I have recently read in a newspaper the claim " once quantum computers are sufficiently advanced, they will render current cybersecurity technologies completely ineffective ". As a civil servant "sufficiently expert" in this field, I feel it is my duty to point out that this claim is deeply wrong. I will do so at least in this web blog. Quantum computers and Post-quantum cryptography (PQC) Once so-called ‘ quantum computers ’ become available in practice, they will be capable of breaking certain cryptographic algorithms that have been widely used for many years and are still used today. For this reason, for years now, there has been a huge push worldwide to accelerate the transition to so-called ‘post-quantum cryptography’ (PQC): cryptographic algorithms that can be executed by the standard computers we already have today , but which cannot be ‘decrypted’ even by the quantum computers of the future . Various PQC algorithms have already been developed and standardise...
Maybe I should prove that I am not against AI and that I do use AI for my daily job. In this post I will describe how I extracted MITRE ATT&CK techniques from an incident report automatically , by using Gemini (MITRE ATT&CK is a powerful framework for reasoning about attacks and I use this framework intensively in my Cybersecurity course). First a bit of context. Yesterday I posted this note on the team of the course: A recent technical report by Google is a concrete example of many of the concepts discussed in some of the recent lectures. New attack campaigns are discovered by highly skilled organizations, there is an infection chain leading to the final malware, the infection chain may be composed of multiple obfuscated scripts downloaded and executed from different locations, vulnerabilities that may or may not be publicly known at the time of their exploitation allow escalating privilege, IoC and YARA rules are released for the benefit of the rest of the world ....