ArchiveOODA OriginalTechnology

The Executive’s Guide To Quantum Safe Security: Take these steps to make your enterprise quantum proof

The steady progress in quantum computing is resulting in exciting developments that will one day bring new capabilities to a wide range of use cases. Quantum computers can also bring new capabilities to attackers. The mathematician Peter Shor has proven that quantum computers can be used to rapidly factor large numbers into their primes in a way that will break most forms of asymmetric encryption used today. The computer scientist Lov Grover proved another algorithm that will, among other things, enable incredibly fast invalidation of another tool for security, the security hash. There are certainly other ways quantum computers will be used by adversaries, but these two methods alone are cause for serious concern. Imagine all the data your company believes is important being read by an adversary that wants to put you out of business, and imagine that adversary is operating in a location untouchable by the rule of law.

Want more insight? Log In For The Full Report

This content is restricted to OODA Network members only. Members get access to all site content plus access to exclusive reports and events. Please consider becoming a member. For more information please click here. Thanks!

Already a member?  Sign in to your account.

Members also have access to:

Special Series on Quantum Computing

The developments in the field of Quantum Computing are coming faster and faster. OODA analysts are focusing on what matters most to today’s business decision makers. Recent reporting includes:

For additional reading on related topics see:

Bob Gourley

Bob Gourley

Bob Gourley is the co-founder and Chief Technology Officer (CTO) of OODA LLC, the technology research and advisory firm with a focus on artificial intelligence and cybersecurity which publishes OODALoop.com and CTOvision.com. Bob is the author of the book The Cyber Threat. Bob has been an advisor to dozens of successful high tech startups and has conducted enterprise cybersecurity assessments for businesses in multiple sectors of the economy. He was a career Naval Intelligence Officer and is the former CTO of the Defense Intelligence Agency.