- Fault-tolerant quantum computers, capable of breaking existing encryption algorithms and cryptographic systems, are widely expected to be available sooner than originally projected.
- Data considered secure today may already be at risk due to the threat of harvest-now-decrypt-later schemes.
- Many current security controls will be completely useless, including today's strongest encryption techniques.
Our Advice
Critical Insight
The advent of quantum computing is closer than you think: some nations have already demonstrated capability with the potential to break current asymmetric-key encryption. Traditional encryption methods will no longer provide sufficient protection. You need to act now to begin your transformation to quantum-resistant encryption.
Impact and Result
- Developing quantum-resistant cryptography capabilities is crucial to maintaining data security and integrity for critical applications.
- Organizations need to act now to begin their transformation to quantum-resistant encryption.
- Data security (especially for sensitive data) should be an organization’s top priority. Organizations with particularly critical information need to be on top of this quantum movement.
Prepare for Post-Quantum Cryptography
It is closer than you think, and you need to act now.
Analyst Perspective
It is closer than you think, and you need to act now.
The quantum realm presents itself as a peculiar and captivating domain, shedding light on enigmas within our world while pushing the boundaries of computational capabilities. The widespread availability of quantum computers is expected to occur sooner than anticipated. This emerging technology holds the potential to tackle valuable problems that even the most powerful classical supercomputers will never be able to solve. Quantum computers possess the ability to operate millions of times faster than their current counterparts.
As we venture further into the era of quantum mechanics, organizations relying on encryption must contemplate a future where these methods no longer suffice as effective safeguards. The astounding speed and power of quantum machines have the potential to render many existing security measures utterly ineffective, including the most robust encryption techniques used today. To illustrate, a task that currently takes ten years to crack through a brute force attack could be accomplished by a quantum computer in under five minutes.
Amid this transition into a quantum future, the utmost priority for organizations remains data security, particularly safeguarding sensitive information. Organizations must proactively prepare for the development of countermeasures and essential resilience measures to attain a state of being "quantum safe."
Alan Tang
Principal Research Director, Security and Privacy
Info-Tech Research Group
Executive Summary
Your Challenge
- Anticipated advancements in fault-tolerant quantum computers, surpassing existing encryption algorithms and cryptographic systems, are expected to materialize sooner than previously projected. The timeframe for their availability is diminishing daily.
- Data that is presently deemed secure faces potential vulnerability due to the emergence of harvest-now-decrypt-later strategies.
- Numerous contemporary security controls, including the most robust encryption techniques, have become obsolete and offer little efficacy.
Common Obstacles
- The complexity involved makes it challenging for organizations to incorporate quantum-resistant cryptography into their current IT infrastructure.
- The endeavor of transitioning to quantum-resilient cryptography demands significant effort and time, with the specific requirements varying for each organization.
- A lack of comprehensive understanding regarding the cryptographic technologies employed in existing IT systems poses difficulties in identifying and prioritizing systems for upgrading to post-quantum cryptography.
Info-Tech's Approach
- The development of quantum-resistant cryptography capabilities is essential for safeguarding the security and integrity of critical applications.
- Organizations must proactively initiate their transition toward quantum-resistant encryption to ensure data protection.
- Ensuring the security of corporate data assets should be of utmost importance for organizations, with special emphasis on those possessing highly critical information in light of the advancements in quantum technology.
Info-Tech Insight
The advent of quantum computing (QC) is closer than you think: some nations have demonstrated capability with the potential to break current asymmetric-key encryption. Traditional encryption methods will no longer be sufficient as a means of protection. You need to act now to begin your transformation to quantum-resistant encryption.
Evolvement of QC theory and technologies
1900-1975 |
1976-1997 |
1998-2018 |
2019-Now |
---|---|---|---|
|
|
|
|
Info-Tech Insight
The advent of QC will significantly change our perception of computing and have a crucial impact on the way we protect our digital economy using encryption. The technology's applicability is no longer a theory but a reality to be understood, strategized about, and planned for.
Fundamental physical principles and business use cases
Unlike conventional computers that rely on bits, quantum computers use quantum bits or qubits. QC technology surpasses the limitations of current processing powers. By leveraging the properties of superposition, interference, and entanglement, quantum computers have the capacity to simultaneously process millions of operations, thereby surpassing the capabilities of today's most advanced supercomputers.
A 2021 Hyperion Research survey of over 400 key decision makers in North America, Europe, South Korea, and Japan showed nearly 70% of companies have some form of in-house QC program.
Three fundamental QC physical principles
- Superposition
- Interference
- Entanglement
Info-Tech Insight
Organizations need to reap the substantial benefits of QC's power, while simultaneously shielding against the same technologies when used by cyber adversaries.
Percentage of Surveyed Companies That Have QC Programs
- 31% Have some form of in-house QC program
- 69% Have no QC program