Connects decision-makers and solutions creators to what's next in quantum computing

Preparing for the Reality of Quantum Computing Threats and Solutions

As quantum computing becomes more widespread, it could render traditional encryption modes obsolete

Sean Tinney, VP, enterprise computing solutions, Unisys

November 6, 2024

2 Min Read
A gold chip on a circuit board
Getty images

Over the next decade, the global quantum computing market is projected to grow to $12,620.7 million, bringing businesses faster, more efficient solutions. However, this technology also poses significant cybersecurity challenges. As quantum computing becomes more widespread, it could render traditional encryption modes obsolete, raising the question of how businesses should prepare. 

Identifying Potential Threats

The potential for quantum-based attacks on network encryption, cloud encryption and application security is far-reaching and could impact many sectors. The speed and efficiency that make quantum so appealing for business could enable malicious actors to decrypt vast amounts of sensitive data, including financial records, intellectual property and personal information. This could lead to significant financial losses, reputational damage and even national security threats.

The primary threat lies in the development of cryptographically relevant quantum computers (CRQCs), which could be capable of running algorithms to crack or weaken existing protections. While not yet powerful enough to pose a severe threat, its development is progressing rapidly, with some experts predicting their arrival in less than 10 years.

Proactive Measures: Quantum-Resistant Strategies

Related:The Quantum Era: What It Means for the Cyber Insurance Industry

Researchers and organizations like the National Institute of Standards and Technology (NIST) are actively developing solutions to protect data from being stolen now and decrypted in the future when CRQCs become powerful enough. This approach is known as post-quantum cryptography (PQC).

PQC algorithms, such as those recently standardized by NIST, are designed to withstand quantum computer attacks from cryptographically relevant quantum computers. These quantum-resistant algorithms provide a defensive shield, protecting sensitive information from being compromised by future threats. PQC algorithms act as a proactive measure, protecting data from potential breaches that may occur down the line.

Future-Proofing Your Organization

While potential quantum-related threats are concerning, they should not be treated in isolation. In fact, organizations should contemplate their cryptographic agility—the ability to adapt to evolving cryptographic threats without disrupting operations – alongside their overall cybersecurity efforts.

To achieve this, leaders should focus on the following:

  • Understand the Current Encryption Posture: Conduct a thorough assessment of your organization's security infrastructure and identify vulnerabilities.

  • Assess the Time Value of Data: Evaluate the sensitivity and longevity of your data. Based on its potential future value, determine whether it is worth investing in quantum-resistant security measures now.

  • Analyze Data Sensitivity: Evaluate the sensitivity of your data and its potential impact if compromised. Consider factors such as regulatory compliance, customer trust and financial implications.

  • Develop a Quantum-Resistant Strategy: Develop a comprehensive strategy to mitigate the quantum threat based on your risk assessment. This may involve implementing PQC algorithms, updating hardware and software, and training staff on quantum security best practices.

  • Monitor and Adapt: Continuously monitor the quantum computing landscape and be prepared to adapt your security measures as the threat evolves.

Related:‘Cryptocrastination’ Poses New Security Threat for Enterprises

As quantum computing technology advances, it is crucial to remain vigilant about emerging threats and conduct ongoing risk assessments. In doing so, leaders can better prepare for threats—even those we have yet to fully realize.

About the Author

Sean Tinney

VP, enterprise computing solutions, Unisys, Unisys

Sean Tinney heads global solutions for Unisys’ enterprise computing solutions practice. He leads a team of solution architects that creates market-leading products while partnering with clients to deliver impactful outcomes. In this role, he defines the strategic direction for industry-specific solutions and guides a cross-functional team in bringing new and emerging technology solutions to market.

Under his leadership, the Unisys solution portfolio has prioritized tangible business outcomes, customer experience and client partnership as strategic pillars of the practice's growth. This includes new models for working with and contracting with our clients on results delivered.

Sean has over 20 years of experience in consulting, innovation, transformation and automation, working with Fortune 100 companies with domain expertise in finance and accounting, logistics management and supply chain. Before joining Unisys, Sean led global product management for Sutherland Global Services and IBM’s NA automation advisory practice.

Sign Up for the Newsletter
The most up-to-date news and insights into the latest emerging technologies ... delivered right to your inbox!

You May Also Like