{"id":20016,"date":"2026-03-24T15:32:49","date_gmt":"2026-03-24T15:32:49","guid":{"rendered":"https:\/\/ideainthebox.com\/index.php\/2026\/03\/24\/quantum-resilient-ai-needs-migration-and-hardware-protected-data-enclaves\/"},"modified":"2026-03-24T15:32:49","modified_gmt":"2026-03-24T15:32:49","slug":"quantum-resilient-ai-needs-migration-and-hardware-protected-data-enclaves","status":"publish","type":"post","link":"https:\/\/ideainthebox.com\/index.php\/2026\/03\/24\/quantum-resilient-ai-needs-migration-and-hardware-protected-data-enclaves\/","title":{"rendered":"Securing AI systems under today\u2019s and tomorrow\u2019s conditions"},"content":{"rendered":"<div>\n<p> Evidence cited in an eBook titled \u201cAI Quantum Resilience\u201d, published by <a href=\"https:\/\/utimaco.com\/genai-data-protection\">Utimaco<\/a> [email wall], shows organisations consider security risks as the leading barrier to effective adoption of AI on data they hold. <\/p>\n<p> AI\u2019s value depends on data amassed by an organisation. However, there are security risks to building models and training them on that data. These risks are in addition to better-publicised threats to intellectual property that exist around the point of inference (prompt engineering, for example). <\/p>\n<p> The eBook\u2019s authors state that organisations need to manage threats throughout their AI development and implementation processes. At the same time, companies can and should prepare to change their security protocols, changes that will become mandatory if quantum computing-powered decryption tools become easily available to bad actors. <\/p>\n<p> Utimaco lists three areas under threat: <\/p>\n<ul class=\"org-ul\">\n<li>Training data can be manipulated by bad actors, degrading model outputs in ways are hard to detect,<\/li>\n<li>Models can be extracted or copied, eroding intellectual property rights,<\/li>\n<li>Sensitive data used during training or inference can be exposed.<\/li>\n<\/ul>\n<p> Current public key cryptography will become vulnerable in the next ten years, the report\u2019s authors attest; a period in which capable quantum systems may emerge. Regardless of the timescale, it\u2019s thought that better organised groups currently collect encrypted data and store it to decrypt when or if quantum facilities become available. Any dataset with long-term sensitivity, including model training data, financial records, or intellectual property, may require protection against future decryption, therefore, Utimaco says. <\/p>\n<p> A migration to quantum-resistant cryptography will affect protocols, key management, system interoperability, and performance, so any migration is likely to take several years. The report\u2019s authors suggest what they term \u2018crypto-agility\u2019, which it defines as changing cryptographic algorithms without redesigning underlying systems. \u2018Crypto-agility\u2019 is based on the principle of hybrid cryptography \u2013 combining established algorithms with post-quantum methods, such as those suggested by NIST. <\/p>\n<p> The eBook\u2019s authors concur that cryptography on its own doesn\u2019t address all possible areas of risk. It advocates the use of hardware-based trust devices that can isolate cryptographic keys and sensitive operations from normal working environments. <\/p>\n<p> If companies are developing their own AI tools and processes, protection on that basis should extend throughout the AI lifecycle, from data ingestion through to training, model deployment, and inference in production. Hardware keys used to encrypt data and sign models can be generated and stored inside a boundary. Model integrity can then be verified before deployment, and sensitive data processed during inference remains protected. <\/p>\n<p> Hardware-based enclaves isolate workloads so that even system administrators with sufficient privileges can\u2019t access any of the data being processed. Hardware modules can verify that the data enclave is in a trusted state before releasing keys \u2013 a process of external attestation \u2013 helping create a \u2018chain of trust\u2019 from hardware to application. <\/p>\n<p> Hardware-based key management produces tamper-resistant logs covering access and operations to support compliance frameworks such as the EU AI Act. <\/p>\n<p> Many of the risks inherent in AI systems are well known if not already exploited. The risk from quantum computing\u2019s ability to decrypt data currently considered safe is less immediate, but the implications should affect data and infrastructure decisions made today, Utimaco states. It advocates: <\/p>\n<ul class=\"org-ul\">\n<li>A strengthening of controls throughout the AI development and deployment lifecycle,<\/li>\n<li>The introduction of \u2018crypto-agility\u2019 to allow transition to post-quantum security,<\/li>\n<li>Establishing hardware-based trust mechanisms wherever high-value assets are in play.<\/li>\n<\/ul>\n<p><em>(Image source: \u201cScanning electron micrograph of an apoptotic HeLa cell\u201d by National Institutes of Health (NIH) is licensed under CC BY-NC 2.0. To view a copy of this license, visit https:\/\/creativecommons.org\/licenses\/by-nc\/2.0)<\/em><\/p>\n<p>\u00a0<\/p>\n<p><a href=\"https:\/\/www.ai-expo.net\/?utm_source=AI-News&amp;utm_medium=Footer-banner&amp;utm_campaign=world-series\"><img class=\"lazyload\" decoding=\"async\" src=\"data:image\/gif;base64,R0lGODlhAQABAAAAACH5BAEKAAEALAAAAAABAAEAAAICTAEAOw==\" data-orig-src=\"https:\/\/www.artificialintelligence-news.com\/wp-content\/uploads\/2025\/08\/ai-expo-banner-2025.png\"><\/a><\/p>\n<p><strong>Want to learn more about AI and big data from industry leaders?<\/strong> Check out <a href=\"https:\/\/www.ai-expo.net\/\">AI &amp; Big Data Expo<\/a> taking place in Amsterdam, California, and London. The comprehensive event is part of <a href=\"https:\/\/techexevent.com\/\">TechEx<\/a> and co-located with other leading technology events. Click <a href=\"https:\/\/techexevent.com\/\">here<\/a> for more information.<\/p>\n<p>AI News is powered by <a href=\"https:\/\/techforge.pub\/\">TechForge Media<\/a>. Explore other upcoming enterprise technology events and webinars <a href=\"https:\/\/techforge.pub\/events\/\">here<\/a>.<\/p>\n<p>The post <a href=\"https:\/\/www.artificialintelligence-news.com\/news\/quantum-resilient-ai-needs-migration-and-hardware-protected-data-enclaves\/\">Securing AI systems under today\u2019s and tomorrow\u2019s conditions<\/a> appeared first on <a href=\"https:\/\/www.artificialintelligence-news.com\/\">AI News<\/a>.<\/p>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Evidence cited in an eBook titled \u201cAI Quantum Resilience\u201d, published  [&#8230;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"content-type":"","footnotes":""},"categories":[226],"tags":[],"class_list":["post-20016","post","type-post","status-publish","format-standard","hentry","category-technology"],"acf":[],"_links":{"self":[{"href":"https:\/\/ideainthebox.com\/index.php\/wp-json\/wp\/v2\/posts\/20016","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ideainthebox.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ideainthebox.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ideainthebox.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/ideainthebox.com\/index.php\/wp-json\/wp\/v2\/comments?post=20016"}],"version-history":[{"count":0,"href":"https:\/\/ideainthebox.com\/index.php\/wp-json\/wp\/v2\/posts\/20016\/revisions"}],"wp:attachment":[{"href":"https:\/\/ideainthebox.com\/index.php\/wp-json\/wp\/v2\/media?parent=20016"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ideainthebox.com\/index.php\/wp-json\/wp\/v2\/categories?post=20016"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ideainthebox.com\/index.php\/wp-json\/wp\/v2\/tags?post=20016"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}