Page 233 - Cyber Defense eMagazine RSAC Special Edition 2025
P. 233

II. Introduction: The Quantum Horizon and Encrypted Data

            Quantum computing presents a fundamental challenge. Its theorized capabilities cause concern because
            they challenge the backbone of digital security and may render many if not all of our current encryption
            standards obsolete. These concerns are further amplified due to the large amounts of encrypted data
            already stolen via data breaches. In 2023, IBM estimated the average data breach involved 4.35 million
            records, 83% of which included encrypted data. IBM also estimated that 83% of those breaches included
            encrypted data. Such figures suggest over 10 billion encrypted records may be stolen annually. There
            are likely several petabytes (1 petabyte = 1,000 terabytes) of encrypted data already stolen.



            III. The Quantum Threat to Modern Cryptography

            A. Principles of Quantum Computing

            There are two key quantum mechanical phenomena, superposition and entanglement, that enable qubits
            to  operate  fundamentally  differently  than  classical  bits.  Superposition  allows  a  qubit  to  exist  in  a
            probabilistic combination of both 0 and 1 states simultaneously, significantly increasing the amount of
            information a small number of qubits can hold. Entanglement, links the quantum states of two or more
            qubits together in such a way that they become correlated, regardless of the physical distance separating
            them. These capabilities allow quantum computers to explore a vast number of possibilities concurrently,
            potentially offering exponential speedups over classical supercomputers.






            IV. The Land of Encrypted Stolen Data
            A. Today’s Common Encryption Methods Used


            The vast majority of sensitive data is protected using prevalent encryption algorithms. Rivest-Shamir-
            Adleman (RSA) and Elliptic Curve Cryptography (ECC) are widely employed for public-key cryptography.
            Advanced Encryption Standard (AES) is a widely adopted symmetric encryption standard used to encrypt
            large amounts of data.

            B. Types of Sensitive Data Targeted

            A  wide  range  of  sensitive  data,  including  financial  records,  Personally  Identifiable  Information  (PII),
            intellectual property, and government secrets, is encrypted and stored by individuals, organizations, and
            governments. This information is highly sought after by malicious actors for purposes such as financial
            fraud, identity theft, corporate espionage, and compromising national security. Consequently, a market
            exists on the dark web where various types of stolen data are sold at different prices. For instance,
            personal  data  profiles  can  cost  $10-$100,  financial  details  like  credit  cards  range  from  $5-$120,
            compromised corporate databases can fetch $500-$100,000, and government credentials like passports
            may sell for $500-$3,000, with prices varying based on the data's sensitivity and completeness.







                                                                                                            233
   228   229   230   231   232   233   234   235   236   237   238