Drs. Ir. Maran van Heesch
- quantum applications
- quantum computing
- quantum security
Picture this: a quantum computer exists which can handle complex problems that are practically unsolvable for today’s computers as the calculations would take centuries. Which contributes to new products and services. Which has the potential to help in the development of personal medicines. However, we also need answers regarding the security risks of the quantum age. This is why it’s crucial to secure information against attacks that use a quantum computer. TNO can help companies to make networks quantum-safe and to solve legacy problems. The quantum-safe VPN connection (Virtual Private Network) is an example of this.
Cryptography is widely used to shield information from unauthorised access. This has been successful because even the fastest computers would take hundreds to millions of years to decipher encrypted information. With the advent of the quantum computer, however, this will change. Although it will take some time before a quantum computer that can crack cryptography actually exists, it’s important to take action now. All encrypted information which is currently being communicated or stored can be saved for later cracking by a quantum computer. To ensure that confidential information remains secure for a long time, it is important to develop cryptosystems that can withstand attacks from both the current computer and the quantum computer: so-called post-quantum cryptography or quantum-safe cryptography.
Find out which steps you need to take
Organisaties hebben veel software applicaties draaien, waardoor een totaaloverzicht vaak ontbreekt. Bovendien zijn oude systemen, zogenaamde legacy systemen, ver na de verwachte levensduur nog steeds in gebruik en ondersteunen belangrijke, vaak grootschalige en kritieke ICT-processen. Deze erfenis aan systemen zet een rem op innovatie en vormt een steeds groter risico voor de stabiliteit en betrouwbaarheid. Om dit legacy probleem op te lossen, de wanorde te ontrafelen én het netwerk quantum-safe te maken is een slimme oplossing nodig.
The advent of the quantum computer and existing legacy problems create challenges for companies. One often no longer knows what’s going on within the company network and it’s difficult to determine if the most recent version of cryptography is being used everywhere. Figuring this out and then re-securing your systems is a huge task. Where should you start? With the inventory – and TNO can help with this.
Within TNO, there is a strong foundation of applied cryptographic knowledge and a lot of expertise in the fields of internet, communication networks and cybersecurity. This unique combination enables us to oversee the impact of post-quantum cryptography and to advise and guide organisations in the transition process for their information security.
Please contact Maran van Heesch