Quantum Computing Could Shatter Encryption Sooner Than Expected, Google Researcher Warns Introduction: A New Countdown for Cryptographic Security A new study by Google Quantum AI researcher Craig Gidney has dramatically reduced the estimated quantum computing power required to break RSA encryption, slashing previous projections by a factor of 20. While Bitcoin doesn’t use RSA, the breakthrough has serious implications for all public-key cryptography, including the elliptic curve algorithms used by cryptocurrencies. Key Findings and Implications • Quantum Cost of Breaking RSA Reassessed • Gidney’s paper shows that RSA encryption—used in securing data, digital certificates, and some crypto wallets—can be cracked with far fewer quantum resources than previously thought. • The update implies that quantum threats may arrive earlier than the cybersecurity community has prepared for. • Why It Matters for Crypto • While Bitcoin uses elliptic curve cryptography (ECC) rather than RSA, ECC is similarly vulnerable to Shor’s algorithm, which quantum computers could use to extract private keys from public ones. • This raises concerns for crypto holders, exchanges, and developers: if quantum computing advances faster than expected, today’s wallet protections may be obsolete. • No Immediate Threat—Yet • Current quantum machines still lack the millions of error-corrected qubits needed to execute these attacks. • However, the acceleration in theoretical research and hardware development means “crypto-agility”—the ability to switch to post-quantum encryption—should be a top priority. • Call to Action for Developers and Institutions • Security protocols across finance, healthcare, and defense rely on public-key cryptography. • Gidney’s findings reinforce calls for post-quantum cryptographic standards, already in development by agencies like NIST. • For crypto, it underscores the urgency of transitioning to quantum-resistant wallet and transaction structures before the risk becomes real. Why This Matters: The Quantum Clock Is Ticking This research represents more than a mathematical tweak—it’s a strategic warning. Quantum computing is progressing rapidly, and assumptions about how long existing encryption will remain safe may no longer hold. For crypto, finance, and digital infrastructure at large, proactive adaptation to quantum threats isn’t optional—it’s essential. Keith King https://lnkd.in/gHPvUttw
Importance of Quantum Computing for National Security
Explore top LinkedIn content from expert professionals.
Summary
Quantum computing, a technological breakthrough enabling complex computations at unprecedented speed, poses both opportunities and challenges for national security. As it advances, its potential to break traditional cryptographic systems highlights the urgent need for robust post-quantum cryptography strategies to protect critical infrastructure, sensitive data, and digital security.
- Prioritize cryptographic upgrades: Transition to post-quantum cryptography (PQC) by identifying vulnerable systems and replacing traditional algorithms with quantum-resistant ones to safeguard sensitive information.
- Plan for proactive defense: Develop a comprehensive quantum-readiness strategy, including training teams, automating key management, and implementing agile cryptographic solutions to adapt to emerging threats.
- Secure critical data now: Encrypt sensitive data with PQC-approved standards and limit long-term storage of vulnerable data to prevent future decryption risks posed by quantum advancements.
-
-
🚨 New OMB Report on Post-Quantum Cryptography (PQC)🚨 The Office of Management and Budget (OMB) has released a critical report detailing the strategy for migrating federal information systems to Post-Quantum Cryptography. This report is in response to the growing threat posed by the potential future capabilities of quantum computers to break existing cryptographic systems. **Key Points from the Report:** 🔑 **Start Migration Early**: The report emphasizes the need to begin migration to PQC before quantum computers capable of breaking current encryption become operational. This proactive approach is essential to mitigate risks associated with "record-now-decrypt-later" attacks. 🔑 **Focus on High-Impact Systems**: Priority should be given to high-impact systems and high-value assets. Ensuring these critical components are secure is paramount. 🔑 **Identify Early**: It's crucial to identify systems that cannot support PQC early in the process. This allows for timely planning and avoids migration delays. 🔑 **Cost Estimates**: The estimated cost for this transition is approximately $7.1 billion over the period from 2025 to 2035. This significant investment underscores the scale and importance of the task. 🔑 **Cryptographic Module Validation Program (CMVP)**: To ensure the proper implementation of PQC, the CMVP will play a vital role. This program will validate that the new cryptographic modules meet the necessary standards. The full report outlines a comprehensive strategy and underscores the federal government’s commitment to maintaining robust cybersecurity in the quantum computing era. This is a critical step in safeguarding our digital infrastructure against future threats. #Cybersecurity #PQC #QuantumComputing #FederalGovernment #Cryptography #DigitalSecurity #OMB #NIST
-
I’ve written about the risks GenAI brings - how something theoretical quickly became operational. Quantum risk is following the same path. But this time, the threat starts before the technology reaches maturity. Adversaries are already executing “harvest now, decrypt later” strategies by stealing encrypted data today with the intention to break it once quantum computing evolves. That changes the timeline and urgency of cryptographic resilience. Why it matters: 🔐 OT, IoT, and legacy systems weren’t built with quantum in mind. ⏳ PQC migration takes years, and most organizations haven’t even begun. 🌍 Critical infrastructure is especially exposed. This isn’t about fear. It’s about getting ahead before the window closes. To mitigate long-tail risks like data harvesting, security teams should: ✅ Implement forward secrecy to limit future decryption of past traffic ✅ Minimize long-term storage of sensitive data ✅ Strengthen network visibility and segmentation to reduce interception risk Forescout Technologies Inc. is making this possible right now with: ✅ Complete visibility into all connected devices across IOT, IT, IoT, and IoMT ✅ Automated policy enforcement to respond to cryptographic risk in real time ✅ Crypto agility support to evolve alongside emerging standards - not after they break 👇 Are you thinking about post-quantum risk? Drop your thoughts below. #QuantumSecurity #PQC #CyberResilience #InfrastructureSecurity
-
As we close out 2024, it’s natural to think about what’s next. For me, one trend stands out above the rest: the urgency of preparing for a post-quantum world. Google's recent Willow chip announcement is yet another indicator that quantum computing is advancing rapidly, and the cryptographic algorithms we rely on to secure digital identities and critical systems are nearing their expiration date. This isn’t just a security concern—it’s a business imperative that impacts trust, continuity, and resilience. Just last month, the National Institute of Standards and Technology (NIST) released its roadmap for transitioning to post-quantum cryptography (PQC). The timeline is clear: by 2030, organizations must be quantum-ready. For business leaders, 2025 will be a pivotal year to take action. Forward-thinking leaders will elevate PQC from an IT initiative to a boardroom priority. Here’s how to lead the charge: 🔑 Understand the risk: Identify which systems, identities, and sensitive data are vulnerable to the quantum threat. 🔑 Educate your board: Build awareness with your leadership team about why quantum-safe cryptography matters—and why it matters NOW. 🔑 Take inventory: Pinpoint where your cryptographic assets live and assess what needs to evolve. 🔑 Develop your roadmap: Create a strategic plan to transition to PQC before the window of opportunity closes. 2025 isn’t the year to react—it’s the year to prepare. The shift to quantum-safe cryptography is inevitable. The question is: Will your organization be ahead of the curve or playing catch-up? I’d love to hear from other leaders—how are you bringing this critical conversation into your boardroom? Let’s share strategies and lessons to ensure we’re all ready for what’s next. #PostQuantum #PQC #CybersecurityLearders #DigitalTrust #Leadership
-
𝗗𝗮𝘆 𝟴: 𝗗𝗮𝘁𝗮 𝗦𝗲𝗰𝘂𝗿𝗶𝘁𝘆 𝗮𝗻𝗱 𝗣𝗼𝘀𝘁 𝗤𝘂𝗮𝗻𝘁𝘂𝗺 𝗥𝗲𝗮𝗱𝗶𝗻𝗲𝘀𝘀 In today’s hyper-connected world, data is the new currency and the perimeter, and it is essential to safeguard them from Cyber criminals. The average cost of a data breach reached an all-time high of $4.88 million in 2024, a 10% increase from 2023. Advances in 𝗾𝘂𝗮𝗻𝘁𝘂𝗺 𝗰𝗼𝗺𝗽𝘂𝘁𝗶𝗻𝗴 further threaten traditional cryptographic systems by potentially rendering widely used algorithms like public key cryptography insecure. Even before large-scale quantum computers become practical, adversaries can harvest encrypted data today and store it for future decryption. Sensitive data encrypted with traditional algorithms may be vulnerable to retrospective attacks once quantum computers are available. As quantum technology evolves, the need for stronger data protection grows. Google Quantum AI recently demonstrated advancements with its Willow processors, which 𝗲𝗻𝗵𝗮𝗻𝗰𝗲𝘀 𝗲𝗿𝗿𝗼𝗿 𝗰𝗼𝗿𝗿𝗲𝗰𝘁𝗶𝗼𝗻 𝘂𝘀𝗶𝗻𝗴 𝘁𝗵𝗲 𝘀𝘂𝗿𝗳𝗮𝗰𝗲 𝗰𝗼𝗱𝗲. These breakthroughs underscore the growing efficiency and scalability of quantum computers. To address these threats, Enterprises are turning to 𝗮𝗴𝗶𝗹𝗲 𝗰𝗿𝘆𝗽𝘁𝗼𝗴𝗿𝗮𝗽𝗵𝘆 to prepare for Post Quantum era. Proactive Measures for Agile Cryptography and Quantum Resistance: 1. 𝗔𝗱𝗼𝗽𝘁 𝗣𝗼𝘀𝘁-𝗤𝘂𝗮𝗻𝘁𝘂𝗺 𝗔𝗹𝗴𝗼𝗿𝗶𝘁𝗵𝗺𝘀 Transition to NIST-approved PQC standards like CRYSTALS-Kyber, CRYSTALS-Dilithium, Sphincs+. Use hybrid cryptography that combines classical and quantum-resistant methods for a smoother transition. 2. 𝗗𝗲𝘀𝗶𝗴𝗻 𝗳𝗼𝗿 𝗔𝗴𝗶𝗹𝗶𝘁𝘆 Avoid hardcoding cryptographic algorithms. Implement abstraction layers and modular cryptographic libraries to enable easy updates, algorithm swaps, and seamless key rotation. 3. 𝗔𝘂𝘁𝗼𝗺𝗮𝘁𝗲 𝗞𝗲𝘆 𝗠𝗮𝗻𝗮𝗴𝗲𝗺𝗲𝗻𝘁 Use Hardware Security Modules (HSMs) and Key Management Systems (KMS) to automate secure key lifecycle management, including zero-downtime rotation. 4. 𝗣𝗿𝗼𝘁𝗲𝗰𝘁 𝗗𝗮𝘁𝗮 𝗘𝘃𝗲𝗿𝘆𝘄𝗵𝗲𝗿𝗲 Encrypt data at rest, in transit, and in use with quantum resistant standards and protocols. For unstructured data, use format-preserving encryption and deploy data-loss prevention (DLP) tools to detect and secure unprotected files. Replace sensitive information with unique tokens that have no exploitable value outside a secure tokenization system. 5. 𝗣𝗹𝗮𝗻 𝗔𝗵𝗲𝗮𝗱 Develop a quantum-readiness strategy, audit systems, prioritize sensitive data, and train teams on agile cryptography and PQC best practices. Agile cryptography and advanced data devaluation techniques are essential for protecting sensitive data as cyber threats evolve. Planning ahead for the post-quantum era can reduce migration costs to PQC algorithms and strengthen cryptographic resilience. Embrace agile cryptography. Devalue sensitive data. Secure your future. #VISA #PaymentSecurity #Cybersecurity #12DaysofCyberSecurityChristmas #PostQuantumCrypto
-
As quantum computing inches closer to reality, the threats it poses to our current cryptographic standards grow more urgent. The article linked below highlights advances by Cavero Quantum, a company working on innovative methods to address this challenge. While I’m not endorsing any specific technology or company, the broader takeaway is clear, and it is one I shared often during my time in the Intelligence Community: the time to act is now. Hack-now-decrypt-later (HNDL) attacks are already underway. Threat actors are harvesting encrypted data today, banking on future quantum capabilities to decrypt it. Depending on the nature of the data, these actions could have profound national security implications for decades to come. The timeline to cryptographically relevant quantum computing capabilities is shrinking, and so is the window for proactive defense. Transitioning to post-quantum cryptography isn’t just a technical upgrade—it’s a necessity to protect critical information now and in the future. Whether you’re in national security, financial services, or telecommunications, the question is not whether quantum computing will impact your sector, but when. Let’s prioritize data protection today to ensure resilience tomorrow. What steps is your organization taking to prepare for the quantum era? Have you seen other promising approaches to the HNDL threat? https://lnkd.in/esQNKaG6 #QuantumComputing #PostQuantumCryptography #CyberSecurity #DataProtection