QNu Labs

CURRENT STATE OF DATA SECURITY

The quest for data resiliency



Human civilisation today has come to rely one thing above all else - data. With the transformative impact of digitalisation, all our lives and business are inexplicably interwined with more data than ever before.

This dependency has however become the source of our greatest vulnerability. Malicious actors with access to data often manipulate data in a manner that benefit them at the expense of everyone else.

The World Economic Forum has classified cyber-attacks and data theft amongst the most severe and likely threats to our economy and civilisation. Data resiliency has today become an existential quest.

This dependency has however become the source of our greatest vulnerability. Malicious actors with access to data often manipulate data in a manner that benefit them at the expense of everyone else.

The World Economic Forum has classified cyber-attacks and data theft amongst the most severe and likely threats to our economy and civilisation. Data resiliency has today become an existential quest.

The severity of data breaches is growing exponentially

In recent years, as the migration of data to the cloud has increased exponentially, the number of data breaches and the amount of data being compromised has also seen a corresponding increase. The number of organisations that experienced breaches in a year has increased from 21% in 2016* to 36% in 2018*.And as more IOT devices are connected to the internet, the breaches are only stated to increase exponentially.

The severity of data breaches is growing exponentially

In recent years, as the migration of data to the cloud has increased exponentially, the number of data breaches and the amount of data being compromised has also seen a corresponding increase. The number of organisations that experienced breaches in a year has increased from 21% in 2016* to 36% in 2018*. And as more IOT devices are connected to the internet, the breaches are only stated to increase exponentially.

*Thales (2018). 2018 THALES DATA THREAT REPORT.

Grave threats to current fail-safe
encryption standards

Almost every security infrastructure known to man is reliant on encryption to keep our data safe. But with tremendous advances in computing power, the emergence of quantum simulators and eventually the migration to quantum computing the encryption infrastructure as we know it today will cease to exist. With encryption gone, our way of life and even human civilisation will alter in ways we cannot even begin to imagine.

Grave threats to current fail-safe
encryption standards

Almost every security infrastructure known to man is reliant on encryption to keep our data safe. But with tremendous advances in computing power, the emergence of quantum simulators and eventually the migration to quantum computing the encryption infrastructure as we know it today will cease to exist. With encryption gone, our way of life and even human civilisation will alter in ways we cannot even begin to imagine.

01-rsa@2x.png

RSA & ECC are compromised

Powerful algorithms like Shor’s algorithm and Grover’s algorithm running on equally powerful computers are able to crack current encryption standards.

Read more…

 

 

02-simulator@2x.png

Quantum Simulators

Quantum Simulators use classical computers to simulate the computational power that Quantum Computing brings and is being used to crack current encryption standards.

Read more…

03-q-c@2x.png

Quantum Computers

Quantum Computers will render all known encryption. National security cryptographic infrastructure will be compromised and Nation States will face instability. Trust Zones that are the backbone of e-commerce today will be dismantled.

Read more…

01-rsa@2x.png

RSA & AES are compromised

Powerful algorithms like Shor’s algorithm and Grover’s algorithm running on equally powerful computers are able to crack current encryption standards.

02-simulator@2x.png

Quantum Simulators

Quantum Simulators use classical computers to simulate the computational power that Quantum Computing brings and is being used to crack current encryption standards.

03-q-c@2x.png

Quantum Computers

Quantum Computers will render all known encryption. National security cryptographic infrastructure will be compromised and Nation States will face instability. Trust Zones that are the backbone of e-commerce today will be dismantled.

Targeted harvest & decrypt attacks are increasing

With encryption vulnerable to brute force attacks, threat actors are increasingly taking to harvest and decrypt attacks. What makes these attacks possible is the physical susceptibility of our networks. Anyone can today physically tap into the optical fibres and clone the data without raising any alerts. After cloning data and the public keys used to encrypt data, data can be decrypted at a later date without raising any suspicion.

Targeted harvest & decrypt attacks are increasing

With encryption vulnerable to brute force attacks, threat actors are increasingly taking to harvest and decrypt attacks. What makes these attacks possible is the physical susceptibility of our networks. Anyone can today physically tap into the optical fibres and clone the data without raising any alerts. After cloning data and the public keys used to encrypt data, data can be decrypted at a later date without raising any suspicion.

believe-1@2x.png
believe-2@2x.png
believe-3@2x.png
believe-4@2x.png
believe@.png
believe@2-1.png

With so much at stake, we at QNu questioned everything we know about current data security paradigms. What we found was that the reliance on mathematics-based encryption to keep our data safe were based on the assumption that computing power would never pose a threat to it.

believe-1@2x.png
believe-2@2x.png
believe-3@2x.png
believe-4@2x.png
believe@2x.png

With so much at stake, we at QNu questioned everything we
know about current data security paradigms. What we found was
that the reliance on mathematics-based encryption to keep our
data safe were based on the assumption that computing power
would never pose a threat to it.

8.png

We help innovators, disrupt existing security paradigms by accelerating their transition to deploy Quantum-safe encryptions. Let’s protect what we value most – data.

8.png

We help innovators, disrupt existing security paradigms by accelerating their transition to deploy Quantum-safe encryptions. Let’s protect what we value most – data.