Quantum-Computing-and-Cyber-Security

IT Tips & Tricks

Quantum Computing and Cyber Security: Are We 24 Months From Mayhem?

8 Steps to Help Ensure Your Organization Is Prepared

By Ed Clark

Published 22 April 2025

The one predictable thing about the anticipated eventual widespread deployment of quantum computing is its sheer unpredictability. Even the experts can’t seem to agree on much — with the possible exception that as early as 2027, a quantum computing cyber security event could affect us all. (More on this later.) And who among us can say that we’re truly ready for such an event?

How does quantum computing impact cyber security and, most importantly, is there anything we can do to protect our data?

IBM’s Q System One quantum computer at the Las Vegas Consumer Electronics Show in 2020.

IBM’s Q System One quantum computer at the Las Vegas Consumer Electronics Show in 2020.

Even in its beginnings, quantum computing is affecting us, particularly in the area of cybersecurity. Consider these questions: How does quantum computing impact cyber security in general? How will it impact us once there are actual quantum computers in daily use? What do we need to know? And most importantly, is there anything we can do to protect our data?

It’s this last point that I’ll expand upon below, as it has implications that potentially affect every user of digital technology. In case you’re wondering right now whether this topic is a big deal, it is.

Cyber Security: The Quantum Compromise

If you’re old enough, nay, mature enough, to remember the love song Quando, Quando, Quando, you might be tempted to start mentally singing the revised version, Quantum, Quantum, Quantum. However, as you’ll soon see, we won’t be singing any love songs for quantum anything anytime soon. That’s because, like anything bright, shiny and new, and despite its host of benefits, it comes with its own set of inherent risks — perhaps most notably in the field of cyber security.

Secure communications, including HTTPS, VPNs, email encryption and blockchain technologies, could be compromised.

We can’t discuss security issues in the context of quantum computing without first briefly exploring post-quantum cryptography, so here goes.

Post-Quantum Cryptography: Our Best Hope?

Post-Quantum Cryptography

As if quantum-anything wasn’t already weird enough, in terms of cybersecurity, PQC (Post-Quantum Cryptography) can be both the lock and the key…

Cryptography is the use of coded algorithms to protect information so that only authorized parties can access it. Here’s an easy example: If you’re reading this article over HTTPS, it’s due to cryptography.

Modern cryptographic systems are designed not only to withstand attacks from today’s computers but also to remain secure against future advancements in computing power.

If you’ve already studied up on quantum computing, you know that a quantum computer uses qubits to process information, resulting in its ability to do complex calculations better and wildly faster than any other type of computer.

To be clear, as of the date I’m writing this, while there are a few quantum computers in the world, they are not yet particularly practical, are quite expensive to run, and are still in the R&D stage. But efficient daily-use machines are suspected to be not too far over the horizon. This is both exciting and scary, but mostly exciting.

Grover’s Algorithm can theoretically reduce the brute-force time for cracking AES systems, effectively halving the key length.

The qubit

Shhh! The qubit can handle just about anything you can throw at it, except noise.

PQC essentially creates encryption algorithms that are designed to secure against both classical and quantum computing methods, with the idea being to ensure data remains safe even when quantum computers become powerful enough to crack current encryption standards.

The aim is to maintain compatibility with existing communication protocols while providing security against quantum threats.

The Known Risks

We’ve already established that quantum computing poses significant risks to cyber security, particularly to cryptographic systems that form the backbone of modern digital security — while inversely also potentially offering the solution. It’s that darn snake chasing its tail again. Here’s an overview of the potential threats:

impact of quantum computing on cybersecurity

While we may not need to fear a robotic takeover anytime soon, the impact of quantum computing on cybersecurity is something we do need to keep a watchful eye on.

1. Breaking Public-Key Cryptography

2. Compromising Symmetric Encryption

Cyber security experts anticipate that between 2027 and 2033, something related to quantum computing will compromise security.

Symmetric cryptographic systems like AES (Advanced Encryption Standard) are more resistant to quantum attacks. However, Grover’s Algorithm (which speeds up the solution to unstructured data searches — running the search in fewer steps than any classical algorithm could) can theoretically reduce the brute-force time for cracking these systems, effectively halving the key length.

3. Undermining Digital Signatures

4. Future Risk to Data Harvested Today

Encrypted data intercepted and stored by adversaries today could be decrypted in the future — once quantum computers become powerful enough.

Impact: Sensitive data, including government secrets, intellectual property and personal information, might face retroactive exposure.

The one predictable thing about quantum computing is its sheer unpredictability.

Let’s Talk About Speed

Move your most valuable data to post-quantum cryptography first.

Quantum computers, however, operate differently. By leveraging qubit superposition, they can evaluate multiple states simultaneously, dramatically reducing the number of required operations. Editor’s note: See the above-linked article for a layman’s description of superposition and qubits.

Post-Quantum Cryptography in the Pre-Quantum Era

The disaster that can most affect us is the one for which we didn’t prepare.

The 8-Point Plan

1. Take Inventory:

  • Identify where cryptographic algorithms are used in your systems.
  • Map out dependencies on public-key cryptography (such as RSA or ECC) in protocols like TLS (Transport Layer Security), VPNs (Virtual Private Network), digital signatures, and authentication.
  • Prioritize your assets based on sensitivity and longevity of data. (Sensitive government records and financial transactions, for example, are high priority.).

2. Assess Quantum Risk Exposure:

A quantum computer only needs a single extra qubit to double its capacity for handling superpositions.

  • If you haven’t yet identified the cryptographic algorithms in use as part of taking inventory, focus on it now. Any system relying on RSA, ECC or Diffie-Hellman for encryption is vulnerable to quantum attacks due to Shor’s algorithm.
  • Review key lengths: Even symmetric encryption (such as AES) can be weakened by Grover’s algorithm, though doubling key length can mitigate this.
  • Check for quantum-resistant cryptography: Systems using post-quantum cryptographic algorithms, like those being standardized by NIST (such as CRYSTALS-Kyber), are less vulnerable.
  • Assess dependencies: If you rely on third-party services or software libraries that depend on classical encryption, your system might inherit vulnerabilities.
  • Identify encrypted data with long lifespans that could be intercepted and later decrypted (harvest-now, decrypt-later attacks) by quantum computers.
  • Consider compliance requirements for NIST, GDPR (General Data Protection Regulation), or industry-specific regulations.
Image Credit: Gail Porter, Public Domain
Image Credit: Gail Porter, Public Domain

NIST headquarters in Gaithersburg, Maryland.

3. Start Using Hybrid Cryptography:

4. Follow NIST and Industry Guidance:

5. Test PQC Algorithms in a Controlled Environment:

Encrypted data intercepted and stored by adversaries today could be decrypted in the future.

  • Set up pilot projects to test NIST-approved PQC algorithms.
  • Use open-source implementations of PQC algorithms to experiment with integration.
  • Benchmark performance impact on latency, bandwidth, and resource usage.

6. Collaborate with Vendors and Partners:

7. Train Security Teams & Raise Awareness:

8. Develop a Long-Term Migration Strategy:

Quantum computing's capacity to solve a problem in fewer steps is only part of its superpower.

Quantum Cyber Security: Where It’s At and What To Expect

If you’re not quite ready to kickstart the above eight-point plan, here are two things you could do right now to get you moving in the right direction and increase your security on an immediate basis...

Significant Threat Timeline

Transitioning to post-quantum cryptography in the pre-quantum era may sound counterintuitive — but it’s not.

Quantum Fact or Fiction?

Modern cryptographic systems are designed to withstand attacks from today’s computers and remain secure against future computing advancements. If it’s starting to feel like the serpent eating its own tail, that’s because it kind of is.

Challenges and the Road Ahead

One day, we’ll look back at the 2020s and realize we were standing at the threshold of...

Parting Thoughts

Are you ready for the future

Are you ready for the future?

EdV2

Ed Clark

LinkTek COO

Leave a Comment

Please note: All comments are moderated before they are published.





Recent Comments

  • zoritoler imol:
    you’re really a good webmaster. The site loading pace is amazing. It kind of feels that you’re doing any unique trick. Furthermore, The contents are masterwork. you have performed a wonderful job on this matter! May 10, 14:41

1 Comments

  1. zoritoler imol on 10 May 2025 at 2:41 pm

    you’re really a good webmaster. The site loading pace is amazing. It kind of feels that you’re doing any unique trick. Furthermore, The contents are masterwork. you have performed a wonderful job on this matter!



Leave a Comment

Please note: All comments are moderated before they are published.