{"id":11763,"date":"2023-02-03T07:42:03","date_gmt":"2023-02-03T10:42:03","guid":{"rendered":"https:\/\/www.fie.undef.edu.ar\/ceptm\/?p=11763"},"modified":"2023-02-03T07:42:03","modified_gmt":"2023-02-03T10:42:03","slug":"el-pentagono-debe-actuar-ahora-sobre-la-computacion-cuantica-o-ser-eclipsado-por-sus-rivales","status":"publish","type":"post","link":"https:\/\/www.fie.undef.edu.ar\/ceptm\/?p=11763","title":{"rendered":"El Pent\u00e1gono debe actuar ahora sobre la computaci\u00f3n cu\u00e1ntica o ser eclipsado por sus rivales"},"content":{"rendered":"<p>A medida que las computadoras cu\u00e1nticas contin\u00faan avanzando y se vuelven m\u00e1s poderosas, presentan una amenaza significativa para la seguridad cibern\u00e9tica del Departamento de Defensa de EUA.\u00a0La batalla por la supremac\u00eda cu\u00e1ntica ya est\u00e1 en marcha y cambiar\u00e1 fundamentalmente el sector de la defensa a medida que la tecnolog\u00eda avance hacia la madurez.<\/p>\n<hr \/>\n<p class=\"Paragraph-sc-1tqpf5s-0 kEzXdV body-paragraph body-paragraph\">As quantum computers continue to advance and become more powerful, they present a significant threat to the Department of Defense\u2019s cybersecurity assurance.<\/p>\n<p class=\"Paragraph-sc-1tqpf5s-0 kEzXdV body-paragraph body-paragraph\">When former Pentagon\u2019s Chief Data Officer, David Spirk, left his post in March 2022, he did so with a\u00a0<a href=\"https:\/\/www.bloomberg.com\/news\/articles\/2022-04-06\/pentagon-s-outgoing-data-boss-warns-of-quantum-cyber-threats?sref=XydSzIeb\">warning<\/a>: \u201cI don\u2019t think that there are enough senior leaders getting their heads around the [cybersecurity] implications of quantum\u2026 I think that\u2019s a new wave of computers that, when it arrives, is going to be a pretty shocking moment to industry and government alike.\u201d<\/p>\n<p class=\"Paragraph-sc-1tqpf5s-0 kEzXdV body-paragraph body-paragraph\">Quantum computers have the ability to process information much faster than classical computers, making them capable of cracking the secure encryption algorithms relied on to protect information today. This could allow adversaries to access sensitive military intelligence, disrupt communication networks, and even disable military systems.<\/p>\n<p class=\"Paragraph-sc-1tqpf5s-0 kEzXdV body-paragraph body-paragraph\">In late 2021, the head of the NSA\u2019s Cybersecurity Directorate\u00a0<a href=\"https:\/\/breakingdefense.com\/2021\/10\/nsa-ups-focus-on-securing-weapons-systems-amid-capable-multipolar-rvials\/\" target=\"_blank\" rel=\"noopener\">signaled<\/a>\u00a0that developing next-generation cryptologic systems to secure weapon systems from foreign adversaries was a top priority. In a fact sheet published that year, the NSA\u00a0<a href=\"https:\/\/media.defense.gov\/2021\/Aug\/04\/2002821837\/-1\/-1\/1\/Quantum_FAQs_20210804.PDF\" target=\"_blank\" rel=\"noopener\">stated<\/a>\u00a0that \u201cthe impact of adversarial use of a quantum computer could be devastating to\u00a0<a href=\"https:\/\/csrc.nist.gov\/glossary\/term\/national_security_system\" target=\"_blank\" rel=\"noopener\">National Security Systems<\/a>.\u201d<\/p>\n<p class=\"Paragraph-sc-1tqpf5s-0 kEzXdV body-paragraph body-paragraph\">The battle for quantum supremacy is already under way, and is set to fundamentally change the defense sector as the technology edges towards maturation.<\/p>\n<p class=\"heading__StyledHeading-sc-123v3ct-0 iKlOni a-heading2\"><strong>The quantum threat is closer than you think<\/strong><\/p>\n<p class=\"Paragraph-sc-1tqpf5s-0 kEzXdV body-paragraph body-paragraph\">Many experts, including Spirk, believe that military applications for quantum computing could be less than 10 years away.<\/p>\n<p class=\"Paragraph-sc-1tqpf5s-0 kEzXdV body-paragraph body-paragraph\">Case in point: according to the Pentagon\u2019s\u00a0<a href=\"https:\/\/media.defense.gov\/2022\/Nov\/29\/2003122279\/-1\/-1\/1\/2022-MILITARY-AND-SECURITY-DEVELOPMENTS-INVOLVING-THE-PEOPLES-REPUBLIC-OF-CHINA.PDF\" target=\"_blank\" rel=\"noopener\">annual report<\/a>\u00a0on Chinese military power, China recently designed and fabricated a quantum computer capable of outperforming a classical high-performance computer for a specific problem.<\/p>\n<p class=\"Paragraph-sc-1tqpf5s-0 kEzXdV body-paragraph body-paragraph\">This is also why DARPA announced the \u2018<a href=\"https:\/\/imlive.s3.amazonaws.com\/Federal%20Government\/ID47857709476137916963114313976328933591\/DARPA-PS-22-04.pdf\" target=\"_blank\" rel=\"noopener\">Underexplored Systems for Utility-Scale Quantum Computing<\/a>\u2019 (US2QC) program to explore potentially overlooked methods by which quantum computers could achieve practical levels of utilization much faster than current predictions suggest.<\/p>\n<p class=\"Paragraph-sc-1tqpf5s-0 kEzXdV body-paragraph body-paragraph\">The White House recently signed the\u00a0<a href=\"https:\/\/www.congress.gov\/bill\/117th-congress\/house-bill\/7535\/all-actions?overview=closed#tabs\" target=\"_blank\" rel=\"noopener\">Quantum Computing Cybersecurity Preparedness Act<\/a>\u00a0into law, signaling that it regards quantum as a serious issue. The act addresses the migration of executive agencies\u2019 IT systems to post-quantum cryptography (PQC) &#8211; encryption which is secure from attacks by quantum computers because of the advanced mathematics underpinning it.<\/p>\n<p class=\"Paragraph-sc-1tqpf5s-0 kEzXdV body-paragraph body-paragraph\">As major powers like China, under its\u00a0<a href=\"https:\/\/www.cfr.org\/china-digital-silk-road\/\" target=\"_blank\" rel=\"noopener\">Digital Silk Road initiative<\/a>, continue to accelerate investment into advanced technologies like AI and quantum computing, the US risks being left behind if it does not pay equal attention to the quantum opportunity &#8211; and to the quantum threat.<\/p>\n<p class=\"Paragraph-sc-1tqpf5s-0 kEzXdV body-paragraph body-paragraph\">The need for action is all the more urgent because of the looming threat of \u2018harvest now, decrypt later\u2019 attacks, by which adversaries can gather sensitive data today to decrypt as soon as they have their hands on a sufficiently powerful quantum computer.<\/p>\n<p class=\"heading__StyledHeading-sc-123v3ct-0 iKlOni a-heading2\"><strong>Time is running out for the DoD<\/strong><\/p>\n<p class=\"Paragraph-sc-1tqpf5s-0 kEzXdV body-paragraph body-paragraph\">The defense sector needs to take the threat of quantum computers seriously because they have the potential to greatly impact national security.<\/p>\n<p class=\"Paragraph-sc-1tqpf5s-0 kEzXdV body-paragraph body-paragraph\">Encryption is a crucial tool for protecting sensitive military information, and if quantum computers are able to break current encryption algorithms, this could compromise the security of classified documents, strategic plans, and even communication networks. This could potentially give adversaries an advantage in military conflicts and put US military personnel at risk.<\/p>\n<p class=\"Paragraph-sc-1tqpf5s-0 kEzXdV body-paragraph body-paragraph\">In addition to the potential impact on national security, the defense sector also has a responsibility to protect the personal information of military personnel and civilians. Quantum computers could potentially be used to steal sensitive personal information, such as social security numbers, as well as medical and financial information.<\/p>\n<p class=\"Paragraph-sc-1tqpf5s-0 kEzXdV body-paragraph body-paragraph\">As DoD moves from network-centric operations to data-centric operations, PQC implementation becomes even more relevant, regardless of whether the data comes from the cloud or any other source. DoD\u2019s Joint All Domain Command and Control (<a href=\"https:\/\/sgp.fas.org\/crs\/natsec\/IF11493.pdf\" target=\"_blank\" rel=\"noopener\">JADC2<\/a>) and Joint Cloud Computing concepts, network modernization etc. will all require post-quantum cryptography for cybersecurity assurance.<\/p>\n<p class=\"Paragraph-sc-1tqpf5s-0 kEzXdV body-paragraph body-paragraph\">Quantum computers also have the ability to perform complex calculations at a much faster rate than classical computers, which could allow them to disable or manipulate military systems. This could potentially disrupt communication networks, navigation systems, and even weapons systems, leading to potential loss of lives and damage to military assets.<\/p>\n<p class=\"heading__StyledHeading-sc-123v3ct-0 iKlOni a-heading2\"><strong>First-mover advantage<\/strong><\/p>\n<p class=\"Paragraph-sc-1tqpf5s-0 kEzXdV body-paragraph body-paragraph\">In July last year, the National Institute of Standards and Technology\u00a0<a href=\"https:\/\/www.nist.gov\/news-events\/news\/2022\/07\/nist-announces-first-four-quantum-resistant-cryptographic-algorithms\" target=\"_blank\" rel=\"noopener\">announced<\/a>\u00a0a major milestone in its efforts to standardize post-quantum cryptography algorithms.<\/p>\n<p class=\"Paragraph-sc-1tqpf5s-0 kEzXdV body-paragraph body-paragraph\">New draft standards are a welcome arrival and will hopefully dispel any hesitation about putting concrete transition roadmaps in place. But the bigger picture is that encryption standards are going through their biggest change in decades, and post-quantum cryptography will soon be essential for all businesses hoping to work with the US government. Up to $3 billion of federal quantum projects are now either in operation or planned, including a $1.2 billion\u00a0<a href=\"https:\/\/www.quantum.gov\/\" target=\"_blank\" rel=\"noopener\">National Quantum Initiative<\/a>.<\/p>\n<p class=\"Paragraph-sc-1tqpf5s-0 kEzXdV body-paragraph body-paragraph\">The advent of quantum technology converges with the race for global tech supremacy as well as a period of turbulent geopolitics. The longer the government and businesses wait to act, the greater the potential harm.<\/p>\n<p><strong>Fuente:<\/strong> <a href=\"https:\/\/www.c4isrnet.com\/thought-leadership\/2023\/01\/20\/pentagon-must-act-now-on-quantum-computing-or-be-eclipsed-by-rivals\/\" target=\"_blank\" rel=\"noopener\"><em>https:\/\/www.c4isrnet.com<\/em><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>A medida que las computadoras cu\u00e1nticas contin\u00faan avanzando y se vuelven m\u00e1s poderosas, presentan una amenaza significativa para la seguridad cibern\u00e9tica del Departamento de Defensa&hellip; <\/p>\n","protected":false},"author":1,"featured_media":11764,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[2,23],"tags":[],"_links":{"self":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/posts\/11763"}],"collection":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=11763"}],"version-history":[{"count":1,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/posts\/11763\/revisions"}],"predecessor-version":[{"id":11765,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/posts\/11763\/revisions\/11765"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/media\/11764"}],"wp:attachment":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=11763"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=11763"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=11763"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}