DAVID GLASS' CYBER BLOG

Send Email LinkedIn logo
David Glass picture

Hi, I'm David!

Hey there! I'm David Glass, just another cybersec geek trying to make sense of the digital chaos. Why start a blog? Well, I figured it'd be cool to share what I know, what baffles me, and maybe some of my adventures in the world of cybersecurity.

Blog Posts

The Quantum Leap in Computing: A Double-Edged Sword for Cybersecurity

Quantum Computing, Cybersecurity Threats, Qubits and Superposition, Quantum Parallelism, Shor's Algorithm, RSA Encryption Vulnerability, Quantum-resistant Encryption, Data Security in the Quantum Era

Quantum computers are no longer just a figment of science fiction; they're rapidly becoming a reality, and this could spell trouble for data security as we know it. At the heart of quantum computing are qubits, which, thanks to a principle known as superposition, can represent both 0 and 1 simultaneously. This fundamental difference from classical bits brings about a seismic shift in computing power.

To conceptualize the immense potential of quantum systems, we've devised a new metric: the "Hypothetical Classical Information Equivalent." This attempts to quantify the quantum system's complexity or potential information content in classical terms, combining the computational space and the potential information a quantum system can process due to superposition.

Here's a look at how quantum computing scales compared to classical computing, highlighting the exponential growth in complexity and potential information processing capacity:

Number of Qubits Size of Each Value (Classical Bits Equivalent) Number of Values Represented Simultaneously Hypothetical Classical Information Equivalent
1 2 2 4
2 4 4 16
3 8 8 64
4 16 16 256
5 32 32 1024
6 64 64 4096
7 128 128 16384
8 256 256 65536

Despite the impressive theoretical capabilities, the largest quantum computer currently has 1,225 qubits and has only performed Shor's algorithm on the number 21, factoring it into 3 and 7. Looking ahead, the task of breaking RSA-4096 encryption, a standard in securing data, appears daunting. To crack RSA-4096, an ideal quantum computer would need around 100,000 qubits. However, considering factors like error correction, fault tolerance, quantum volume, and connectivity, a more realistic figure is in the ballpark of 10 million qubits.

Encryption Bit Length Average Prime Digit Length
1024 154
2048 308
3072 462
4096 617

As you can see from the above table, the challenge of breaking RSA encryption with quantum computing becomes starkly apparent when we consider the size of the primes involved. RSA-4096, for instance, relies on prime numbers that are approximately 617 digits long-vastly larger than the single-digit primes, such as 3 and 7, that the largest current quantum computer can factor using Shor's algorithm. This discrepancy highlights not only the infancy of quantum computing in its current state but also the monumental scale of advancement required to pose a real threat to modern encryption standards. It serves as a vivid illustration of the gap between theoretical potential and current capabilities in quantum computing, underscoring the need for continued innovation and development in this exciting field.

In response to the looming threat of quantum decryption, there's a movement towards quantum-resistant encryption. This involves developing cryptographic methods that even quantum computers would struggle to crack. A notable effort in this direction was the recent competition hosted by the National Institute of Standards and Technology (NIST), which aimed to standardize a new, quantum-resistant encryption algorithm.

In the meantime, entities with a "store now, decrypt later" approach are biding their time, waiting for the day when quantum computers can unlock the secrets of encrypted data passing through internet backbone entities like ISPs and CDNs.

The bottom line? The quantum age demands a new kind of cybersecurity vigilance. Transitioning to quantum-resistant encryption isn't just advisable; it's imperative for safeguarding our digital future against the potential for quantum computers to break conventional encryption methods. As we stand on the brink of this new computing era, understanding and preparing for its implications is crucial for everyone, from cybersecurity professionals to everyday internet users.

Image-2

Ransomware: A Modern-Day Digital Hostage Crisis

Ransomware, Digital Extortion, Encryption, Cybersecurity Threats, Data Security, Paying Ransom, Digital Safety, Cyber Resilience

In the shadowy corners of our digital world lurk threats that can turn our daily routines into nightmares. Today, we're diving into one of the most heart-stopping dangers out there: ransomware. Picture this: you're going about your day, clicking through your computer, when suddenly, everything locks up. A chilling message appears, telling you that all your files are encrypted. You've been hit by ransomware, a digital extortion tool that turns your own data against you. The only way to get your files back? Pay up, says the anonymous crook who might as well be a kid from halfway across the globe.

In a panic, you might think, "I'll just restart my computer." But that's exactly what they want you to think. If the decryption keys were lingering in your RAM, rebooting just erases them, leaving you at the mercy of your unseen adversary. Encryption, a marvel that secures our most precious data, has been weaponized to trap you in a digital vice.

So, the million-dollar question: do you pay the ransom? It's a moral and practical maze. Paying up might seem like opening your door to a never-ending stream of demands. Today it's a ransom; tomorrow, it's your entire digital life held hostage over and over again. And there's no honor among thieves-paying the ransom doesn't guarantee your data's return. You might just be funding their next luxury getaway while you're left staring at a blank screen.

Deciding whether to pay is a deeply personal decision, tangled in a web of desperation and fear. If you ever find yourself facing this digital abyss, know that my heart goes out to you. Ransomware is more than a virus; it's a violation of our digital lives. And while the path forward may seem murky, remember, you're not alone in this fight.

As we navigate the murky waters of the digital age, where threats like ransomware attempt to undermine our sense of security and privacy, it's crucial to remember that there are beacons of light in the form of protective measures and strategies. The first step toward safeguarding yourself from such digital extortion is to foster a culture of cyber resilience within your daily digital interactions. Here are a few strategies that can serve as your armor in the battle against ransomware:

Regular Backups: Make it a habit to regularly back up your important files and data. Use multiple formats if possible—cloud storage, external hard drives, or any other secure method. In the event of a ransomware attack, having backups can be your lifeline, allowing you to restore your data without bending to the demands of cybercriminals.

Update and Patch: Keep your software, operating systems, and applications up-to-date. Cybercriminals often exploit vulnerabilities in outdated software to launch their attacks. Regular updates and patches can close these security gaps and fortify your digital defenses.

Educate Yourself and Others: Knowledge is power. Educate yourself and those around you about the common tactics used by ransomware attackers, such as phishing emails and malicious attachments. Recognizing these threats can prevent the initial infection and stop ransomware in its tracks.

Use Robust Security Software: Invest in reputable antivirus and anti-malware solutions with ransomware detection capabilities. These tools can serve as a vigilant guard, monitoring your system for suspicious activities and thwarting attempts to hijack your data.

Practice Principle of Least Privilege (PoLP): Operate your system under the principle of least privilege, meaning users are given only the access that is necessary for their roles. This minimizes the potential impact of a ransomware attack, as the malware's ability to spread and encrypt files can be significantly limited.

In the end, while the threat of ransomware looms large, our collective resilience and proactive measures can light the path through the darkness. By embracing these strategies and maintaining a vigilant stance, we can protect our digital lives from the clutches of digital extortionists. Let this knowledge empower you, serving as a reminder that in the face of adversity, we have the tools and the strength to safeguard our digital world. Together, let's stand firm against ransomware and ensure our digital future remains bright and secure. Stay safe, stay informed, and never lose hope.

Stay safe out there, and let's keep our digital world a little brighter, despite the shadows that lurk within.