March 15, 2018 By Walid Rjaibi 2 min read

Large-scale quantum computers are not here yet, but quantum computing is one of today’s hottest research fields in the technology world. IBM launched the IBM Q Experience prototype five-qubit machine in the cloud in 2016 and made it available for the world to use, learn from and explore. A year later, IBM added a second device with 16 qubits and announced it had successfully built and tested two new machines. One is a 20-qubit machine for clients, and the other is a prototype with 50 qubits, which will be the basis of future IBM Q systems.

With their vast increase in computing power, quantum computers promise to revolutionize many fields, including artificial intelligence (AI), medicine and space exploration. Quantum computing also holds the potential to bring significant advances to the world of cybersecurity.

Despite the expected benefits, however, much of today’s rhetoric focuses on the risks this technology could pose to widespread security practices, such as encryption. It’s likely that these risks are a decade or more away from being immediate threats, since large-scale quantum computers will not be available for commercial use for quite some time. However, it is important to understand what these risks are and why they exist — so we may begin considering ways to future-proof our systems.

Quantum Computing 101

Let’s begin by taking a look at how quantum computing works. Classical computers encode information in bits, which take the value of 1 or 0, while quantum computers are based on qubits. This technology adheres to two key principles of quantum physics: superposition, which means a qubit can represent both 1 and 0 simultaneously, and entanglement, which means the state of one qubit can be correlated with the state of another. These two principles enable quantum computers to solve complex problems that are beyond the capabilities of today’s computers.

Quantum Computing Versus Today’s Cryptography

Due to their ability to solve much more complex problems in far less time, large-scale quantum computers have the potential to severely impact cryptography. However, the degree of impact varies depending on the type of cryptographic algorithms used.

Asymmetric cryptographic algorithms, such as RSA and Diffie-Hellman, base their security on the fact that factoring large numbers and calculating discrete logarithms are tough mathematical problems. In fact, factoring a large number can take thousands of years — even with today’s most powerful computers. Unfortunately, this changes when running Shor’s algorithm, which can factor large numbers in days (or even hours), on a quantum computer.

Symmetric algorithms, such as Advanced Encryption Standard (AES), do not face the same existential threat as asymmetric algorithms, but the key sizes need to be doubled to provide the same level of protection. This is because Grover’s algorithm running on a quantum computer could provide a quadratic improvement in brute-force attacks on symmetric encryption algorithms.

What’s Next?

What can security professionals do in response to these risks? First and foremost, it is important to remember that the impact of quantum computing on cybersecurity will likely not be felt for many years. Right now, one important step is to understand the nature of these potential risks so that we can prepare to address them. There are also defensive measures being developed as we speak (e.g., post-quantum cryptography) and research being conducted to determine how quantum computing can be used to improve cybersecurity capabilities far beyond what is possible today.

The aforementioned risks are only part of the much larger story of quantum computing’s impact on the security world. The other side of the coin is its potential to revolutionize our capacity to safeguard business-critical and personal data.

More from Data Protection

Communication platforms play a major role in data breach risks

4 min read - Every online activity or task brings at least some level of cybersecurity risk, but some have more risk than others. Kiteworks Sensitive Content Communications Report found that this is especially true when it comes to using communication tools.When it comes to cybersecurity, communicating means more than just talking to another person; it includes any activity where you are transferring data from one point online to another. Companies use a wide range of different types of tools to communicate, including email,…

SpyAgent malware targets crypto wallets by stealing screenshots

4 min read - A new Android malware strain known as SpyAgent is making the rounds — and stealing screenshots as it goes. Using optical character recognition (OCR) technology, the malware is after cryptocurrency recovery phrases often stored in screenshots on user devices.Here's how to dodge the bullet.Attackers shooting their (screen) shotAttacks start — as always — with phishing efforts. Users receive text messages prompting them to download seemingly legitimate apps. If they take the bait and install the app, the SpyAgent malware gets…

Exploring DORA: How to manage ICT incidents and minimize cyber threat risks

3 min read - As cybersecurity breaches continue to rise globally, institutions handling sensitive information are particularly vulnerable. In 2024, the average cost of a data breach in the financial sector reached $6.08 million, making it the second hardest hit after healthcare, according to IBM's 2024 Cost of a Data Breach report. This underscores the need for robust IT security regulations in critical sectors.More than just a defensive measure, compliance with security regulations helps organizations reduce risk, strengthen operational resilience and enhance customer trust.…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today