Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
Cyber security in the quantum era
Wallden P., Kashefi E. Communications of the ACM62 (4):120-129,2019.Type:Article
Date Reviewed: May 23 2019

Quantum computing is a challenging and exciting new field. With its possibly enhanced computational power, many non-trackable problems may be solved efficiently. For many applications that depend on the computational hardness of problems, such as factoring, quantum computing poses a threat. Especially for cybersecurity, which usually relies on some hard problems, quantum computing may be a great tool for adversaries.

This review article explores the research field that exists at the intersection of cybersecurity and quantum technologies. Obviously, if practical quantum computers are created, they will be used to break previously unbreakable code. How can adversaries use quantum computers to their advantage? How we can use quantum computers to enhance cybersecurity? This article tries to give readers a clear picture.

The authors say their aim is to “clarify misconceptions and organize/categorize the research landscape in quantum cybersecurity in a comprehensible and approachable way for nonexperts.” Yet the passages are not easy to read. If you are not an expert in the design and analysis of algorithms and in the field of cybersecurity, you may have a hard time reading the article.

Figure 1 considers (only) three cases and the adversaries are classified into three types: post-quantum, quantumly enhanced, and quantumly enabled. What is the rationale for these classifications? What about when the good and bad parties are both fully operational using quantum computers? In practice, the good parties (like law enforcement) are usually equipped with more powerful quantum computers.

The authors claim: “Over the next 5-10 years, we will see a flux of new possibilities, as quantum technologies become part of this mainstream computing and communicating landscape.” This seems overly optimistic. Quantum computing will come, but exactly when it will come is hard to say.

Reviewer:  R. S. Chang Review #: CR146578 (1911-0407)
Bookmark and Share
  Featured Reviewer  
 
Security and Protection (K.6.5 )
 
 
Security and Protection (C.2.0 ... )
 
Would you recommend this review?
yes
no
Other reviews under "Security and Protection": Date
CIRCAL and the representation of communication, concurrency, and time
Milne G. ACM Transactions on Programming Languages and Systems 7(2): 270-298, 1985. Type: Article
Oct 1 1985
Computer security risk management
Palmer I., Potter G., Van Nostrand Reinhold Co., New York, NY, 1989. Type: Book (9780442302900)
Apr 1 1991
Computers at risk
, National Academy Press, Washington, DC, 1991. Type: Book (9780309043885)
Oct 1 1991
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy