The cybersecurity implications of quantum computing (2024)

Threat 2: Making Asymmetric Cryptography Obsolete

Implementation of a practical quantum computer will render most current asymmetric encryption methods unsafe, such as RSA, Diffie-Hellman (DH), and Elliptic Curve Cryptography (ECC).

Back in 1994, Peter Shor developed a theoretical quantum algorithm to find the prime factors of a large integer. While important research, it was not considered an immediate risk, given the lack of the technology to implement quantum computers.

Now, however, quantum computing is much closer to becoming mainstream. In 2021, IDC estimated that by 2027, the market for quantum computing may grow to $8.6 billion, a 50% compound annual growth rate since its value of $412 million in 2020. It poses a “Quantum Threat,” a match for the complicated math problems previously unbeatable by classic computers. The world's data, currently protected by asymmetric cryptography algorithms such as RSA, DH and ECC, will soon become readable – and subsequently, easy for cybercriminals to infiltrate and bring down global digital security.

Put simply, a practical quantum computer could not only render traditional online activities insecure; it could break most of the security underpinning the internet.

Threat 3: The vulnerabilities of blockchain technology

Besides threatening current encryption schemes, quantum computing has the capacity to render blockchain technology extremely vulnerable. Because blockchain depends on the disseminated consensus of trust, achieved through the use of public-key cryptography, it is particularly susceptible to attacks that reveal a user’s private key given, only the public key.

A recent study found that 25% of all bitcoins in circulation and 65% of ether — the tokens in the Ethereum network — reside in addresses with a public key that is published on the blockchain. This means they could be stolen by leveraging a quantum computer with sufficient resources. Hundreds of billions of dollars’ worth of cryptocurrencies could be vulnerable to this attack vector.

Developing Post-Quantum Cryptography and Encryption Solutions

Although there is no consensus on a timeline for when practical quantum computers are expected to mature, it is clear that institutions with information that holds value beyond the next decade or so should prepare for quantum threats.

For organizations, it is important to build awareness of the threat quantum computing poses beyond the cybersecurity experts to the senior leaders and executive decision-makers. This will help organizations to develop a more cohesive response across different levels and stakeholders.

Governments and businesses have already begun preparing for a post-quantum world. For example, CISA and NSA recently released quantum-resistant algorithm recommendations andrequirementsfor critical infrastructure and national security systems based on thepost-quantum cryptography selections from NIST.

With time, it will become even more important to be agile. Organizations can focus their strategy on “crypto agility,” by which they will be able to switch between crypto algorithms seamlessly in case one or more become vulnerable to attack. For enterprises hesitant to adopt new and untested algorithms, there is the option of integrating classical and quantum-based solutions for a hybrid approach.

Other technologies, like Post-Quantum Cryptography, or technologies based on the characteristics of quantum mechanics – think Quantum Key Distribution and Quantum Random Number Generation – is also a way to strengthen cryptography.

As we have seen in recent years, companies unprepared for the worst outcome became victims to new and unstoppable breaches and ransomware attacks. Regardless of the uncertainty around quantum threats, taking necessary precautions and keeping an eye on the horizon could have a significant impact, beyond seamlessly transitioning companies in the quantum era. In fact, it may make all the difference as to whether or not a company will succeed in a post-quantum world.

The cybersecurity implications of quantum computing (2024)

FAQs

The cybersecurity implications of quantum computing? ›

The Cyber Security Implications of Quantum Computing

Will quantum computers make cybersecurity obsolete? ›

Quantum computers, an emerging technology that vastly accelerates processing power by performing calculations in parallel rather than sequentially, will make existing encryption systems obsolete. IBM has developed many of the foundational technologies for the quantum era, which Assis said could arrive by 2030.

What is the impact of quantum computing on security in emerging technologies? ›

As quantum computers threaten classical encryption methods, developing quantum-resistant algorithms becomes important. Quantum computing can contribute to creating and implementing cryptographic techniques resilient to quantum attacks, ensuring the long-term security of digital communications.

What are the potential implications of quantum computing on the security and encryption protocols used in computer networks? ›

Given that cryptographic algorithms rely on processing speed to solve incredibly difficult math problems, the increased speed of calculation using quantum processors could solve the encryption algorithms currently in use, threatening the security of the encrypted data, whether in transit, in use, or stored.

What are the security implications of adopting quantum computing in sensitive sectors? ›

Quantum computing introduces new vulnerabilities in the realm of data security. Classical encryption methods rely on the computational difficulty of certain mathematical problems, such as factoring large prime numbers (RSA) or solving discrete logarithms (Elliptic Curve Cryptography).

What are the cybersecurity implications of quantum computing? ›

Planning for quantum computing risk

Quantum computers will be able to break common encryption methods at an alarming speed. Encryption tools currently used to protect everything from banking and retail transactions to business data, documents and digital signatures can be rendered ineffective – fast.

Why did NASA stop quantum computing? ›

The abrupt shutdown of NASA's quantum computing project was triggered by an unforeseen incident during a routine test. During the analysis of a complex simulation, the quantum computer demonstrated unprecedented computational power, solving a previously intractable problem.

What is the future of quantum computing in cyber security? ›

"Quantum computing will upend the security infrastructure of the digital economy. Quantum technology in general promises to disrupt several areas of advanced technology and bring unprecedented capabilities that can be harnessed to improve the lives of people worldwide.

What is the quantum computer security threat? ›

Q-Day is when a quantum computer so powerful is built, it could break the public encryption systems that protect our online conversations, bank accounts, and most vital infrastructure, wreaking havoc on governments and businesses.

Is quantum computing a threat to encryption? ›

An attacker can intercept and store encrypted data today, and when quantum computers become feasible, the attacker could decrypt the stored data. If quantum computers are realised in fewer than the number of years the data must be confidential for, the security requirement has been broken.

What happens to encryption after quantum computing? ›

As such, quantum computers have the potential to render current encryption methods vulnerable to attack, compromising the security of sensitive data. Thus, the threat becomes real when more powerful quantum computers are developed in the future, which could defeat commonly used encryption systems.

How quantum computer is a threat to blockchain? ›

Quantum computing presents both opportunities and challenges for blockchain technology. While the immediate threat to blockchain consensus mechanisms remains low due to the current state of quantum computing, the potential long-term risks to wallet security and transaction integrity are significant.

What are the concerns of quantum security? ›

Quantum computing poses a significant cyber threat to current cryptographic algorithms which rely on computational complexities that quantum computers may be able to solve in a matter of hours.

What are the benefits of quantum computing in security? ›

Quantum computers can help in developing new forms of encryption like Quantum Key Distribution (QKD), which is considered virtually unhackable. QKD uses quantum cryptography to ensure secure communication, providing a significant advantage over traditional methods.

What is the risk of quantum computing? ›

One of the biggest and most immediate threats will be the fact that quantum computers will easily be able to break current encryption standards. Currently, the world's data is protected by public key encryption. This is the system that enables us to bank online and to trade with others safely.

Will quantum computers break the encryption that protects the Internet? ›

Researchers typically estimate that it will be many years until quantum computers can crack cryptographic keys—the strings of characters used in an encryption algorithm to protect data—faster than ordinary computers.

Will cybersecurity become obsolete? ›

Despite pervasive fears of job loss, the cybersecurity community has yet to see any roles become obsolete. Instead, the community is seeing roles evolve and expect a whole new sphere of AI security specialist roles to emerge.

Will quantum computers break security? ›

Researchers typically estimate that it will be many years until quantum computers can crack cryptographic keys—the strings of characters used in an encryption algorithm to protect data—faster than ordinary computers.

Will artificial intelligence replace cyber security? ›

Will AI replace cybersecurity jobs? While AI can automate specific tasks in cybersecurity, it is unlikely to replace the need for cybersecurity professionals completely. Instead, it will augment their capabilities and improve threat detection and response. How can AI be used in cybersecurity?

Top Articles
Revolut CEO eyes expansion into mortgages, crypto wallets
How to disable TLS 1.0 in Windows 11/10
Bank Of America Financial Center Irvington Photos
Koordinaten w43/b14 mit Umrechner in alle Koordinatensysteme
The Best English Movie Theaters In Germany [Ultimate Guide]
World Cup Soccer Wiki
What’s the Difference Between Cash Flow and Profit?
R/Altfeet
Dumb Money
Craigslist Pets Sac
What is Cyber Big Game Hunting? - CrowdStrike
Who called you from 6466062860 (+16466062860) ?
Sport-News heute – Schweiz & International | aktuell im Ticker
1v1.LOL - Play Free Online | Spatial
Missed Connections Dayton Ohio
Little Caesars 92Nd And Pecos
Japanese Mushrooms: 10 Popular Varieties and Simple Recipes - Japan Travel Guide MATCHA
Regal Amc Near Me
Amerisourcebergen Thoughtspot 2023
Bidrl.com Visalia
Harbor Freight Tax Exempt Portal
Fuse Box Diagram Honda Accord (2013-2017)
Striffler-Hamby Mortuary - Phenix City Obituaries
Where to eat: the 50 best restaurants in Freiburg im Breisgau
Toonkor211
Imagetrend Elite Delaware
Vlacs Maestro Login
3473372961
Lincoln Financial Field, section 110, row 4, home of Philadelphia Eagles, Temple Owls, page 1
Transformers Movie Wiki
Nacogdoches, Texas: Step Back in Time in Texas' Oldest Town
Unm Hsc Zoom
Teenage Jobs Hiring Immediately
67-72 Chevy Truck Parts Craigslist
Arcane Odyssey Stat Reset Potion
Covalen hiring Ai Annotator - Dutch , Finnish, Japanese , Polish , Swedish in Dublin, County Dublin, Ireland | LinkedIn
Whitehall Preparatory And Fitness Academy Calendar
D3 Boards
Cl Bellingham
888-333-4026
Colorado Parks And Wildlife Reissue List
The Listings Project New York
Rocky Bfb Asset
Content Page
3500 Orchard Place
A rough Sunday for some of the NFL's best teams in 2023 led to the three biggest upsets: Analysis
Dietary Extras Given Crossword Clue
116 Cubic Inches To Cc
Black Adam Showtimes Near Kerasotes Showplace 14
Craigslist Pets Lewiston Idaho
Appsanywhere Mst
Noaa Duluth Mn
Latest Posts
Article information

Author: Francesca Jacobs Ret

Last Updated:

Views: 6034

Rating: 4.8 / 5 (48 voted)

Reviews: 95% of readers found this page helpful

Author information

Name: Francesca Jacobs Ret

Birthday: 1996-12-09

Address: Apt. 141 1406 Mitch Summit, New Teganshire, UT 82655-0699

Phone: +2296092334654

Job: Technology Architect

Hobby: Snowboarding, Scouting, Foreign language learning, Dowsing, Baton twirling, Sculpting, Cabaret

Introduction: My name is Francesca Jacobs Ret, I am a innocent, super, beautiful, charming, lucky, gentle, clever person who loves writing and wants to share my knowledge and understanding with you.