
Quantum Computers: A New Era Threatening Encryption
dem10/Getty Images
Quantum computing poses a significant risk to global cybersecurity, potentially creating a crisis greater than the infamous Millennium Bug (Y2K). While engineers successfully mitigated the Y2K threat, the question remains: Can we tackle the looming dangers of quantum computing?
Currently, most online communications rely on cryptography that classical computers cannot crack, but robust quantum computers can. Although researchers warned about this vulnerability in the late 1990s, the expected timeline for fully functional quantum computers, referred to as Q-Day, seemed far off—until now.
Quantum computers have advanced rapidly, bringing Q-Day closer to reality.
Recent studies indicate that predominant encryption methods like RSA-2048 and ECDLP-256 are on the verge of being compromised by quantum abilities, which may emerge by the end of 2026. Experts, including a team from Google, highlight that 2029 is the critical year for preparedness against this quantum threat.
There are solutions available through algorithms known as post-quantum cryptography (PQC). However, the pressing issue is whether our highly digital landscape can implement these solutions in time.
“The timeline is shifting quicker than anticipated, which compels immediate action. Organizations that initiate preparations now will be vastly more secure than those that delay,” states Philip Intalula, of HSBC.
Ramana Compera of Cisco conveys a serious warning to businesses: “We urge all our clients to take this seriously. The time to fortify your infrastructure against these quantum threats is now—if not sooner.”
Q-Day presents a more insidious threat compared to Y2K. While Y2K posed a foreseeable risk—systems failing at the millennium—Q-Day could result in unnoticed data breaches where sensitive information is stolen without detection.
A specific worry involves “collect now, decrypt later” attacks, where hackers capture sensitive data now, planning to decrypt it using quantum computers later.
Rebecca Krauthammer from QuSecure emphasizes the gravity of this situation, particularly concerning national security, banking, healthcare, and pharmaceuticals. The risks include credit card fraud and the unauthorized access of sensitive military and medical data.
“Entities in banking, insurance, and critical infrastructure could face existential threats; even currently secured data may become exploited for extortion or espionage,” warns Brian Lenahan from the Institute for Quantum Strategy in a recent blog post.
Krauthammer notes a surge in interest for post-quantum solutions, reflecting a critical inflection point. She estimates a tenfold increase in queries from companies seeking quantum safety upgrades, suggesting that transitioning to PQC by 2029 is both ambitious and achievable.
Although some sectors, like telecommunications and banking, are beginning to adopt PQC, many others, including healthcare, are lagging. Notably, HSBC has been enhancing its quantum encryption efforts for several years, and Kompella highlights that Cisco’s products already incorporate some PQC features.
Identifying Hidden Vulnerabilities
Post-quantum cryptography is already utilized by apps like Signal for messaging and Flo for menstrual tracking. Companies including the Google Chrome web browser are also pursuing quantum safety goals by 2027.
However, Martin Charbonneau from Nokia warns that mere application upgrades won’t suffice. The challenge magnifies when entire systems need overhauling, as many organizations lack a comprehensive understanding of their technology stacks.
Every segment of a company’s network can harbor vulnerabilities. Hackers may exploit weaknesses in everyday user operations, like push notifications or credit card approvals. In other scenarios, a remote server launch or intercepted communications between devices could become targets. For many firms, particularly those reliant on outdated software, recognizing and mitigating these vulnerabilities will be an essential first step toward quantum safety, as Kompella notes.
While giants like Cisco and Nokia possess in-house quantum research teams, most companies do not. Krauthammer mentions her team is assisting three organizations that may need to invest $100 million over the next three to ten years to transition to PQC. Furthermore, by 2027, compliance with PQC will be compulsory for entities partnering with the U.S. government in national security.
Nonetheless, if all goes well, one sector may still face challenges: cryptocurrencies. A study from Google and the Ethereum Foundation warns of potential Q-Day signs, where hackers could have pilfered cryptocurrencies such as Bitcoin by intercepting transactions or targeting dormant wallets. Unlike banks, cryptocurrencies are decentralized and necessitate consensus from numerous stakeholders, making migration to PQC a complex task. Bitcoin, in particular, has struggled to change its algorithms, including those improving environmental sustainability.
Cryptocurrencies have now transcended niche interests, with pension funds, charities, and corporations incorporating them into their investment portfolios. Given their deep integration into the global economy, any decline in their value stemming from security vulnerabilities will have widespread ramifications, as stated by Stefano Godioso at Oxford University. Cryptocurrencies with preemptive quantum safety measures have even seen value increases of over 50% following significant research publications.
Ultimately, while Q-Day, like Y2K, could be circumvented through swift actions by governments and businesses, the complexities of this modern threat—coupled with uncertainty surrounding its timing—make it a daunting challenge.
For these reasons, Krauthammer urges for heightened awareness: “There needs to be significant pressure from users demanding assurance that their data is secured through post-quantum cryptography.”
Topics:
Source: www.newscientist.com
