{"id":7186,"date":"2021-02-08T16:37:19","date_gmt":"2021-02-08T19:37:19","guid":{"rendered":"https:\/\/www.fie.undef.edu.ar\/ceptm\/?p=7186"},"modified":"2021-02-08T16:37:19","modified_gmt":"2021-02-08T19:37:19","slug":"el-departamento-de-defensa-de-ee-uu-y-la-amenaza-de-las-computadoras-cuanticas","status":"publish","type":"post","link":"https:\/\/www.fie.undef.edu.ar\/ceptm\/?p=7186","title":{"rendered":"El Departamento de Defensa de EE.UU. y la amenaza de las computadoras cu\u00e1nticas"},"content":{"rendered":"<p style=\"text-align: left;\" align=\"justify\">El Departamento de Defensa de EE.UU. debe determinar la amenaza a la seguridad nacional que representa la computaci\u00f3n cu\u00e1ntica, como parte de la nueva ley de pol\u00edtica de defensa. Las poderosas computadoras cu\u00e1nticas pueden romper las capacidades de cifrado actuales, lo que significa que las comunicaciones seguras con los sistemas actuales ser\u00e1n casi imposibles. Por otro lado, los adversarios con capacidades cu\u00e1nticas podr\u00e1n comunicarse de forma segura sin temor a ser interceptados por Estados Unidos, a menos que consiga su propia computadora cu\u00e1ntica.<\/p>\n<hr \/>\n<p class=\"o-articleBody__text a-body1 element element-paragraph\">WASHINGTON \u2014 The U.S. Department of Defense must determine the national security threat posed by quantum computing, as part of the new annual defense policy law.<\/p>\n<p class=\"o-articleBody__text a-body1 element element-paragraph\">The fiscal 2021 National Defense Authorization Act, which became law New Year\u2019s Day after the Senate overrode President Donald Trump\u2019s veto, contained a provision that directed the department to deliver a report to Congress that provides a \u201ccomprehensive assessment of the current and potential threats and risks posed by quantum computing technologies to critical national security systems.\u201d<\/p>\n<p class=\"o-articleBody__text a-body1 element element-paragraph\">\u201c[Cryptology] is &#8230; the backbone of much of our security,\u201d said Jo\u00ebl Alwen, chief cryptographer at Wickr, a secure collaboration platform.<\/p>\n<p class=\"o-articleBody__text a-body1 element element-paragraph\">Powerful quantum computers pose a danger to national security because they may be able to break current encryption capabilities, meaning secure communications under current systems will be nearly impossible. On the flip side, adversaries with quantum capabilities will be able to communicate securely without fear of interception by the U.S., unless it achieves its own quantum computer.<\/p>\n<p class=\"o-articleBody__text a-body1 element element-paragraph\">\u201cQuantum computing may allow adversaries to decrypt [unclassified, classified or sensitive] information, which could enable them to target U.S. personnel and military operations,\u201d a November Congressional Research Service report warned.<\/p>\n<p class=\"o-articleBody__text a-body1 element element-paragraph\">The Department must identify and prioritize critical national security systems at risk by quantum computing. The assessment must be completed by Dec. 31, 2021, and the secretary of defense must brief defense committees by February next year. Determining the risk posed by the emerging technology, Alwen said, includes understanding the criticality of the systems that need protected.<\/p>\n<p class=\"o-articleBody__text a-body1 element element-paragraph\">\u201cIt\u2019s a combination of the technical understanding of what the risk really is, mixed with understanding of the content, the data and what its value is, and what exposure of that data represents,\u201d Alwen said.<\/p>\n<p class=\"o-articleBody__text a-body1 element element-paragraph\">The Pentagon must outline its needs to be secure in a world of quantum computing and any funding shortfalls in public and private sector efforts to develop quantum-resistant cryptology. The assessment must also include a review of the standards under development by the National Institute of Standards and Technology for quantum-resistant cryptology, as well as an evaluation of alternative quantum-resistant algorithms.<\/p>\n<p style=\"text-align: left;\" align=\"justify\"><strong>Fuente:<\/strong> <a href=\"https:\/\/www.c4isrnet.com\/it-networks\/2021\/01\/06\/defense-department-must-assess-threats-posed-by-quantum-computers\/?utm_source=Sailthru&amp;utm_medium=email&amp;utm_campaign=C4ISRNET%201.7.21&amp;utm_term=Editorial%20-%20Daily%20Brief\" target=\"_blank\" rel=\"noopener\"><em>https:\/\/www.c4isrnet.com<\/em><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>El Departamento de Defensa de EE.UU. debe determinar la amenaza a la seguridad nacional que representa la computaci\u00f3n cu\u00e1ntica, como parte de la nueva ley&hellip; <\/p>\n","protected":false},"author":1,"featured_media":7187,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[2,23],"tags":[],"_links":{"self":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/posts\/7186"}],"collection":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=7186"}],"version-history":[{"count":1,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/posts\/7186\/revisions"}],"predecessor-version":[{"id":7188,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/posts\/7186\/revisions\/7188"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/media\/7187"}],"wp:attachment":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=7186"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=7186"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=7186"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}