Encryption Concept
Remember Nokia? Back before smartphones, many of us carried Nokia’s nearly indestructible cell phones. They no longer make phones, but don’t count Nokia out. Ever since the company was founded in 1865, Nokia has successfully pivoted to industries showing promise.
A Brief History of Nokia
Here’s a fun trivia fact you can use at your next party: Nokia once made toilet paper. In fact, the company was initially founded as a pulp mill. Later, the Finnish company made rubber boots and respirators.
Nokia’s Acquisition of Bell Labs
Here’s another name you might be familiar with: Bell Labs. For years, Bell Labs was at the forefront of technology research. In fact, UNIX (which inspired Linux) was developed at Bell Labs, along with many other critical technologies like lasers, transistors, the C and C++ programming languages, and even optical fiber systems. In 2016, Nokia acquired Bell Labs.
Nokia’s Quantum-Safe Networks
Now, Nokia’s portfolio of hardware and software solutions — spanning mobile and fixed network infrastructure, cloud data center technologies, and beyond — serves as a foundation for digitalization and the AI and quantum era across industries.
Martin Charbonneau, Head of Quantum-Safe Networks at Nokia
According to Martin Charbonneau, head of Quantum-Safe Networks at Nokia, "7 out of 10 fiber-connected homes in the US use Nokia technology, 15 out of 20 power utilities in the US, and more than 1,000 public sector organizations worldwide trust our technologies for their critical operations."
Quantum Computing and Encryption
ZDNET had the opportunity to sit down with Martin to discuss another transformative technology on the cusp: quantum computing. Quantum computing is expected to be able to solve some problems a million times faster (yes, you read that right, a million) than conventional computing. Some of our most robust encryption algorithms could take tens or hundreds of thousands of years to crack using traditional computing. But with quantum computing, those problems could be solved in seconds.
The Threat of Quantum-Based Attacks
Let’s dive deep into what this all means for telecommunications, security, AI, and our future.
ZDNET: How does quantum computing differ from classical computing?
Martin Charbonneau: Conventional computers are based on the concept that electrical signals can be in only one of two states or binary bits to store and process data — on or off, zeros and ones. Quantum computers are based on the principles of quantum mechanics. Quantum computers can encode more data concurrently using quantum bits, or qubits, in superposition, which can scale exponentially.
The Impact of Quantum Computing on Encryption
ZDNET: Why does quantum computing pose such a significant threat to current encryption methods?
Martin Charbonneau: Quantum computers can solve problems or compromise mathematical cryptography algorithms in mere minutes that would have taken even the biggest conventional supercomputers thousands of years to compromise.
The Vulnerability of Critical Industries
ZDNET: Could you provide an example of a critical industry particularly vulnerable to quantum-based attacks?
Martin Charbonneau: Many of the particularly vulnerable industries are the organizations we think of as being targets of cyber threats today, like governments and defense organizations. But in reality, with today’s public key cryptography rendered useless, all networks — across all industries — will become vulnerable to attack. Threat actors could cripple critical infrastructure by attacking the networks that support them.
The Need for Quantum-Safe Encryption
ZDNET: What are the primary encryption methods at risk with the advent of quantum computing?
Martin Charbonneau: As we move into the Quantum 2.0 age, many of the standard cryptography algorithms and protocols in place today are at risk from a CRQC.
The Future of Quantum-Safe Critical Infrastructure
ZDNET: Could you share your vision of what a fully quantum-safe critical infrastructure might look like in the next 10–20 years?
Martin Charbonneau: In the next 10 to 20 years, we foresee a fully quantum-safe digital world, where advanced quantum-safe technologies will protect sensitive data at both the application and network layers. Post-Quantum Cryptography (PQC), Pre-Shared Key (PSK) cryptography, and Quantum Key Distribution (QKD) will ensure secure, confidential, and tamper-proof communications.
Conclusion
In conclusion, the advent of quantum computing poses a significant threat to current encryption methods, and it is essential for organizations to start considering quantum-safe encryption solutions to protect their data and infrastructure.
FAQs
Q: What is quantum computing?
A: Quantum computing is a type of computing that uses the principles of quantum mechanics to perform calculations and operations.
Q: How does quantum computing differ from classical computing?
A: Quantum computers are based on the principles of quantum mechanics, whereas classical computers are based on the concept of binary bits.
Q: What is the threat of quantum-based attacks?
A: Quantum computers can solve problems or compromise mathematical cryptography algorithms in mere minutes that would have taken even the biggest conventional supercomputers thousands of years to compromise.
Q: What are the primary encryption methods at risk with the advent of quantum computing?
A: Many of the standard cryptography algorithms and protocols in place today are at risk from a CRQC.
Q: What is the future of quantum-safe critical infrastructure?
A: In the next 10 to 20 years, we foresee a fully quantum-safe digital world, where advanced quantum-safe technologies will protect sensitive data at both the application and network layers.