shor at MIT more than 20 years ago using 256-bit keys to maintain today’s 128-bit under development by several compa- demonstrated the same problem could security strength.8 nies, including IBM. One example: a new generation of lattice-based cryptography theoretically be solved in days or hours on a 6 Even though large-scale quantum computers designed to provide security from attacks large-scale quantum computer. Future quantum by both quantum and classical com- computers may be able to break asymmetric are not yet commercially available, initiating puters. Another example is called “fully encryption solutions that base their security on quantum cybersecurity solutions now has homomorphic encryption,” which may or discrete logarithms. significant advantages. For example, a malicious make it possible to perform unrestricted entity can capture secure communications of operations over encrypted data without Although symmetric algorithms are not affected interest today. Then, when large-scale quantum surrendering confidentiality. by Shor’s algorithm, the power of quantum computers are available, that vast computing computing necessitates a multiplication in key power could be used to break the encryption sizes. For example, large quantum computers and learn about those communications. Wielding a double-edged sword 5

Wielding the power of quantum cybersecurity

Eclipsing its potential risks, quantum Quantum computing may speed up machine cybersecurity can provide more robust learning, enhancing its efficacy for cybersecurity. Generating random numbers and compelling opportunities to safeguard For example, quantum-enhanced machine One way to look at the difference critical and personal data than currently learning could expedite the classification of between PRNGs and TRNGs is thinking about spinning a roulette wheel. PRNGs possible. It is particularly useful in quantum massive amounts of data. generate random numbers by spinning machine learning and quantum random Quantum . Random the wheel many times and keeping a list number generation. number generation is essential in cryptography. of the outcomes. When a random number is required, it provides the next answer Machine learning already has numerous The two main categories of classical random on the list. The random number is already applications in cybersecurity, including: number generation are pseudo random number predetermined. TRNGs work by spinning generators (PRNGs) and true random number –– Behavior anomaly detection: recognizing the wheel each time a random number is generators (TRNGs). required without a pre-determined list.9 anomalous activities, such as access from a new device, new location or at a new time. Quantum Random Number Generators (QRNGs) –– Classification: categorizing entities such can be thought of as a special case of TRNGs in as data, users, threat actors or malware. which the data is the result of quantum events. But unlike traditional TRNGs, QRNGs promise –– Prediction: anticipating events such as truly random numbers by exploiting the inherent a network or database threat. randomness in quantum physics. A true random number generator provides the highest level of security because the number generated is impossible to guess. 6 Wielding a double-edged sword

Getting started

To prepare for the coming post-quantum –– Symmetric encryption algorithms: Where A recipe for a smooth transi- cryptography era, enterprise leaders can symmetric algorithms remain appropriate tion take four steps now: in your organization in the quantum era, at In the cybersecurity world, much has least double the key sizes currently being been conjectured about quantum 1. Identify, retrain or recruit for the necessary used to help ensure an appropriate future computers’ eventual ability to breach quantum cybersecurity skills, either directly level of security strength. 10 current cryptography. Before that day or through your organization’s ecosystem. arrives, forward-thinking enterprises are –– Asymmetric encryption algorithms: These experts should become your implementing cybersecurity solutions Identify where asymmetric algorithms organization’s cybersecurity champions. that protect against both classical and are in use today and plan to switch to quantum-based computing attacks They can collaborate with standards bodies, post-quantum alternatives. ensuring their transition to the quantum deduce the implications of various potential –– Hashing algorithms: Assess the output era to be a smooth one. quantum cybersecurity approaches and sizes currently being used and plan to use create your organization’s quantum security larger output sizes. transition plan. 3. Keep up-to-date with advances in 2. Begin identifying where post-quantum post-quantum cybersecurity standards security methods should be adopted and emerging post-quantum security throughout your organization by solutions, such as lattice-based approaches, assessing your potential quantum-era code-based cryptography, multivariate security exposure: cryptography and hash-based cryptography, among others. 4. Work with encryption solution providers to deploy quantum-safe alternatives as they become available. Wielding a double-edged sword 7

Experts on this topic

Notes and sources Walid Rjaibi 1 “What is quantum computing?” IBM. https://www. 6 Nordstrom, Amy. “Quantum Computer Comes Closer IBM Distinguished Engineer and to Cracking RSA Encryption.” IEEE Spectrum. March 3, research.ibm.com/ibm-q/learn/what-is-quantum- Chief Technical Officer for Data Security computing/ 2016. https://spectrum.ieee.org/tech-talk/computing/ hardware/encryptionbusting-quantum-computer- IBM Security 2 “Quantum Computing Technologies & Global Market, practices-factoring-in-scalable-fiveatom-experiment https://www.linkedin.com/in/ 2017-2024 Volume 1.” Homeland Security Research Corp. 2017. 7 “Quantum Computing Now Has a Powerful Search walid-rjaibi-cissp-8325077/ Tool.” MIT Technology Review. April 5, 2017. https:// [email protected] 3 “Cryptographic algorithm and key length.” IBM. www.technologyreview.com/s/604068/quantum- https://www.ibm.com/support/knowledgecenter/ computing-now-has-a-powerful-search-tool/ en/SSWPVP_3.0.0/com.ibm.sklm.doc/overview/cpt/ cpt_ic_oview_tech_cryptographic_algorithm.html 8 Chang, Linus. “How secure is today’s encryption Sridhar Muppidi against quantum computers?” betanews. October 13, 4 How do quantum computers work? https://www. 2017. https://betanews.com/2017/10/13/current- IBM Fellow, Vice President and research.ibm.com/ibm-q/learn/what-is-quantum- encryption-vs-quantum-computers/ Chief Technical Officer computing/ 9 Haahr, Mads, Dr. “Introduction to Randomness and IBM Security 5 Pednault, Edwin. “Quantum Computing: Breaking Random Numbers.” Random.org. https://www.random. https://www.linkedin.com/in/smuppidi/ Through the 49 Simulation Barrier.” IBM. org/randomness/ October 17, 2017. https://www.ibm.com/blogs/ [email protected] research/2017/10/quantum-computing-barrier/ 10 “IBM Multi-Cloud Data Encryption.” IBM. https://www. ibm.com/us-en/marketplace/cloud-data-encryption Mary O’Brien Vice President, Development About ExpertInsights@IBV reports IBM Security https://www.linkedin.com/in/ ExpertInsights@IBV represents the opinions mary-o-brien-4946a590/ of thought leaders on newsworthy business [email protected] and related technology topics. They are based upon conversations with leading subject matter experts from around the globe. For more infor- mation, contact the IBM Institute for Business Value at [email protected]. © Copyright IBM Corporation 2018

New Orchard Road Armonk, NY 10504 Produced in the of America July 2018

IBM, the IBM logo and ibm.com are trademarks of International Business Machines Corp., registered in many jurisdictions worldwide. Other product and service names might be trademarks of IBM or other companies. A current list of IBM trademarks is available on the Web at “Copyright and trademark information” at www.ibm.com/legal/copytrade.shtml.

This document is current as of the initial date of publication and may be changed by IBM at any time. Not all offerings are available in every country in which IBM operates.

THE INFORMATION IN THIS DOCUMENT IS PROVIDED “AS IS” WITHOUT ANY WARRANTY, EXPRESS OR IMPLIED, INCLUDING WITHOUT ANY WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND ANY WARRANTY OR CONDITION OF NON-INFRINGEMENT. IBM products are warranted according to the terms and conditions of the agreements under which they are provided.

This report is intended for general guidance only. It is not intended to be a substitute for detailed research or the exercise of professional judgment. IBM shall not be responsible for any loss whatsoever sustained by any organization or person who relies on this publication.

The data used in this report may be derived from third-party sources and IBM does not independently verify, validate or audit such data. The results from the use of such data are provided on an “as is” basis and IBM makes no representations or warranties, express or implied.

39017839USEN-00