The cybersecurity implications of quantum computing (2024)

Threat 2: Making Asymmetric Cryptography Obsolete

Implementation of a practical quantum computer will render most current asymmetric encryption methods unsafe, such as RSA, Diffie-Hellman (DH), and Elliptic Curve Cryptography (ECC).

Back in 1994, Peter Shor developed a theoretical quantum algorithm to find the prime factors of a large integer. While important research, it was not considered an immediate risk, given the lack of the technology to implement quantum computers.

Now, however, quantum computing is much closer to becoming mainstream. In 2021, IDC estimated that by 2027, the market for quantum computing may grow to $8.6 billion, a 50% compound annual growth rate since its value of $412 million in 2020. It poses a “Quantum Threat,” a match for the complicated math problems previously unbeatable by classic computers. The world's data, currently protected by asymmetric cryptography algorithms such as RSA, DH and ECC, will soon become readable – and subsequently, easy for cybercriminals to infiltrate and bring down global digital security.

Put simply, a practical quantum computer could not only render traditional online activities insecure; it could break most of the security underpinning the internet.

Threat 3: The vulnerabilities of blockchain technology

Besides threatening current encryption schemes, quantum computing has the capacity to render blockchain technology extremely vulnerable. Because blockchain depends on the disseminated consensus of trust, achieved through the use of public-key cryptography, it is particularly susceptible to attacks that reveal a user’s private key given, only the public key.

A recent study found that 25% of all bitcoins in circulation and 65% of ether — the tokens in the Ethereum network — reside in addresses with a public key that is published on the blockchain. This means they could be stolen by leveraging a quantum computer with sufficient resources. Hundreds of billions of dollars’ worth of cryptocurrencies could be vulnerable to this attack vector.

Developing Post-Quantum Cryptography and Encryption Solutions

Although there is no consensus on a timeline for when practical quantum computers are expected to mature, it is clear that institutions with information that holds value beyond the next decade or so should prepare for quantum threats.

For organizations, it is important to build awareness of the threat quantum computing poses beyond the cybersecurity experts to the senior leaders and executive decision-makers. This will help organizations to develop a more cohesive response across different levels and stakeholders.

Governments and businesses have already begun preparing for a post-quantum world. For example, CISA and NSA recently released quantum-resistant algorithm recommendations andrequirementsfor critical infrastructure and national security systems based on thepost-quantum cryptography selections from NIST.

With time, it will become even more important to be agile. Organizations can focus their strategy on “crypto agility,” by which they will be able to switch between crypto algorithms seamlessly in case one or more become vulnerable to attack. For enterprises hesitant to adopt new and untested algorithms, there is the option of integrating classical and quantum-based solutions for a hybrid approach.

Other technologies, like Post-Quantum Cryptography, or technologies based on the characteristics of quantum mechanics – think Quantum Key Distribution and Quantum Random Number Generation – is also a way to strengthen cryptography.

As we have seen in recent years, companies unprepared for the worst outcome became victims to new and unstoppable breaches and ransomware attacks. Regardless of the uncertainty around quantum threats, taking necessary precautions and keeping an eye on the horizon could have a significant impact, beyond seamlessly transitioning companies in the quantum era. In fact, it may make all the difference as to whether or not a company will succeed in a post-quantum world.

The cybersecurity implications of quantum computing (2024)

FAQs

The cybersecurity implications of quantum computing? ›

The Cyber Security Implications of Quantum Computing

Will quantum computers make cybersecurity obsolete? ›

Quantum computers, an emerging technology that vastly accelerates processing power by performing calculations in parallel rather than sequentially, will make existing encryption systems obsolete. IBM has developed many of the foundational technologies for the quantum era, which Assis said could arrive by 2030.

What is the impact of quantum computing on security in emerging technologies? ›

As quantum computers threaten classical encryption methods, developing quantum-resistant algorithms becomes important. Quantum computing can contribute to creating and implementing cryptographic techniques resilient to quantum attacks, ensuring the long-term security of digital communications.

What are the potential implications of quantum computing on the security and encryption protocols used in computer networks? ›

Given that cryptographic algorithms rely on processing speed to solve incredibly difficult math problems, the increased speed of calculation using quantum processors could solve the encryption algorithms currently in use, threatening the security of the encrypted data, whether in transit, in use, or stored.

What are the security implications of adopting quantum computing in sensitive sectors? ›

Quantum computing introduces new vulnerabilities in the realm of data security. Classical encryption methods rely on the computational difficulty of certain mathematical problems, such as factoring large prime numbers (RSA) or solving discrete logarithms (Elliptic Curve Cryptography).

What are the cybersecurity implications of quantum computing? ›

Planning for quantum computing risk

Quantum computers will be able to break common encryption methods at an alarming speed. Encryption tools currently used to protect everything from banking and retail transactions to business data, documents and digital signatures can be rendered ineffective – fast.

Why did NASA stop quantum computing? ›

The abrupt shutdown of NASA's quantum computing project was triggered by an unforeseen incident during a routine test. During the analysis of a complex simulation, the quantum computer demonstrated unprecedented computational power, solving a previously intractable problem.

What is the future of quantum computing in cyber security? ›

"Quantum computing will upend the security infrastructure of the digital economy. Quantum technology in general promises to disrupt several areas of advanced technology and bring unprecedented capabilities that can be harnessed to improve the lives of people worldwide.

What is the quantum computer security threat? ›

Q-Day is when a quantum computer so powerful is built, it could break the public encryption systems that protect our online conversations, bank accounts, and most vital infrastructure, wreaking havoc on governments and businesses.

Is quantum computing a threat to encryption? ›

An attacker can intercept and store encrypted data today, and when quantum computers become feasible, the attacker could decrypt the stored data. If quantum computers are realised in fewer than the number of years the data must be confidential for, the security requirement has been broken.

What happens to encryption after quantum computing? ›

As such, quantum computers have the potential to render current encryption methods vulnerable to attack, compromising the security of sensitive data. Thus, the threat becomes real when more powerful quantum computers are developed in the future, which could defeat commonly used encryption systems.

How quantum computer is a threat to blockchain? ›

Quantum computing presents both opportunities and challenges for blockchain technology. While the immediate threat to blockchain consensus mechanisms remains low due to the current state of quantum computing, the potential long-term risks to wallet security and transaction integrity are significant.

What are the concerns of quantum security? ›

Quantum computing poses a significant cyber threat to current cryptographic algorithms which rely on computational complexities that quantum computers may be able to solve in a matter of hours.

What are the benefits of quantum computing in security? ›

Quantum computers can help in developing new forms of encryption like Quantum Key Distribution (QKD), which is considered virtually unhackable. QKD uses quantum cryptography to ensure secure communication, providing a significant advantage over traditional methods.

What is the risk of quantum computing? ›

One of the biggest and most immediate threats will be the fact that quantum computers will easily be able to break current encryption standards. Currently, the world's data is protected by public key encryption. This is the system that enables us to bank online and to trade with others safely.

Will quantum computers break the encryption that protects the Internet? ›

Researchers typically estimate that it will be many years until quantum computers can crack cryptographic keys—the strings of characters used in an encryption algorithm to protect data—faster than ordinary computers.

Will cybersecurity become obsolete? ›

Despite pervasive fears of job loss, the cybersecurity community has yet to see any roles become obsolete. Instead, the community is seeing roles evolve and expect a whole new sphere of AI security specialist roles to emerge.

Will quantum computers break security? ›

Researchers typically estimate that it will be many years until quantum computers can crack cryptographic keys—the strings of characters used in an encryption algorithm to protect data—faster than ordinary computers.

Will artificial intelligence replace cyber security? ›

Will AI replace cybersecurity jobs? While AI can automate specific tasks in cybersecurity, it is unlikely to replace the need for cybersecurity professionals completely. Instead, it will augment their capabilities and improve threat detection and response. How can AI be used in cybersecurity?

Top Articles
What is the Average Airbnb Pet Fee? What is reasonable? - BnB Facts
What's the Hardest Part of Full Cycle Recruiting? - Best of HR
Craigslist San Francisco Bay
Tiny Tina Deadshot Build
Top 11 Best Bloxburg House Ideas in Roblox - NeuralGamer
Compare Foods Wilson Nc
Uca Cheerleading Nationals 2023
What is Mercantilism?
Ets Lake Fork Fishing Report
Western Union Mexico Rate
Craigslist Cars And Trucks For Sale By Owner Indianapolis
Flixtor The Meg
No Hard Feelings Showtimes Near Metropolitan Fiesta 5 Theatre
Marist Dining Hall Menu
What is international trade and explain its types?
Rubfinder
Rainfall Map Oklahoma
Anki Fsrs
Valentina Gonzalez Leaked Videos And Images - EroThots
Springfield Mo Craiglist
Blackwolf Run Pro Shop
Craigslist In Flagstaff
All Obituaries | Buie's Funeral Home | Raeford NC funeral home and cremation
Energy Healing Conference Utah
Amih Stocktwits
Where to eat: the 50 best restaurants in Freiburg im Breisgau
Ice Dodo Unblocked 76
Sienna
Kirk Franklin Mother Debra Jones Age
Cal State Fullerton Titan Online
The Collective - Upscale Downtown Milwaukee Hair Salon
Lacey Costco Gas Price
Pixel Combat Unblocked
Donald Trump Assassination Gold Coin JD Vance USA Flag President FIGHT CIA FBI • $11.73
Mkvcinemas Movies Free Download
Staar English 1 April 2022 Answer Key
3400 Grams In Pounds
Zasilacz Dell G3 15 3579
Daily Times-Advocate from Escondido, California
Is The Nun Based On a True Story?
Hometown Pizza Sheridan Menu
Gvod 6014
Craigslist Mexicali Cars And Trucks - By Owner
Dcilottery Login
Lbl A-Z
Joey Gentile Lpsg
Anthem Bcbs Otc Catalog 2022
Mybiglots Net Associates
About Us
Amy Zais Obituary
Rise Meadville Reviews
Predator revo radial owners
Latest Posts
Article information

Author: Francesca Jacobs Ret

Last Updated:

Views: 6034

Rating: 4.8 / 5 (48 voted)

Reviews: 95% of readers found this page helpful

Author information

Name: Francesca Jacobs Ret

Birthday: 1996-12-09

Address: Apt. 141 1406 Mitch Summit, New Teganshire, UT 82655-0699

Phone: +2296092334654

Job: Technology Architect

Hobby: Snowboarding, Scouting, Foreign language learning, Dowsing, Baton twirling, Sculpting, Cabaret

Introduction: My name is Francesca Jacobs Ret, I am a innocent, super, beautiful, charming, lucky, gentle, clever person who loves writing and wants to share my knowledge and understanding with you.