{"id":13210,"date":"2023-10-04T09:28:15","date_gmt":"2023-10-04T12:28:15","guid":{"rendered":"https:\/\/www.fie.undef.edu.ar\/ceptm\/?p=13210"},"modified":"2023-10-04T09:28:15","modified_gmt":"2023-10-04T12:28:15","slug":"todos-los-sistemas-deben-reforzarse-los-funcionarios-y-la-industria-hacen-sonar-la-alarma-sobre-la-amenaza-cuantica-al-cifrado","status":"publish","type":"post","link":"https:\/\/www.fie.undef.edu.ar\/ceptm\/?p=13210","title":{"rendered":"Todos los sistemas deben reforzarse: los funcionarios y la industria hacen sonar la alarma sobre la amenaza cu\u00e1ntica al cifrado"},"content":{"rendered":"<p>Aqu\u00ed, en apenas el segundo Congreso Mundial Cu\u00e1ntico , hay entusiasmo en el aire sobre las perspectivas de todo, desde tiempos precisos de picosegundos hasta comunicaciones imposibles de piratear utilizando part\u00edculas entrelazadas. Pero una sombra acecha en el horizonte: la posibilidad de que las computadoras cu\u00e1nticas descifren los algoritmos de cifrado actuales que salvaguardan todo, desde las transacciones bancarias hasta los sistemas de armas.<\/p>\n<hr \/>\n<p>WASHINGTON \u2014 Here at only the second-ever\u00a0<a href=\"https:\/\/www.quantumworldcongress.com\/\" target=\"_blank\" rel=\"noopener\">Quantum World Congress<\/a>, there\u2019s excitement in the air about the prospects for everything from\u00a0<a href=\"https:\/\/breakingdefense.com\/2023\/09\/quantum-clocks-could-revolutionize-precision-warfare-with-a-decade-experts\/\" target=\"_blank\" rel=\"noopener\">picosecond-precise timing<\/a>\u00a0to\u00a0<a href=\"https:\/\/breakingdefense.com\/2022\/09\/disruptive-impact-indias-military-starts-investing-in-quantum-key-distribution\/\" target=\"_blank\" rel=\"noopener\">unhackable communications<\/a>\u00a0using entangled particles. But a shadow looms on the horizon: the potential for quantum computers to crack the current encryption algorithms that safeguard everything from bank transactions to weapons systems.<\/p>\n<p>\u201cIt is important to us to make sure we are investing in both sides \u2014 to make sure that we are protecting ourselves [from quantum attacks] while we are also seeking to figure out \u2026 how to leverage quantum technology\u201d for America\u2019s own use, said\u00a0<a href=\"https:\/\/www.dni.gov\/index.php\/who-we-are\/leadership\/deputy-director-of-national-intelligence\" target=\"_blank\" rel=\"noopener\">Stacey Dixon<\/a>, Principal Deputy Director of National Intelligence, in a Q&amp;A with conference attendees. \u201cAll systems need to be hardened.\u201d<\/p>\n<p>This is not a problem for the distant future but today, said\u00a0<a href=\"https:\/\/www.nist.gov\/people\/james-g-kushmerick\" target=\"_blank\" rel=\"noopener\">James Kushmerick<\/a>, director of the Physical Measurement Laboratory at the\u00a0<a href=\"https:\/\/breakingdefense.com\/tag\/national-institutes-of-standards-and-technology-nist\/\" target=\"_blank\" rel=\"noopener\">National Institute of Standards and Technology<\/a>, which is finalizing new \u201c<a href=\"https:\/\/www.nist.gov\/news-events\/news\/2023\/08\/nist-standardize-encryption-algorithms-can-resist-attack-quantum-computers\" target=\"_blank\" rel=\"noopener\">quantum-resistant\u201d<\/a>\u00a0encryption standards. \u201cThe sooner we get this out,\u201d he told the conference, \u201cthe better off we\u2019ll be whenever a cryptographically relevant quantum computer is developed.\u201d<\/p>\n<p>Such an all-conquering computer doesn\u2019t actually exist yet. But there lies the paradox of what\u2019s called quantum-resistant or \u201cpost-quantum\u201d encryption: You don\u2019t need a quantum computer to start laying the foundations for a quantum-powered hack \u2014 or, fortunately, to start building a defense.<\/p>\n<p>The threat is a tactic called \u201ccollect now, decrypt later.\u201d Well-heeled foreign intelligence agencies (and the American NSA) already scoop up terabytes of encrypted communication. Whatever they can\u2019t crack today can just go into long-term storage, waiting for quantum computers to get powerful enough to break them.<\/p>\n<p>Of course, some secrets will be irrelevant by then, such as the positions and immediate orders of military units: It doesn\u2019t help much to decode \u201cAttack Pearl Harbor Dec. 7\u2033 on Dec. 8. But other data remains relevant for decades, because that\u2019s how long the US military keeps many systems in service. Data like design details and test data from X-35 development in the late 1990s, for instance, will be of interest to adversaries until the\u00a0<a href=\"https:\/\/breakingdefense.com\/tag\/f-35-joint-strike-fighter\/\" target=\"_blank\" rel=\"noopener\">F-35<\/a>\u00a0retires circa<a href=\"https:\/\/www.flightglobal.com\/lockheed-f-35-service-life-extended-to-2070\/120105.article\" target=\"_blank\" rel=\"noopener\">\u00a02070<\/a>. And even out-of-date information on past operations could be fed into an artificial intelligence that looks for repeated patterns that might predict a future move.<\/p>\n<p>\u201cThere\u2019s a long tail of how valuable information may be if it\u2019s collected now and decrypted later,\u201d Kushmerick told the conference, what the government has described as data with a \u201c<a href=\"https:\/\/www.nsa.gov\/Press-Room\/Press-Releases-Statements\/Press-Release-View\/Article\/3498776\/post-quantum-cryptography-cisa-nist-and-nsa-recommend-how-to-prepare-now\/\" target=\"_blank\" rel=\"noopener\">long secrecy lifetime<\/a>.\u201d<\/p>\n<p>How much \u201clater\u201d will someone get a quantum computer able to break existing codes? While\u00a0the public can\u2019t\u00a0know what\u2019s happening in secret government labs, IBM unveiled a\u00a0<a href=\"https:\/\/research.ibm.com\/blog\/127-qubit-quantum-processor-eagle\" target=\"_blank\" rel=\"noopener\">127-qubit<\/a>\u00a0(quantum bit) computer in 2021, hit\u00a0<a href=\"https:\/\/newsroom.ibm.com\/2022-11-09-IBM-Unveils-400-Qubit-Plus-Quantum-Processor-and-Next-Generation-IBM-Quantum-System-Two\" target=\"_blank\" rel=\"noopener\">433 qubits<\/a>\u00a0in 2022, aims to reach\u00a0<a href=\"https:\/\/www.ibm.com\/quantum\/roadmap\" target=\"_blank\" rel=\"noopener\">1,121 qubits<\/a>\u00a0this year, and has talked of breaking\u00a0<a href=\"https:\/\/www.engadget.com\/ibm-wants-its-quantum-supercomputers-running-at-4000-plus-qubits-by-2025-110012129.html\" target=\"_blank\" rel=\"noopener\">4,000 qubits<\/a>\u00a0by 2025 \u2014 what\u00a0<a href=\"https:\/\/www.forbes.com\/sites\/arthurherman\/2021\/06\/07\/q-day-is-coming-sooner-than-we-think\/\" target=\"_blank\" rel=\"noopener\">some<\/a>\u00a0<a href=\"https:\/\/www.quintessencelabs.com\/blog\/breaking-rsa-encryption-update-state-art\" target=\"_blank\" rel=\"noopener\">experts<\/a>\u00a0(but\u00a0<a href=\"https:\/\/arstechnica.com\/information-technology\/2023\/01\/fear-not-rsa-encryption-wont-fall-to-quantum-computing-anytime-soon\/\" target=\"_blank\" rel=\"noopener\">hardly all<\/a>) say is a critical threshold for codebreaking. By\u00a0<a href=\"https:\/\/www.qusecure.com\/common-quantum-queries\/#:~:text=One%20encryption%20algorithm%20called%20RSA,calls%2C%20and%20e%2Dcommerce.\" target=\"_blank\" rel=\"noopener\">one company\u2019s estimate<\/a>, a 4,000-qubit computer could to decrypt the widely used RSA encryption \u2014 which would take today\u2019s supercomputers \u201cmillions of years\u201d to crack \u2014 \u201cin a matter of hours\u201d;\u00a0<a href=\"https:\/\/www.quintessencelabs.com\/blog\/breaking-rsa-encryption-update-state-art\" target=\"_blank\" rel=\"noopener\">another company<\/a>\u00a0says 10\u00a0<em>seconds<\/em>.<\/p>\n<p>So while widespread quantum computing remains many years away, cutting-edge intelligence agencies could apply it to high-priority targets much sooner.<\/p>\n<p>\u201cYou want to do ChatGPT on quantum computers, that will require it to become commonplace\u2026 That\u2019s 10 years away, no doubt about it,\u201d said\u00a0<a href=\"https:\/\/www.neerajpaliwal.com\/\" target=\"_blank\" rel=\"noopener\">Neeraj Paliwal,<\/a>\u00a0general manager at Rambus, a company developing quantum-resistant chips. \u201c[But] all they need, at the state level, is four or five functioning quantum computers, even if it is at the cost of $200 million.\u201d<\/p>\n<p>\u201cThat\u2019s why NSA and government are all over it,\u201d he told Breaking Defense.<\/p>\n<p>The good news, according to Paliwal and others in the field: You don\u2019t need a quantum computer to stop a quantum computer, just better encryption algorithms. And those new algorithms should be able to run on today\u2019s computers, although a lot of lower-power devices will need to be upgraded or replaced.<\/p>\n<p>\u201cIt\u2019s not all that different from how we\u2019re doing it now,\u201d said\u00a0<a href=\"https:\/\/www.rand.org\/about\/people\/v\/vermeer_michael_j_d.html\" target=\"_blank\" rel=\"noopener\">Michael Vermeer<\/a>, a senior scientist at RAND, in an interview with Breaking Defense. \u201cIt\u2019s just a new algorithm, [using] a different area of mathematics.\u201d<\/p>\n<p>\u201cYou don\u2019t need a quantum computer to fight a quantum computer,\u201d agreed\u00a0<a href=\"https:\/\/www.qusecure.com\/about-us\/\" target=\"_blank\" rel=\"noopener\">Rebecca Krauthamer,<\/a>\u00a0co-founder of\u00a0 QuSecure, which develops quantum-resistant software. \u201cIt\u2019s not a quantum algorithm we\u2019re using to encrypt things,\u201d she told Breaking Defense. \u201cIt\u2019s still classical math, it\u2019s just math that\u2019s really hard for a quantum computer to solve.<\/p>\n<p>That said, she warned, \u201cYou can\u2019t say anything is \u2018quantum-proof\u2019 because everything is always changing\u2026. It\u2019s going to evolve in ways we can\u2019t foresee.\u201d<\/p>\n<p><strong>DoD trying to prepare industry<\/strong><\/p>\n<p>At first glance, the government timeline to deploy the new quantum-resistant algorithms looks outright stately.\u00a0<a href=\"https:\/\/www.nsa.gov\/Press-Room\/News-Highlights\/Article\/Article\/3148990\/nsa-releases-future-quantum-resistant-qr-algorithm-requirements-for-national-se\/\" target=\"_blank\" rel=\"noopener\">Last year,<\/a>\u00a0the NSA set an official target of 2035, over a decade away, for all \u201cnational security systems\u201d across the US government to migrate to quantum-resistant encryption.<\/p>\n<p>The\u00a0<a href=\"https:\/\/breakingdefense.com\/tag\/nist\/\" target=\"_blank\" rel=\"noopener\">National Institute of Standards &amp; Technology<\/a>\u00a0released draft standards for the first three algorithms\u00a0<a href=\"https:\/\/www.nist.gov\/news-events\/news\/2023\/08\/nist-standardize-encryption-algorithms-can-resist-attack-quantum-computers\" target=\"_blank\" rel=\"noopener\">last month<\/a>\u00a0and will take comments on them until Nov. 22 before finalizing them next year. At that point, Kushmerick told the QWC conference, it\u2019ll be up to \u201cindustry [to] deploy into a product.\u201d<\/p>\n<p>But that doesn\u2019t mean companies and agencies should sit on their hands until 2024, experts emphasized.<\/p>\n<p>\u201cThe government\u2026 especially DoD, has been doing a lot on trying to prepare the defense industrial base and elsewhere in the government to transition as quickly as possible to the new standard,\u201d said RAND scientist Vermeer.<\/p>\n<p>In August NIST, the NSA and and Homeland Security\u2019s\u00a0<a href=\"https:\/\/breakingdefense.com\/tag\/cybersecurity-and-infrastructure-security-agency-cisa\/\">CISA<\/a>\u00a0<a href=\"https:\/\/www.nsa.gov\/Press-Room\/Press-Releases-Statements\/Press-Release-View\/Article\/3498776\/post-quantum-cryptography-cisa-nist-and-nsa-recommend-how-to-prepare-now\/\" target=\"_blank\" rel=\"noopener\">published a factsheet<\/a>\u00a0urging industry, especially those who support critical infrastructure, to \u201cbegin preparing now\u201d to migrate to post-quantum defense.<\/p>\n<p>The message\u00a0was, in essence, \u201cWe haven\u2019t fully signed off on the algorithms, so be careful, but you need to start\u00a0<em>today<\/em>, [because] it\u2019s a really hard problem,\u201d said\u00a0<a href=\"https:\/\/quantumconsortium.org\/teams\/kaniah-konkoly-thege\/\" target=\"_blank\" rel=\"noopener\">Kaniah Konkoly-Thege<\/a>, head of government affairs at the\u00a0quantum computing firm\u00a0Quantinuum. \u201cTake that basic step of inventorying your date, inventorying your assets, [and] putting in proper policies for retention of data. You also should start testing aggressively, she told Breaking Defense: \u201cBreak your system and figure out what doesn\u2019t work.\u201d<\/p>\n<p>\u201cWhen we move some aspects of our infrastructure to the new standard, it\u2019s going to break things,\u201d agreed Vermeer. That\u2019s something Google, Amazon, and other major companies have already found in trial runs with prototype post-quantum encryption, he said. \u201cThe point of these tests was to figure out where things fail, [but even so] they were surprised \u2013 things broke in places that they weren\u2019t expecting,.\u201d<\/p>\n<p>\u201cThere is a lot of software that needs to be patched,\u201d he said. \u201cWe don\u2019t know where all of it is right now.\u201d<\/p>\n<p>Many applications that use RSA and other\u00a0<a href=\"https:\/\/www.schneier.com\/blog\/archives\/2023\/01\/breaking-rsa-with-a-quantum-computer.html\" target=\"_blank\" rel=\"noopener\">reportedly<\/a>\u00a0quantum-vulnerable algorithms are obvious, from online shopping to military communications. But other uses of encryption are hidden deep in complex systems, sometimes in obscure subroutines that need to communicate securely, sometimes in functions embedded on individual chips.<\/p>\n<p>The military has a particularly tricky hardware problem because a lot of its secure technology is not in laptops, desktops, or centralized data centers, but built into all sorts of weapons systems. Much of this \u201cembedded\u201d microelectronics is tailored for specialized military purposes and \u2014 because of its age, cost-cutting, or both \u2014 has little margin to run the new and more complex quantum-resistant algorithms.<\/p>\n<p>\u201cIf you have some hardware that is deployed\u2026 and it cannot handle the new algorithm, you cannot fix that, a lot of the time, without ripping it out and replacing it, which is a big problem,\u201d Vermeer said. \u201cPart of the urgency for national security systems [is] trying to make sure that what we are deploying now is going to be able to be updated in the field \u2014 because most of the time, it can\u2019t be.\u201d<\/p>\n<p><strong>Fuente:<\/strong><a href=\"https:\/\/breakingdefense.com\/2023\/09\/all-systems-need-to-be-hardened-officials-industry-sound-the-alarm-on-quantum-threat-to-encryption\/\" target=\"_blank\" rel=\"noopener\"><em>https:\/\/breakingdefense.com<\/em><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Aqu\u00ed, en apenas el segundo Congreso Mundial Cu\u00e1ntico , hay entusiasmo en el aire sobre las perspectivas de todo, desde tiempos precisos de picosegundos hasta&hellip; <\/p>\n","protected":false},"author":1,"featured_media":13212,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[2,23],"tags":[],"_links":{"self":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/posts\/13210"}],"collection":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=13210"}],"version-history":[{"count":2,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/posts\/13210\/revisions"}],"predecessor-version":[{"id":13213,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/posts\/13210\/revisions\/13213"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/media\/13212"}],"wp:attachment":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=13210"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=13210"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=13210"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}