Large-scale quantum computers are not here yet, but quantum computing is one of today’s hottest research fields in the technology world. IBM launched the IBM Q Experience prototype five-qubit machine in the cloud in 2016 and made it available for the world to use, learn from and explore. A year later, IBM added a second device with 16 qubits and announced it had successfully built and tested two new machines. One is a 20-qubit machine for clients, and the other is a prototype with 50 qubits, which will be the basis of future IBM Q systems.

With their vast increase in computing power, quantum computers promise to revolutionize many fields, including artificial intelligence (AI), medicine and space exploration. Quantum computing also holds the potential to bring significant advances to the world of cybersecurity.

Despite the expected benefits, however, much of today’s rhetoric focuses on the risks this technology could pose to widespread security practices, such as encryption. It’s likely that these risks are a decade or more away from being immediate threats, since large-scale quantum computers will not be available for commercial use for quite some time. However, it is important to understand what these risks are and why they exist — so we may begin considering ways to future-proof our systems.

Quantum Computing 101

Let’s begin by taking a look at how quantum computing works. Classical computers encode information in bits, which take the value of 1 or 0, while quantum computers are based on qubits. This technology adheres to two key principles of quantum physics: superposition, which means a qubit can represent both 1 and 0 simultaneously, and entanglement, which means the state of one qubit can be correlated with the state of another. These two principles enable quantum computers to solve complex problems that are beyond the capabilities of today’s computers.

Quantum Computing Versus Today’s Cryptography

Due to their ability to solve much more complex problems in far less time, large-scale quantum computers have the potential to severely impact cryptography. However, the degree of impact varies depending on the type of cryptographic algorithms used.

Asymmetric cryptographic algorithms, such as RSA and Diffie-Hellman, base their security on the fact that factoring large numbers and calculating discrete logarithms are tough mathematical problems. In fact, factoring a large number can take thousands of years — even with today’s most powerful computers. Unfortunately, this changes when running Shor’s algorithm, which can factor large numbers in days (or even hours), on a quantum computer.

Symmetric algorithms, such as Advanced Encryption Standard (AES), do not face the same existential threat as asymmetric algorithms, but the key sizes need to be doubled to provide the same level of protection. This is because Grover’s algorithm running on a quantum computer could provide a quadratic improvement in brute-force attacks on symmetric encryption algorithms.

What’s Next?

What can security professionals do in response to these risks? First and foremost, it is important to remember that the impact of quantum computing on cybersecurity will likely not be felt for many years. Right now, one important step is to understand the nature of these potential risks so that we can prepare to address them. There are also defensive measures being developed as we speak (e.g., post-quantum cryptography) and research being conducted to determine how quantum computing can be used to improve cybersecurity capabilities far beyond what is possible today.

The aforementioned risks are only part of the much larger story of quantum computing’s impact on the security world. The other side of the coin is its potential to revolutionize our capacity to safeguard business-critical and personal data.

More from Data Protection

Beyond Requirements: Tapping the Business Potential of Data Governance and Security

3 min read - Doom and gloom. Fear, uncertainty and doubt. The "stick" versus the "carrot". What do these concepts have in common? They have often provided the primary motivation for organizations’ data governance and security strategies. For the enterprise, this mindset has perpetuated the idea that data governance, data security and data privacy are reactive cost centers existing due to externally imposed requirements or mandates.Yet, what if data governance and security practices could upend the prevailing paradigm and demonstrate direct business value?[button link="https://community.ibm.com/community/user/security/events/event-description?CalendarEventKey=8d7fdc61-97bf-43b0-b7d6-018756e436a6&CommunityKey=aa1a6549-4b51-421a-9c67-6dd41e65ef85&Home=%2fcommunity%2fuser%2fsecurity%2fcommunities%2fcommunity-home%2frecent-community-events"…

3 min read

Heads Up CEO! Cyber Risk Influences Company Credit Ratings

4 min read - More than ever, cybersecurity strategy is a core part of business strategy. For example, a company’s cyber risk can directly impact its credit rating. Credit rating agencies continuously strive to gain a better understanding of the risks that companies face. Today, those agencies increasingly incorporate cybersecurity into their credit assessments. This allows agencies to evaluate a company’s capacity to repay borrowed funds by factoring in the risk of cyberattacks. Getting Hacked Impacts Credit Scoring As per the Wall Street Journal…

4 min read

IBM Security Guardium Ranked as a Leader in the Data Security Platforms Market

3 min read - KuppingerCole named IBM Security Guardium as an overall leader in their Leadership Compass on Data Security Platforms. IBM was ranked as a leader in all three major categories: Product, Innovation, and Market. With this in mind, let’s examine how KuppingerCole measures today’s solutions and why it’s important for you to have a data security platform that you trust. The Transformation of the Data Security Industry As digital transformation continues to expand, the impact it has had on enterprises is very apparent when…

3 min read

SaaS vs. On-Prem Data Security: Which is Right for You?

2 min read - As businesses increasingly rely on digital data storage and communication, the need for effective data security solutions has become apparent. These solutions can help prevent unauthorized access to sensitive data, detect and respond to security threats and ensure compliance with relevant regulations and standards. However, not all data security solutions are created equal. Are you choosing the right solution for your organization? That answer depends on various factors, such as your industry, size and specific security needs. SaaS vs. On-Premises…

2 min read