100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
Previously searched by you
Summary C456 Task 2 Final.docx C456 C456 Task 2: Argumentative Research Paper Western Governors University While the advances in quantum computing (QC) have intimidated many cybersecurity experts for years, recent revelations have shown that simple preventa$4.99
Add to cart
Summary C456 Task 2 Final.docx C456 C456 Task 2: Argumentative Research Paper Western Governors University While the advances in quantum computing (QC) have intimidated many cybersecurity experts for years, recent revelations have shown that simple preventa
282 views 1 purchase
Course
Wgu
Institution
Western Governors University
C456 Task 2 F C456 C456 Task 2: Argumentative Research Paper Western Governors University While the advances in quantum computing (QC) have intimidated many cybersecurity experts for years, recent revelations have shown that simple preventative measures can ensure safe internet environments f...
c456 task 2 finaldocx c456 c456 task 2 argumentative research paper western governors university while the advances in quantum computing qc have intimidated many cybersecurity experts for ye
Written for
Western Governors University
Wgu
All documents for this subject (1238)
Seller
Follow
helperatsof1
Reviews received
Content preview
Argumentative Research Paper 1
C456
C456 Task 2: Argumentative Research Paper
Western Governors University
While the advances in quantum computing (QC) have intimidated many cybersecurity
experts for years, recent revelations have shown that simple preventative measures can ensure
safe internet environments for many years to come. It’s true that the dawn of quantum computing
will bring in a new era of super powerful systems able to process complex equations with ease
making the concept of quantum computing a viable concern to any diligent security professional.
However, most of the theoretical projections of the true potential quantum systems are capable of
are just that for now, nothing more than theories. Even when the inevitable evolution of quantum
computers reach a level of performance and availability that the average malicious hacker can
obtain one and become a threat; a few cybersecurity experts with reliable foresight have already
been working tirelessly to engineer creative solutions to current cryptology methods to ensure
they will be “quantum safe” for future generations. Although many older encryption standards
may be rendered obsolete even by the current capabilities of quantum computers, it is believed
that any cryptology method that offers 256 bit encryption will be more than strong enough to
render quantum attacks ineffective. Another consideration is that of the application of quantum
based cryptology as a cybersecurity asset. While the superior power of a quantum processor may
be used to crack cyphers created by common PC’s with ease, imagine the capabilities of using
that same power to create even more complex cryptology methods than previously conceived in
modern computing environments. Although QC may pose some valid concerns, research
suggests that the implications of quantum computing in cybersecurity aren’t as big of a threat as
, 2
Argumentative Research Paper
previously thought due to the counter-measures currently being developed to ensure quantum
safety and the physical limitations in quantum systems.
There are multiple methods as to which some experts speculate quantum computing can
be used to bypass common security, most notably the methods theorized for cracking popular
encryptions such as AES and RSA, luckily many experts have already began working on
solutions to these future threats. One of the largest threats identified is that of internet certificate
forgery, most specifically the implications it would have in online transactions. As stated by the
National Academies of Sciences, Engineering, and Medicine. (2018), an attacker using Shor’s
algorithm could potentially forge both RSA and ECDSA signatures, enabling them to issue fake
certificates, forge signatures on malicious software, and even make transactions on others behalf.
The reason this attack is possible is due to the fact that Shor’s algorithm can be used as an
effective method for cracking asymmetric encryptions used most commonly for key exchanges
based on RSA and Diffie-Hellman algorithms. A major effort currently being made to protect
systems using key exchange is the development of Quantum Key Distribution (QKD). This
exciting new concept actually uses quantum computing to its advantage, according to ID
Quantique (n.d.) it will be a method that can instantly detect any attempts to capture keys on the
network and ensure passive interception is not possible. Another possible vector for vulnerability
in the quantum environment would be to also attack symmetric encryption standards using
Grover’s algorithm. Symmetric encryption such as AES has been made popular in many security
implementations because the way the sensitive information is scrambled into an encrypted
cypher-text or hash. While AES seems to be much less vulnerable than standards like RSA as
even the most optimistic predictions state that AES with 128 bit encryption could potentially be
broken in around a month’s timeline, it’s still notable that if realized this capability could be a
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller helperatsof1. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $4.99. You're not tied to anything after your purchase.