What CEOs Need to Know About the Emerging Quantum Threat

6 February 2024

Understanding the Quantum Threat

As a CEO focused on safeguarding sensitive data, it’s crucial to be aware of the impending quantum computing revolution. Governments globally are warning that quantum computers will soon possess the capability to break current encryption standards like RSA, one of the most prevalent encryption methods today.

Why This Matters

The core issue lies in mathematics. Modern encryption methods rely on complex mathematical operations, such as factoring large numbers. This complexity is what keeps sensitive data secure. Traditionally, even the most powerful supercomputers struggle with these tasks, making current encryption methods robust against attacks.

A Growing Concern

In 2016, the National Institute of Standards and Technology (NIST) highlighted the risk posed by quantum computers. Unlike classical computers, quantum machines can process vast amounts of data simultaneously, making them adept at solving problems like factoring large numbers that are crucial for encryption. While quantum computers promise advancements in many fields, they also pose a significant threat to data security.

NIST challenged experts to develop new encryption methods that are resistant to quantum attacks. This summer, NIST is expected to reveal several new “quantum-safe” algorithms. However, as quantum technology evolves, these algorithms will need to adapt continuously.

The Urgency of the Situation

The timeline for when quantum computers will be capable of breaking encryption is still debated. MIT researchers suggest that around 4000 qubits—the measure of a quantum computer’s processing power—could signal the onset of quantum decryption capabilities. Predictions vary, with some estimating three to ten years before we reach this critical threshold.

Regardless of the exact timeline, the urgency remains high. Many organizations are unaware of their current encryption status, and the upgrade process involves a complex network of vendors and systems. Additionally, there are concerns about “steal now, decrypt later” attacks, where stolen data could be decrypted in the future using advanced quantum computers.

The last major shift in encryption standards, from DES to RSA, took over five years for organizations to implement. If quantum decryption capabilities emerge in three years, we face a significant challenge. Even if it takes a decade, action is needed now.

Taking Proactive Steps

One effective strategy is to adopt a crypto-agile approach. Cryptographic agility allows organizations to seamlessly update and layer encryption algorithms as technology evolves. This method ensures that you can adapt to new standards without major disruptions.

For CEOs prioritizing data security, investing in crypto agility now can be a cost-effective measure. With data breaches in the U.S. averaging close to $10 million, the expense of implementing robust cryptographic management today is minimal compared to potential future breaches. Crypto agility will enable your organization to stay ahead of encryption changes and maintain strong data protection.