By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
TechgoonduTechgoondu
  • Audio-visual
  • Enterprise
    • Software
    • Cybersecurity
  • Gaming
  • Imaging
  • Internet
  • Media
  • Mobile
    • Cellphones
    • Tablets
  • PC
  • Telecom
Search
© 2023 Goondu Media Pte Ltd. All Rights Reserved.
Reading: Remember Y2K? Brace for Y2Q, when public encryption keys can be hacked
Share
Aa
TechgoonduTechgoondu
Aa
  • Audio-visual
  • Enterprise
  • Gaming
  • Imaging
  • Internet
  • Media
  • Mobile
  • PC
  • Telecom
Search
  • Audio-visual
  • Enterprise
    • Software
    • Cybersecurity
  • Gaming
  • Imaging
  • Internet
  • Media
  • Mobile
    • Cellphones
    • Tablets
  • PC
  • Telecom
Follow US
© 2023 Goondu Media Pte Ltd. All Rights Reserved.
Techgoondu > Blog > Cybersecurity > Remember Y2K? Brace for Y2Q, when public encryption keys can be hacked
CybersecurityEnterpriseSoftware

Remember Y2K? Brace for Y2Q, when public encryption keys can be hacked

Grace Chng
Last updated: October 13, 2022 at 6:53 PM
Grace Chng Published October 13, 2022
6 Min Read
SHARE
PHOTO: Karol D via Pexels

Cybersecurity experts are pondering an emerging challenge known as Years To Quantum, or Y2Q, which is when quantum computers develop to the point where they can break widely used public encryption keys.

With the keys, hackers can access banks, hospitals, transportation systems or any other critical infrastructure to wreak damage, said Shisir Singh, chief technology officer of BlackBerry.

Y2Q is keeping Singh awake at night because it is a cyber catastrophe waiting to happen. “The encryption algorithms used in the public encryption keys are very weak. They have been around for 15-20 years. Some one will try to break them.”

The implications of Y2Q are many, but the chief concern is the increased vulnerability it brings to smart cities like Singapore. The interconnected digital infrastructure of smart cities means that a hack on part of the system can have a cascading impact on the entire infrastructure.

Said Singh: “Like Y2K, which took the industry more than five years and US$100 billion to fix, solving the Y2Q is going to take time, because replacing cryptography is much more difficult than adding a couple of digits to a date field.”

“In fact, experience tells us it could take even longer, cost much more money, and a whole of industry effort to solve,” he added.

There have been many reports around the world about the looming threat posed by Y2Q. Estimations of when Y2Q will hit varies between 2024 and 2030.

From a government’s point of view, Singh said that “a regulatory framework like standardising post-quantum cryptography can be imposed to ensure critical parts of the economy are quantum ready”.

Governments together with the tech industry should consider ways of taking pre-emptive steps safeguard their cryptosystems, he added.

Singh was in Singapore on October 12 to attend Cyber Security World Asia, a two-day expo held at Marina Bay Sands.

He also pointed out that the Covid-19 pandemic have resulted in organisations facing unprecedented cybersecurity challenges.

The emerging Work From Anywhere (WFA) trend, increasing cloud adoption and popularity of software-as-a-service solutions pose cybersecurity headaches for organisations.

In the WFA trend, workers are using their homes, cafes and other public places as remote offices. But these places are not ready to be branch offices, said Singh, and they have no firewalls and little or no Internet security.

This is paradise for hackers because they can easily hack into workers’ devices and networks to steal identities and passwords which, in turn, can be used to access corporate infrastructure and steal intellectual property, money or other critical information.

Organisations are also using a multitude of security solutions to monitor network activity and detect illegal intrusions. The result is that a lot of data is collected. But the data is not “talking the same language” making it difficult for cybersecurity professionals to make sense of the data.

Exacerbating these challenges is the popularity of cloud adoption and software-as-a-service solutions which have opened up a torrent of Internet traffic on networks and increased the attack surface for hackers.

Hence the importance of artificial intelligence and machine learning to help make sense of the humongous amount of data that is being collected today by security solutions.

The AI and ML systems can sieve out the “noise” – the unimportant information that makes up the majority of the data stream – and only pick out a small part that matters to organisations.

The small part comprises the suspicious network activity and user patterns that could pose as cyber threats.

Cybersecurity professionals can then deal with the data that matters, undertaking the analysis and taking follow-up action. Previously, cybersecurity professionals have to play catch up all the time, Singh explained.

To identify the potential threats from the humongous data stream could take days which means that emerging threats often could go undetected.

BlackBerry has been training its artificial intelligence (AI) and machine learning (ML) systems from the telemetry collected by nearly 500 million end points where its security software is running. With the training, AI and ML systems can sieve out the “noise” and identify the suspicious activity.

To prepare customers for the next generation of cyber threats, Blackberry is also offering a zero-trust policy framework.

This is about secured connectivity for managed devices which are trying to access data from the data centres or cloud services, said Singh.

“It is a very stringent framework where the network is continuously monitored based on user behaviour based analysis and threat protection and data protection,” he added.

During the pandemic, he noted that “there was a 630 per cent increase in illegal cyber activity in the last two years”.

You Might Also Like

As TikTok faces a possible ban in the US, should users elsewhere be worried?

Foodpanda to use Gogoro electric scooters in battery swapping trial with Cycle & Carriage

RedCap: A new cellular IoT technology for the 5G era

Debate on computational photography misses what’s real, what’s lived outside a frame

Q&A: Delivering movies digitally and securely from around the world

TAGGED: BlackBerry, Cyber Security World Asia, hybrid work, quantum computing, Y2Q

Sign up for the TG newsletter

Never miss anything again. Get the latest news and analysis in your inbox.

By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Grace Chng October 13, 2022
Share this Article
Facebook Twitter Whatsapp Whatsapp LinkedIn Copy Link Print
Share
Avatar photo
By Grace Chng
Follow:
A seasoned writer, author and industry observer, Grace was the key tech writer for The Straits Times for more than three decades. She co-founded and edited Computer Times, later renamed Digital Life. She helmed this publication, the de facto national IT magazine, for nearly 19 years. Grace is also the editor and co-curator of Intelligent Island: The Untold Story of Singapore’s Tech Journey, a book highlighting Singapore’s ICT development.
Previous Article PC shipments fall 15 per cent in Q3 2022 but still higher than before pandemic: IDC
Next Article Xiaomi’s push into premium smartphone market could use a lens from Leica
Leave a comment

Leave a Reply Cancel reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Stay Connected

Facebook Like
Twitter Follow

Latest News

As TikTok faces a possible ban in the US, should users elsewhere be worried?
Cybersecurity Internet March 24, 2023
Foodpanda to use Gogoro electric scooters in battery swapping trial with Cycle & Carriage
Enterprise Internet March 23, 2023
RedCap: A new cellular IoT technology for the 5G era
Enterprise Software Telecom March 23, 2023
Sony Playstation VR2 review: An immersive experience awaits
Gaming March 21, 2023
//

Techgoondu.com is published by Goondu Media Pte Ltd, a company registered and based in Singapore.

.

Started in June 2008 by technology journalists and ex-journalists in Singapore who share a common love for all things geeky and digital, the site now includes segments on personal computing, enterprise IT and Internet culture.

banner banner
Everyday DIY
PC needs fixing? Get your hands on with the latest tech tips
READ ON
banner banner
Leaders Q&A
What tomorrow looks like to those at the leading edge today
FIND OUT
banner banner
Advertise with us
Discover unique access and impact with TG custom content
SHOW ME

 

 

POWERED BY READYSPACE
The Techgoondu website is powered by and managed by Readyspace Web Hosting.

TechgoonduTechgoondu
Follow US

© 2023 Goondu Media Pte Ltd. All Rights Reserved | Privacy | Terms of Use | Advertise | About Us | Contact

Join Us!

Never miss anything again. Get the latest news and analysis in your inbox.

Zero spam, Unsubscribe at any time.
 

Loading Comments...
 

    Welcome Back!

    Sign in to your account

    Lost your password?