PaymentsJournal
No Result
View All Result
SIGN UP
  • Commercial
  • Credit
  • Debit
  • Digital Assets & Crypto
  • Digital Banking
  • Emerging Payments
  • Fraud & Security
  • Merchant
  • Prepaid
PaymentsJournal
  • Commercial
  • Credit
  • Debit
  • Digital Assets & Crypto
  • Digital Banking
  • Emerging Payments
  • Fraud & Security
  • Merchant
  • Prepaid
No Result
View All Result
PaymentsJournal
No Result
View All Result

How To Protect Your Company in the Age of Quantum Computing

By Nils Gerhardt
March 9, 2022
in Fraud & Security, Industry Opinions, Security
0
0
SHARES
0
VIEWS
Share on FacebookShare on TwitterShare on LinkedIn
How To Protect Your Company in the Age of Quantum Computing

Concept for electronic signature, distance business, mobile phone and contract hologram image for signature. remote collaboration, copy space. Mixed media

In a pre-digital world, documents would be secured and authenticated with a handwritten signature, however this was often prone to forgery and fraud. Modern digital signatures should, hypothetically, make this impossible as they are secured by mathematical operations that could take trillions of years for even the fastest computers to crack. How is quantum computing changing things?

They are so secure that most major countries consider a digital signature to be just as valid as a written signature. Or they have until now – new generations of quantum computers are being built, and they make it possible to crack the powerful encryption that forms the ‘root of trust’ in digital life.

How do we currently create trust?

Whether you are sending an email or signing a digital contract, you will likely be using a public key infrastructure (PKI). Here, one party signs a piece of information, such as an email, with a mathematically complex ‘private key’ that only they have access to, before the recipient then verifies the signature with a public key that can be shared with anyone. Only information secured with a valid private key can be unlocked with the corresponding public key.

Private keys are composed of long strings of zeros and ones (each one a bit), or symmetrical cryptography. If a key is only two bits long then guessing the correct value is easy, but the bigger the number of bits, the harder it is to crack.

What is the threat posed by quantum computing?

Quantum computers are not constrained by the common-sense laws that govern the computers that we have all been using to up until this point. Because of quantum superpositioning, a quantum bit (qubit) can be in more states than one and by that verify different combinations. With greater numbers of qubits, symmetric and asymmetric cryptography becomes much easier to break. This means that instead of taking trillions of years, a bad actor with access to a quantum computer could break the asymmetric encryption or digital signatures securing important information at speed.

It might seem perfectly reasonable to receive an email from your employee now, but once quantum computing becomes widespread there will be no way of ensuring the integrity, authenticity, and non-repudiation of any piece of information that is secured with quantum-unsafe cryptography. The possibility that any document that anyone has signed digitally could be brought into dispute could affect billions of people.

How to prepare for a post-quantum future

Forms of security and encryption that can withstand quantum computers have been developed and are already being implemented, and fortunately there is a long way to go until today’s cryptography will be considered insecure. Before then, regulatory, and legal changes will have to be made, including possible changes to the law that would require documents to be quantum-secure before considered as legally valid.

Companies should start to look at their own inventory of documents and data, assess how they are secured, and decide whether it is necessary to protect them. Many older and invalidated documents might have no value to cybercriminals and would therefore not need to be secured, whereas others may need protecting forever.

The time when organizations will need to introduce crypto agility is coming, so it is more necessary than ever to understand it and how to work with it, instead of against it.

0
SHARES
0
VIEWS
Share on FacebookShare on TwitterShare on LinkedIn
Tags: CybersecurityElectronic signatureEncryptioneSignatureIndustry Opinionsquantum computingSecurityTrust

    Get the Latest News and Insights Delivered Daily

    Subscribe to the PaymentsJournal Newsletter for exclusive insight and data from Javelin Strategy & Research analysts and industry professionals.

    Must Reads

    Proof That Fintechs Are Disrupting Banks:

    In Today’s Fintech Market, Value Is Everything

    August 30, 2024
    DFAST test

    Dodd-Frank Stress Tests: Good News for Now, Watch for a Rugged 2025

    August 29, 2024
    Real-Time Payments Adoption in the U.S. Requires a Pragmatic Approach, ISO 20022 messaging challenges

    ISO 20022 Brings the Challenge of Standardization to Swift Participants

    August 28, 2024
    open banking small banks credit unions

    Open Banking Can Be an Equalizer for Small Banks and Credit Unions

    August 27, 2024
    Payments 3.0

    Achieving Seamless and Holistic Transactions with Payments 3.0

    August 26, 2024
    embedded finance, ecommerce, consumers reduce spending

    Quality Over Quantity: Key Priorities in the Payment Experience

    August 23, 2024
    bots fraud

    Next-Generation Bots Pose Formidable Fraud Challenge

    August 22, 2024
    crypto custodians

    Crypto Custodians Could Bring a Revolution in Holding Assets

    August 21, 2024

    Linkedin-in X-twitter
    • Commercial
    • Credit
    • Digital Assets & Crypto
    • Debit
    • Digital Banking
    Menu
    • Commercial
    • Credit
    • Digital Assets & Crypto
    • Debit
    • Digital Banking
    • Emerging Payments
    • Fraud & Security
    • Merchant
    • Prepaid
    Menu
    • Emerging Payments
    • Fraud & Security
    • Merchant
    • Prepaid
    • About Us
    • Advertise With Us
    • Sign Up for Our Newsletter
    Menu
    • About Us
    • Advertise With Us
    • Sign Up for Our Newsletter

    ©2024 PaymentsJournal.com |  Terms of Use | Privacy Policy

    • Commercial Payments
    • Credit
    • Debit
    • Digital Assets & Crypto
    • Emerging Payments
    • Fraud & Security
    • Merchant
    • Prepaid
    No Result
    View All Result