Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Data Protection

NSA Eyes Encryption-breaking ‘Quantum’ Machine: Report

WASHINGTON – The US National Security Agency is making strides toward building a “quantum computer” that could break nearly any kind of encryption, The Washington Post reported Thursday.

WASHINGTON – The US National Security Agency is making strides toward building a “quantum computer” that could break nearly any kind of encryption, The Washington Post reported Thursday.

The Post said leaked documents from fugitive ex-NSA contractor Edward Snowden indicate the computer would allow the secret intelligence agency to break encryption used to protect banking, medical, business and government records around the world.

Quantum computing has been a goal among commercial firms such as IBM because it could harness the power of atoms and molecules, vastly increasing speed and security of computers and other devices.

But experts cited by the newspaper said it was unlikely that the NSA would be close to creating such a machine without the scientific community being aware of it.

“It seems improbable that the NSA could be that far ahead of the open world without anybody knowing it,” Scott Aaronson of the Massachusetts Institute of Technology told the daily.

The NSA declined to comment on the report.

The Post said the leaked documents indicate that the agency carries out research in large, shielded rooms known as Faraday cages designed to prevent electromagnetic energy from entering or exiting.

Because of its vast computing power, a working quantum computer would break the strongest encryption tools in use today for online activities, including banking and emails.

Advertisement. Scroll to continue reading.

Some technology firms such as Google and Yahoo have said in recent weeks that they were stepping up efforts to encrypt their communications following reports that the NSA had been able to break or circumvent many of the current encryption standards.

A September report by The New York Times, ProPublica and The Guardian, also based on leaked documents, said US and British spy agencies are able to decipher data even with the supposedly secure encryption to make it private.

The documents indicated that the NSA, working with its British counterpart GCHQ, accomplished the feat by using supercomputers, court orders and some cooperation from technology companies.

If the reports are accurate, the highly secretive program would defeat much of what is used to keep data secure and private on the Internet, from emails to chats to communications using smartphones.

IBM researchers said last year they had made advances in quantum computing that has the potential to outperform any existing supercomputer.

The new type of computing uses information encoded into quantum bits or qubits, putting into use a theory that scientists have been discussing for decades.

Quantum computing expands on the most basic piece of information that a typical computer understands — a bit, and thereby can perform millions of calculations at once.

Written By

AFP 2023

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Cody Barrow has been appointed as CEO of threat intelligence company EclecticIQ.

Shay Mowlem has been named CMO of runtime and application security company Contrast Security.

Attack detection firm Vectra AI has appointed Jeff Reed to the newly created role of Chief Product Officer.

More People On The Move

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Data Protection

The cryptopocalypse is the point at which quantum computing becomes powerful enough to use Shor’s algorithm to crack PKI encryption.

Artificial Intelligence

The CRYSTALS-Kyber public-key encryption and key encapsulation mechanism recommended by NIST for post-quantum cryptography has been broken using AI combined with side channel attacks.

Malware & Threats

The NSA and FBI warn that a Chinese state-sponsored APT called BlackTech is hacking into network edge devices and using firmware implants to silently...

Compliance

The three primary drivers for cyber regulations are voter privacy, the economy, and national security – with the complication that the first is often...

Data Protection

While quantum-based attacks are still in the future, organizations must think about how to defend data in transit when encryption no longer works.

Application Security

Virtualization technology giant VMware on Tuesday shipped urgent updates to fix a trio of security problems in multiple software products, including a virtual machine...

Application Security

Fortinet on Monday issued an emergency patch to cover a severe vulnerability in its FortiOS SSL-VPN product, warning that hackers have already exploited the...