100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
Summary C456 Task 2 Final.docx C456 C456 Task 2: Argumentative Research Paper Western Governors University While the advances in quantum computing (QC) have intimidated many cybersecurity experts for years, recent revelations have shown that simple preventa $4.99   Add to cart

Summary

Summary C456 Task 2 Final.docx C456 C456 Task 2: Argumentative Research Paper Western Governors University While the advances in quantum computing (QC) have intimidated many cybersecurity experts for years, recent revelations have shown that simple preventa

 282 views  1 purchase
  • Course
  • Institution

C456 Task 2 F C456 C456 Task 2: Argumentative Research Paper Western Governors University While the advances in quantum computing (QC) have intimidated many cybersecurity experts for years, recent revelations have shown that simple preventative measures can ensure safe internet environments f...

[Show more]

Preview 2 out of 6  pages

  • February 5, 2021
  • 6
  • 2020/2021
  • Summary
avatar-seller
Argumentative Research Paper 1


C456

C456 Task 2: Argumentative Research Paper

Western Governors University

While the advances in quantum computing (QC) have intimidated many cybersecurity

experts for years, recent revelations have shown that simple preventative measures can ensure

safe internet environments for many years to come. It’s true that the dawn of quantum computing

will bring in a new era of super powerful systems able to process complex equations with ease

making the concept of quantum computing a viable concern to any diligent security professional.

However, most of the theoretical projections of the true potential quantum systems are capable of

are just that for now, nothing more than theories. Even when the inevitable evolution of quantum

computers reach a level of performance and availability that the average malicious hacker can

obtain one and become a threat; a few cybersecurity experts with reliable foresight have already

been working tirelessly to engineer creative solutions to current cryptology methods to ensure

they will be “quantum safe” for future generations. Although many older encryption standards

may be rendered obsolete even by the current capabilities of quantum computers, it is believed

that any cryptology method that offers 256 bit encryption will be more than strong enough to

render quantum attacks ineffective. Another consideration is that of the application of quantum

based cryptology as a cybersecurity asset. While the superior power of a quantum processor may

be used to crack cyphers created by common PC’s with ease, imagine the capabilities of using

that same power to create even more complex cryptology methods than previously conceived in

modern computing environments. Although QC may pose some valid concerns, research

suggests that the implications of quantum computing in cybersecurity aren’t as big of a threat as

, 2
Argumentative Research Paper

previously thought due to the counter-measures currently being developed to ensure quantum

safety and the physical limitations in quantum systems.

There are multiple methods as to which some experts speculate quantum computing can

be used to bypass common security, most notably the methods theorized for cracking popular

encryptions such as AES and RSA, luckily many experts have already began working on

solutions to these future threats. One of the largest threats identified is that of internet certificate

forgery, most specifically the implications it would have in online transactions. As stated by the

National Academies of Sciences, Engineering, and Medicine. (2018), an attacker using Shor’s

algorithm could potentially forge both RSA and ECDSA signatures, enabling them to issue fake

certificates, forge signatures on malicious software, and even make transactions on others behalf.

The reason this attack is possible is due to the fact that Shor’s algorithm can be used as an

effective method for cracking asymmetric encryptions used most commonly for key exchanges

based on RSA and Diffie-Hellman algorithms. A major effort currently being made to protect

systems using key exchange is the development of Quantum Key Distribution (QKD). This

exciting new concept actually uses quantum computing to its advantage, according to ID

Quantique (n.d.) it will be a method that can instantly detect any attempts to capture keys on the

network and ensure passive interception is not possible. Another possible vector for vulnerability

in the quantum environment would be to also attack symmetric encryption standards using

Grover’s algorithm. Symmetric encryption such as AES has been made popular in many security

implementations because the way the sensitive information is scrambled into an encrypted

cypher-text or hash. While AES seems to be much less vulnerable than standards like RSA as

even the most optimistic predictions state that AES with 128 bit encryption could potentially be

broken in around a month’s timeline, it’s still notable that if realized this capability could be a

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller helperatsof1. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $4.99. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

78462 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$4.99  1x  sold
  • (0)
  Add to cart