Quantum computing impacts the ecosystem of the Internet of Things for industrial use

Quantum computing impacts the ecosystem of the Internet of Things for industrial use

Organisations such as Kaspersky Lab., IBM, Google, Microsoft and Intel, amongst others, have been investigating new procedures for increasing the computational power that supports IoT systems through Quantum computing for some time now.

In the continuous technological evolution involved in the promotion and diversification of an increasingly extensive Internet of Things (IoT), which has emerged powerfully in industrial processes thanks to advances in data analysis, there is an equally powerful need to review and improve everything related to the security of communications if we want to continue moving forward in implementing the IoT ecosystem.

In the scenario of the future that points towards autonomous and connected ‘things’, security has become a crucial factor. This is where quantum cryptography – which uses the laws of quantum mechanics for generating secure codes – comes into its own, with the aim of guaranteeing secure end-to-end communications.

The versatile interactions that takes place in communications between people and machines have all the signs vulnerability from the point of view of security; a factor that emerges in view of the need for devices, sensors and IoT networks to be able to withstand the depth charge of computational and mathematical complexity used by the ever more frequent cryptographic attacks, bearing in mind the sophistication of the threats coming from whole communities of hackers operating from anywhere in the world.

The vulnerability of existing cryptographic keys against the computational power that is yet to come

Postquantum cryptography is set to be the next step to which the cryptographic algorithms generally used will have to adapt, which have been developed taking into account certain security parameters in order to protect information from attacks that may be perpetrated by the power that quantum computers will acquire in the future.

This is why post-quantum cryptography represents a step forward compared to the current use of cryptographic algorithms, which are highly vulnerable as they can be easily broken by an averagely powerful quantum computer. The problem with commonly-used algorithms is that their security depends on three highly complex mathematical problems which, paradoxically, can be solved with relative ease by sufficiently powerful quantum computers.

Even the experimental quantum computers we know today are not powerful enough to attack any conventional cryptographic algorithm; however, more and more cryptographers are going for the design of new algorithms with a greater complexity load in order to be prepared for the time when the era of quantum computation becomes a reality.

Although they have not yet materialised, given the limited power of the early models currently in use, the threat of quantum computers is real, and so is the risk of some of them falling into the hands of hacking organisations. In the not-too-distant future a quantum computer will be built with enough power to be able to demolish all the security procedures we rely on today. However, when the time comes to obtain the first quantum computer with high computational power, the new post-quantum algorithms must be in place and thus allow the secure infrastructures and technologies that have been developed in the last decade to continue operating securely with just a few minor changes.

In search of post-quantum algorithms that guarantee IT security

The Kaspersky security organisation predicts the disappearance of cryptography as we know it today in its blog. “Quantum computing may bring either salvation or doom to this emerging new world, although the way in which cryptography exists today will definitely lead to doom.” The thesis that “cryptography is one of the very few fields where adversarial conflict continues to heavily favour the defender’ will be strongly contested until effective post-quantum cryptographic algorithms are introduced,” continues the security organisation.

Share it:
Share it:

[Social9_Share class=”s9-widget-wrapper”]

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

You Might Be Interested In

The Board Directors You Need for a Digital Transformation

8 Nov, 2017

Boards have a vital role to play in digital transformation. Early role descriptions for digital directors were focused on reacting …

Read more

The Implications of Digital Technology on Broadcast Media

25 Nov, 2020

From purchasing a paper to opening a news application on your tablet, from leasing a DVD to streaming your #1 …

Read more

The new data highway your city really needs

11 Apr, 2017

Data by itself doesn’t make a city smart. What makes a city smart is its ability to act on it …

Read more

Recent Jobs

Senior Cloud Engineer (AWS, Snowflake)

Remote (United States (Nationwide))

9 May, 2024

Read More

IT Engineer

Washington D.C., DC, USA

1 May, 2024

Read More

Data Engineer

Washington D.C., DC, USA

1 May, 2024

Read More

Applications Developer

Washington D.C., DC, USA

1 May, 2024

Read More

Do You Want to Share Your Story?

Bring your insights on Data, Visualization, Innovation or Business Agility to our community. Let them learn from your experience.

Get the 3 STEPS

To Drive Analytics Adoption
And manage change

3-steps-to-drive-analytics-adoption

Get Access to Event Discounts

Switch your 7wData account from Subscriber to Event Discount Member by clicking the button below and get access to event discounts. Learn & Grow together with us in a more profitable way!

Get Access to Event Discounts

Create a 7wData account and get access to event discounts. Learn & Grow together with us in a more profitable way!

Don't miss Out!

Stay in touch and receive in depth articles, guides, news & commentary of all things data.