Monday, 15 Dec 2025
Subscribe
logo
  • Global
  • AI
  • Cloud Computing
  • Edge Computing
  • Security
  • Investment
  • Sustainability
  • More
    • Colocation
    • Quantum Computing
    • Regulation & Policy
    • Infrastructure
    • Power & Cooling
    • Design
    • Innovations
    • Blog
Font ResizerAa
Data Center NewsData Center News
Search
  • Global
  • AI
  • Cloud Computing
  • Edge Computing
  • Security
  • Investment
  • Sustainability
  • More
    • Colocation
    • Quantum Computing
    • Regulation & Policy
    • Infrastructure
    • Power & Cooling
    • Design
    • Innovations
    • Blog
Have an existing account? Sign In
Follow US
© 2022 Foxiz News Network. Ruby Design Company. All Rights Reserved.
Data Center News > Blog > Quantum Computing > What does “steal now decrypt later” mean for cybersecurity?
Quantum Computing

What does “steal now decrypt later” mean for cybersecurity?

Last updated: February 8, 2024 4:16 am
Published February 8, 2024
Share
What does “steal now decrypt later” mean for cybersecurity?
SHARE

This is part two of a three-part series on quantum security – how it works, the implications for society and business, and what it will mean for leaders of organizations that process sensitive data and rely on keeping that data secure.

Part one looked at the basics of quantum computing and cryptography. Part two focuses on understanding and preventing of so-called “steal now, decrypt later” strategies.

It’s tempting to regard quantum computing as some abstract technical challenge looming beyond the horizon. But quantum threats to data security and your business are here now, thanks in part to a hacking strategy known as “steal-now, decrypt-later” (SNDL). That demands urgent action from technology leaders, well before the quantum revolution itself arrives.

A quick quantum refresher

If you’re new to quantum computing or cryptography, you can read the brief explainers in part one of this series, or ingest this (even shorter) executive summary: quantum computers represent numeric values as the state of subatomic particles (called qubits), leveraging their weird properties – quantum superposition, for instance, a phenomenon that lets qubits represent millions of values at once. That in turn lends itself to solving certain mathematical problems in minutes that might take classical computers hundreds of years or more. 

Those capabilities will likely lead to unimaginable breakthroughs in physics, biotech, chemistry and other industries. 

But they also pose a threat to the petabytes of public and private data that are protected by cryptographic schemes based on mathematical algorithms. While these schemes make data impenetrable to hacking from today’s “classical” computers, they will be trivial to unravel for quantum computers, rendering sensitive personal, corporate and government data readable by nearly anyone.

See also  Study Shows AI, Cybersecurity, Sustainability Key Drivers for IT Modernization

What is “steal now, decrypt later”?

Here in the calm before the quantum storm, the reality is that both the good guys and bad guys are positioning themselves now, for success when quantum finally makes its debut.

One current hacking strategy owes a debt to more than one heist movie: the bad guys don’t just steal the jewels, they steal the safe with the jewels still in it. They can crack the safe later – almost always in an abandoned warehouse down by the docks, for some reason. 

Cliches aside, the cybersecurity version of this ‘take the safe’ strategy is known as “steal now, decrypt later”, SNDL, where hackers download encrypted data knowing they can’t read it now, but anticipating it will become readable and therefore valuable when quantum computing algorithms eventually allow decryption. 

Tempting targets for SDNL include the usual suspects, like data in transit, archived data and  email messaging, but also infrastructure, like the commands routinely sent between the cloud and the ever more numerous IoT systems proliferating on the edge.

In simple terms, quantum computing is expected to be particularly adept at breaking encryption that relies on deterministic, mathematical algorithms, rather than random or anonymized numbers to generate “keys”. The prime numbers that underlie public key encryption (PKE) are an example, so efforts to secure data must start with the most widely-used asymmetric encryption standards like RSA 2048 and ECC 512. 

Those schemes have an encryption “strength” of 128 and 256 bits respectively.  But Quantum computing will break them easily, reducing their effective strength to 0.

See also  How open-source LLMs are disrupting cybersecurity at scale

Pre-quantum security strategies

So what can data-driven businesses do about SDNL today? There’s every reason to be simultaneously excited and apprehensive about the looming emergence of quantum computing. And even though the bulk of today’s quantum sector literature seems to encourage the latter disposition, not every expert sees the forecast as so dark. 

Quantum physicist Christian Bauer of Lawrence Berkeley National Lab thinks we’ll stay ahead of the threat.

“It takes longer for a quantum computer to get to the point where it breaks encryption than it takes to develop a new encryption mechanism,” he said in a recent livestream.

Of course, his prediction presupposes that the good guys are tackling the most vulnerable points of encryption now. Existing PKE and other vulnerable encryptions will have to be replaced or overlaid with quantum-proof schemes. One promising approach is to layer new security on top of existing protection, negating the need to replace existing systems, which could be a disruptive and tedious affair. 

An important shift in thinking also emphasizes getting away from mathematically generated keys and emphasizing those that are truly random. Quantum-proof VPNs that encrypt communication by using perfectly random numbers (truly random as opposed to pseudo-random or mathematically derived) can blanket existing connectivity, providing a quantum-proof “wrapper” without requiring change in the underlying encryption schemes.

The bottom line is this: to avert a quantum fire drill on day zero, you must secure your data today. 

What’s it all mean?

As the volume of attacks continues to rise, some 35% of well-funded, highly sophisticated, state-sponsored attacks are directed not at other nations, but at the corporate enterprise, with intent to steal IP, disrupt supply chains, or infect infrastructure.

See also  MIT develops breakthrough quantum interconnect for scalable computing

Bad actors are everywhere, and come in many forms – countries, NGOs, rival firms, individual criminals, and activists. Use of SNDL is widespread among all these groups. The business implications of any breach are by now well understood – they always entail a direct impact on the bottom line, reputational damage, regulatory fines and other sanctions. 

Interestingly, the “steal now” concept means as you’re reading this, your organization’s data itself exists in a kind of superposition between completely secure ciphertext and wide open plaintext. Which of those states will your valuable data ultimately resolve to? That depends little on what you do when quantum revolution arrives, and almost entirely on actions you take now. 

The new generation of quantum-proof cryptography will lean heavily on theoretically unhackable  random numbers. As we’ll see next, in the third and final part of this series, some random numbers are more random than others.

Source link

Contents
A quick quantum refresherWhat is “steal now, decrypt later”?Pre-quantum security strategiesWhat’s it all mean?
TAGGED: Cybersecurity, decrypt, steal
Share This Article
Twitter Email Copy Link Print
Previous Article man woman looking at computer AI-powered DEM to optimize network monitoring
Next Article EdgeConneX gets science based initiative goal validation for sustainable data center push EdgeConneX gets science based initiative goal validation for sustainable data center push
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Your Trusted Source for Accurate and Timely Updates!

Our commitment to accuracy, impartiality, and delivering breaking news as it happens has earned us the trust of a vast audience. Stay ahead with real-time updates on the latest events, trends.
FacebookLike
TwitterFollow
InstagramFollow
YoutubeSubscribe
LinkedInFollow
MediumFollow
- Advertisement -
Ad image

Popular Posts

Ransomware gang ‘unseizes’ its site and issues new threats after FBI takedown

The US Justice Department (DOJ) says the FBI has created a decryption tool that helped…

January 23, 2024

Reimagining Physical Security in Data Centers

Making certain the bodily safety of knowledge facilities begins with locking doorways – but it…

March 3, 2025

GTT Adds Palo Alto Prisma SASE to Secure Connect Platform

GTT Communications has introduced the enlargement of its international partnership with Palo Alto Networks by…

July 14, 2025

Gov backs regional tech schemes to fuel growth beyond London

The UK Authorities has named fourteen flagship initiatives underneath a brand new Regional Tech Booster…

October 3, 2025

Cyber Security & Cloud Expo Global 2026

London, UK – – TechEx Occasions has introduced its speaker lineup and technical themes for…

December 4, 2025

You Might Also Like

AI training
Global Market

Cybersecurity skills matter more than headcount in an AI era: ISC2 study

By saad
DNSFilter Expands Global Reach with Midis Group Cybersecurity Partnership
Global Market

DNSFilter Expands Global Reach with Midis Group Cybersecurity Partnership

By saad
Cloud Security Alliance CEO Jim Reavis on Future of AI and Cybersecurity
Global Market

Cloud Security Alliance CEO Jim Reavis on Future of AI and Cybersecurity

By saad
biometric solutions
Innovations

Navigating cybersecurity challenges with biometric solutions

By saad
Data Center News
Facebook Twitter Youtube Instagram Linkedin

About US

Data Center News: Stay informed on the pulse of data centers. Latest updates, tech trends, and industry insights—all in one place. Elevate your data infrastructure knowledge.

Top Categories
  • Global Market
  • Infrastructure
  • Innovations
  • Investments
Usefull Links
  • Home
  • Contact
  • Privacy Policy
  • Terms & Conditions

© 2024 – datacenternews.tech – All rights reserved

Welcome Back!

Sign in to your account

Lost your password?
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.
You can revoke your consent any time using the Revoke consent button.