Deloitte Urges Organizations to Prepare for Post-Quantum Cryptography Quantum Threats to Cryptography In its annual Tech Trends report, Deloitte highlights the looming cybersecurity threat posed by quantum computers. These fast-calculating machines could soon break traditional public-key cryptography, which underpins secure communications and data protection. To safeguard against this risk, Deloitte recommends that organizations take immediate steps to inventory and update their cryptographic systems with quantum-resistant algorithms. A Y2K-Like Urgency Deloitte likens the need for proactive quantum encryption updates to the urgency of addressing the Y2K problem in the late 1990s. Similar to how companies scrambled to fix date-related programming issues to avoid catastrophic failures, today’s IT teams must preemptively tackle the vulnerabilities quantum computing may introduce. The comparison underscores the scale and urgency of the effort required to prevent future security breaches. NIST’s Post-Quantum Encryption Standards The National Institute of Standards and Technology (NIST) has already released post-quantum encryption standards to guide organizations. Tech giants such as Apple, Google, and Microsoft have begun incorporating quantum-ready encryption into their products and platforms, signaling the importance of early adoption. Deloitte’s report emphasizes that businesses must align with these standards to future-proof their cryptographic infrastructure. Tools for Cryptographic Transition To aid organizations in this transition, Deloitte points to resources such as NIST’s National Cybersecurity Center of Excellence. This center offers cryptographic discovery and inventory tools that help identify outdated encryption methods and streamline the process of upgrading to quantum-resistant systems. These tools are critical for managing the complexity of securing vast digital infrastructures. The Need for Proactive Action Deloitte stresses the importance of taking immediate, proactive measures to address this emerging challenge. Organizations should prioritize assessing their cryptographic systems, investing in quantum-resistant solutions, and adopting NIST-recommended practices. Early preparation will minimize risks and ensure a smoother transition as quantum computing capabilities evolve. Conclusion The rise of quantum computing presents a significant threat to traditional cryptographic systems, requiring organizations to adopt quantum-resistant encryption. Deloitte’s comparison to Y2K highlights the urgency and scale of this challenge. By leveraging NIST standards, adopting available tools, and taking proactive steps, businesses can mitigate risks and prepare for a quantum-driven future in cybersecurity.
Trends Shaping the Future of Encryption
Explore top LinkedIn content from expert professionals.
Summary
The future of encryption is being shaped by the rapid advancements in quantum computing, which threaten traditional cryptographic methods currently used to secure sensitive data. To safeguard against the risks posed by quantum technology, organizations must adopt quantum-resistant algorithms and develop forward-thinking strategies to protect critical information.
- Assess your cryptography: Conduct an inventory of all your current encryption methods and identify vulnerable areas where traditional algorithms like RSA or ECC are in use.
- Adopt quantum-safe solutions: Begin transitioning to NIST-approved post-quantum cryptography standards and use hybrid encryption techniques to integrate quantum-resistant algorithms.
- Build cryptographic agility: Design systems that allow for seamless updates or replacements of encryption methods as new standards and technologies emerge.
-
-
𝗗𝗮𝘆 𝟴: 𝗗𝗮𝘁𝗮 𝗦𝗲𝗰𝘂𝗿𝗶𝘁𝘆 𝗮𝗻𝗱 𝗣𝗼𝘀𝘁 𝗤𝘂𝗮𝗻𝘁𝘂𝗺 𝗥𝗲𝗮𝗱𝗶𝗻𝗲𝘀𝘀 In today’s hyper-connected world, data is the new currency and the perimeter, and it is essential to safeguard them from Cyber criminals. The average cost of a data breach reached an all-time high of $4.88 million in 2024, a 10% increase from 2023. Advances in 𝗾𝘂𝗮𝗻𝘁𝘂𝗺 𝗰𝗼𝗺𝗽𝘂𝘁𝗶𝗻𝗴 further threaten traditional cryptographic systems by potentially rendering widely used algorithms like public key cryptography insecure. Even before large-scale quantum computers become practical, adversaries can harvest encrypted data today and store it for future decryption. Sensitive data encrypted with traditional algorithms may be vulnerable to retrospective attacks once quantum computers are available. As quantum technology evolves, the need for stronger data protection grows. Google Quantum AI recently demonstrated advancements with its Willow processors, which 𝗲𝗻𝗵𝗮𝗻𝗰𝗲𝘀 𝗲𝗿𝗿𝗼𝗿 𝗰𝗼𝗿𝗿𝗲𝗰𝘁𝗶𝗼𝗻 𝘂𝘀𝗶𝗻𝗴 𝘁𝗵𝗲 𝘀𝘂𝗿𝗳𝗮𝗰𝗲 𝗰𝗼𝗱𝗲. These breakthroughs underscore the growing efficiency and scalability of quantum computers. To address these threats, Enterprises are turning to 𝗮𝗴𝗶𝗹𝗲 𝗰𝗿𝘆𝗽𝘁𝗼𝗴𝗿𝗮𝗽𝗵𝘆 to prepare for Post Quantum era. Proactive Measures for Agile Cryptography and Quantum Resistance: 1. 𝗔𝗱𝗼𝗽𝘁 𝗣𝗼𝘀𝘁-𝗤𝘂𝗮𝗻𝘁𝘂𝗺 𝗔𝗹𝗴𝗼𝗿𝗶𝘁𝗵𝗺𝘀 Transition to NIST-approved PQC standards like CRYSTALS-Kyber, CRYSTALS-Dilithium, Sphincs+. Use hybrid cryptography that combines classical and quantum-resistant methods for a smoother transition. 2. 𝗗𝗲𝘀𝗶𝗴𝗻 𝗳𝗼𝗿 𝗔𝗴𝗶𝗹𝗶𝘁𝘆 Avoid hardcoding cryptographic algorithms. Implement abstraction layers and modular cryptographic libraries to enable easy updates, algorithm swaps, and seamless key rotation. 3. 𝗔𝘂𝘁𝗼𝗺𝗮𝘁𝗲 𝗞𝗲𝘆 𝗠𝗮𝗻𝗮𝗴𝗲𝗺𝗲𝗻𝘁 Use Hardware Security Modules (HSMs) and Key Management Systems (KMS) to automate secure key lifecycle management, including zero-downtime rotation. 4. 𝗣𝗿𝗼𝘁𝗲𝗰𝘁 𝗗𝗮𝘁𝗮 𝗘𝘃𝗲𝗿𝘆𝘄𝗵𝗲𝗿𝗲 Encrypt data at rest, in transit, and in use with quantum resistant standards and protocols. For unstructured data, use format-preserving encryption and deploy data-loss prevention (DLP) tools to detect and secure unprotected files. Replace sensitive information with unique tokens that have no exploitable value outside a secure tokenization system. 5. 𝗣𝗹𝗮𝗻 𝗔𝗵𝗲𝗮𝗱 Develop a quantum-readiness strategy, audit systems, prioritize sensitive data, and train teams on agile cryptography and PQC best practices. Agile cryptography and advanced data devaluation techniques are essential for protecting sensitive data as cyber threats evolve. Planning ahead for the post-quantum era can reduce migration costs to PQC algorithms and strengthen cryptographic resilience. Embrace agile cryptography. Devalue sensitive data. Secure your future. #VISA #PaymentSecurity #Cybersecurity #12DaysofCyberSecurityChristmas #PostQuantumCrypto
-
🔑"𝐇𝐚𝐫𝐯𝐞𝐬𝐭 𝐍𝐨𝐰, 𝐃𝐞𝐜𝐫𝐲𝐩𝐭 𝐋𝐚𝐭𝐞𝐫" (𝐇𝐍𝐃𝐋) attacks intercept RSA-2048 or ECC-encrypted files, stockpiling them for future decryption. Once a powerful quantum computer comes online, they can unlock those archives in hours, exposing years’ worth of secrets. This silent threat targets everything from personal records to diplomatic communications. 🔐 📌 HOW CAN CYBERSECURITY LEADERS AND EXECUTIVES PREPARE? 🎯🎯𝐁𝐮𝐢𝐥𝐝 𝐂𝐫𝐲𝐩𝐭𝐨𝐠𝐫𝐚𝐩𝐡𝐢𝐜 𝐀𝐠𝐢𝐥𝐢𝐭𝐲: Ensure your systems can swiftly swap out cryptographic algorithms without extensive re-engineering. 𝐂𝐫𝐲𝐩𝐭𝐨-𝐚𝐠𝐢𝐥𝐢𝐭𝐲 𝐢𝐬 𝐭𝐡𝐞 𝐚𝐛𝐢𝐥𝐢𝐭𝐲 𝐭𝐨 𝐫𝐚𝐩𝐢𝐝𝐥𝐲 𝐭𝐫𝐚𝐧𝐬𝐢𝐭𝐢𝐨𝐧 𝐭𝐨 𝐮𝐩𝐝𝐚𝐭𝐞𝐝 𝐞𝐧𝐜𝐫𝐲𝐩𝐭𝐢𝐨𝐧 𝐬𝐭𝐚𝐧𝐝𝐚𝐫𝐝𝐬 𝐚𝐬 𝐭𝐡𝐞𝐲 𝐛𝐞𝐜𝐨𝐦𝐞 𝐚𝐯𝐚𝐢𝐥𝐚𝐛𝐥𝐞. Designing for agility now will let you plug in PQC algorithms (or other replacements) with minimal disruption later. 🎯𝐈𝐦𝐩𝐥𝐞𝐦𝐞𝐧𝐭 𝐇𝐲𝐛𝐫𝐢𝐝 𝐂𝐫𝐲𝐩𝐭𝐨𝐠𝐫𝐚𝐩𝐡𝐲: Do not wait for the full PQC rollout. 👉 𝐒𝐭𝐚𝐫𝐭 𝐮𝐬𝐢𝐧𝐠 𝐡𝐲𝐛𝐫𝐢𝐝 𝐞𝐧𝐜𝐫𝐲𝐩𝐭𝐢𝐨𝐧 𝐍𝐎𝐖! Combine classic schemes like ECDH or RSA with a post-quantum algorithm (e.g. a dual key exchange using ECDH + Kyber). 🎯𝐌𝐚𝐢𝐧𝐭𝐚𝐢𝐧 𝐚 𝐂𝐫𝐲𝐩𝐭𝐨𝐠𝐫𝐚𝐩𝐡𝐢𝐜 𝐁𝐢𝐥𝐥 𝐨𝐟 𝐌𝐚𝐭𝐞𝐫𝐢𝐚𝐥𝐬 (𝐂𝐁𝐎𝐌): 👉𝐈𝐧𝐯𝐞𝐧𝐭𝐨𝐫𝐲 𝐚𝐥𝐥 𝐜𝐫𝐲𝐩𝐭𝐨𝐠𝐫𝐚𝐩𝐡𝐢𝐜 𝐚𝐬𝐬𝐞𝐭𝐬 𝐢𝐧 𝐲𝐨𝐮𝐫 𝐨𝐫𝐠𝐚𝐧𝐢𝐳𝐚𝐭𝐢𝐨𝐧: algorithms, key lengths, libraries, certificates, and protocols. A CBOM provides visibility into where vulnerable algorithms (like RSA/ECC) are used and helps prioritize what to fix. 🎯🎯𝐀𝐥𝐢𝐠𝐧 𝐰𝐢𝐭𝐡 𝐍𝐈𝐒𝐓’𝐬 𝐐𝐮𝐚𝐧𝐭𝐮𝐦 𝐌𝐢𝐠𝐫𝐚𝐭𝐢𝐨𝐧 𝐑𝐨𝐚𝐝𝐦𝐚𝐩: Follow expert guidance for a structured transition. 𝐓𝐡𝐞 𝐔.𝐒. 𝐠𝐨𝐯𝐞𝐫𝐧𝐦𝐞𝐧𝐭 (𝐂𝐈𝐒𝐀, 𝐍𝐒𝐀, 𝐚𝐧𝐝 𝐍𝐈𝐒𝐓) 𝐚𝐝𝐯𝐢𝐬𝐞𝐬 𝐞𝐬𝐭𝐚𝐛𝐥𝐢𝐬𝐡𝐢𝐧𝐠 𝐚 𝐪𝐮𝐚𝐧𝐭𝐮𝐦-𝐫𝐞𝐚𝐝𝐢𝐧𝐞𝐬𝐬 𝐫𝐨𝐚𝐝𝐦𝐚𝐩, starting with a thorough cryptographic inventory and risk assessment. Keep abreast of NIST’s PQC standards timeline and recommendations. National Institute of Standards and Technology (NIST) #𝐇𝐍𝐃𝐋 Cyber Security Forum Initiative #CSFI 🗝️ Now is the time to future-proof your encryption! 🗝️ 𝑌𝑜𝑢 𝑠ℎ𝑜𝑢𝑙𝑑𝑛'𝑡 𝑎𝑠𝑠𝑢𝑚𝑒 𝑡ℎ𝑎𝑡 𝑦𝑜𝑢𝑟 𝑑𝑎𝑡𝑎 𝑖𝑠 𝑠𝑒𝑐𝑢𝑟𝑒 𝑗𝑢𝑠𝑡 𝑏𝑒𝑐𝑎𝑢𝑠𝑒 𝑖𝑡 𝑖𝑠 𝑒𝑛𝑐𝑟𝑦𝑝𝑡𝑒𝑑...
-
Encryption: We have lost our way Encryption has evolved significantly over the past two decades, becoming a cornerstone of data security for most organizations handling sensitive information. However, as encryption processes and tools have advanced, the core purpose of encryption—safeguarding data's value—has often been overlooked. While current encryption practices prioritize robust algorithms and long key lengths to counter threats, they often neglect to assess the long-term value and lifespan of the data. Conventional wisdom dictates that data at rest protection depends on its location and access controls, with recommendations like AES128 for local hard drives and RSA2048 for potentially more accessible data. However, this approach often fails to consider the data's intrinsic value and the duration for which it remains sensitive. For instance, a public company's quarterly report has a short window of high sensitivity before publication and becomes public after publication. Yet, the analyses and iterative processes leading to the report retain their sensitivity long after the report is public. This distinction highlights the importance of data lifetime in determining encryption levels. While encryption is not necessary for public data, the underlying sensitive information warrants robust and long-lasting protection. Similarly, organizations with multiple sensitive databases rarely assess the lifetime of data sensitivity. Password information with limited lifetimes may require lower encryption strength compared to biometric data with almost indefinite lifespans. This oversight in considering data lifetime can have significant consequences. Why is this important? If the data has a long lifetime, then the threat isn’t just of someone decrypting the data today. The threat is that the adversary will steal the encrypted data and hold it until they have the capability to decrypt the data. Enter Quantum Computing or pre-quantum computing. Some say that QC or pQC is a decade or longer away, but I believe it is closer than that, so we must prepare for sophisticated attacks that will successfully decrypt stolen data stored in the adversaries infrastructure. We must do that now because the adversaries have the patience to wait. The risk, therefore, extends beyond immediate decryption; adversaries can steal encrypted data and wait until they possess the capability to decrypt it, potentially through quantum computing. If data with a 20-year lifespan is stolen and quantum computing becomes viable in five years, the adversary could have 15 years of access to that data. Data lifetime analysis should be integral to encryption strategies and performed at the outset. Aligning encryption strength with the data's lifespan can establish a more effective and forward-looking data protection framework, I welcome comments and criticisms of this analysis. #cybersecurity #datasecurity #encryption #quantumcomputing #datalifetime
-
Quantum computing isn’t “alien tech” but it will feel that way to any organization that stays on the sidelines. Here’s what’s really hiding inside that gold-plated chandelier you’re seeing (the dilution refrigerator that keeps a superconducting quantum processor near absolute zero): 1. Exponential speed-ups are moving from theory to labs that run at-scale. IBM, Microsoft, Google and others are already benchmarking systems in the 100-plus qubit range, with coherent error-correction on the 2030 roadmap. Exactly the horizon where today’s cryptography breaks. 2. The security clock is ticking faster than the hype cycle. The UK NCSC warns that RSA-2048 and ECC could be practically breakable “in the early-to-mid 2030s” and tells enterprises to start post-quantum migrations before 2028. 3. Most enterprises are still unprepared. DigiCert’s 2023 State of Quantum Readiness found that 69% of security leaders acknowledge the risk, yet only 5% have begun implementing quantum-safe encryption fewer than 1 in 20. Why does this matter for AI & Trust? GenAI already powers copilots, agents and customer-facing workflows. If the keys that protect those systems go obsolete overnight, so does the trust we build on top of them. Safety isn’t just filters and red-team drills, it’s crypto agility and forward-looking governance. Key takeaway: Treat quantum the way we treat alignment: design for the inevitable, not the current. What to do next? Map your crown-jewel data paths (models, embeddings, user PII) and flag every place RSA/ECC still reigns. Run a “harvest-now, decrypt-later” tabletop. Assume adversaries are recording traffic today to crack in ten years. Build quantum-safe guardrails alongside your GenAI stack so the moment NIST finalizes standards, you’re ready to flip the switch. The orgs that move first won’t just dodge a crisis, they’ll earn a trust dividend while everyone else scrambles. Ready to stress-test your AI security posture for the next computing wave?
-
In an era where cyberattacks are increasingly sophisticated and often state-sponsored, where data breaches are measured in millions of records and billions of dollars lost, organizations can no longer rely solely on cryptographic schemes developed decades ago. Traditional algorithms such as RSA and ECC, once considered secure, are now vulnerable; not only to evolving classical threats but also to the emerging capabilities of quantum computing. As quantum computing continues to evolve, even the strongest encryption methods will eventually be compromised. Post-quantum cryptography is no longer a future consideration, it is a necessary shift needing attention today. Organizations must take immediate action to evaluate, adopt, and implement quantum-resistant algorithms securing critical systems and sensitive data before current protections become ineffective. Don’t be lulled into a false sense of security. The real risk is harvest now, decrypt later. Data encrypted today, especially long-lived sensitive data can be stored by adversaries and decrypted when quantum computing catches up. #pqc #cisos #dspm #encryption
-
As we close out 2024, it’s natural to think about what’s next. For me, one trend stands out above the rest: the urgency of preparing for a post-quantum world. Google's recent Willow chip announcement is yet another indicator that quantum computing is advancing rapidly, and the cryptographic algorithms we rely on to secure digital identities and critical systems are nearing their expiration date. This isn’t just a security concern—it’s a business imperative that impacts trust, continuity, and resilience. Just last month, the National Institute of Standards and Technology (NIST) released its roadmap for transitioning to post-quantum cryptography (PQC). The timeline is clear: by 2030, organizations must be quantum-ready. For business leaders, 2025 will be a pivotal year to take action. Forward-thinking leaders will elevate PQC from an IT initiative to a boardroom priority. Here’s how to lead the charge: 🔑 Understand the risk: Identify which systems, identities, and sensitive data are vulnerable to the quantum threat. 🔑 Educate your board: Build awareness with your leadership team about why quantum-safe cryptography matters—and why it matters NOW. 🔑 Take inventory: Pinpoint where your cryptographic assets live and assess what needs to evolve. 🔑 Develop your roadmap: Create a strategic plan to transition to PQC before the window of opportunity closes. 2025 isn’t the year to react—it’s the year to prepare. The shift to quantum-safe cryptography is inevitable. The question is: Will your organization be ahead of the curve or playing catch-up? I’d love to hear from other leaders—how are you bringing this critical conversation into your boardroom? Let’s share strategies and lessons to ensure we’re all ready for what’s next. #PostQuantum #PQC #CybersecurityLearders #DigitalTrust #Leadership
-
Quantum-resistant algorithms are critical for securing our digital future in the face of rapidly advancing quantum computing. Today’s encryption methods, particularly public-key cryptography, could be rendered obsolete by powerful quantum computers within the next 10 to 20 years. This looming threat has spurred a global effort to develop new encryption algorithms capable of withstanding quantum attacks. Current cryptography protects everything from online banking to emails and cryptocurrencies. However, quantum computers, using methods like Shor’s Algorithm, could break these systems almost instantly, exposing sensitive data. Institutions like NIST are working to standardize quantum-resistant algorithms, with the first standards expected by 2024. These algorithms are being rigorously tested to ensure they can withstand quantum and conventional attacks. The stakes are high. Without robust quantum-resistant encryption, digital security as we know it could collapse. Sensitive transactions, private communications, and even blockchain integrity would be at risk. As businesses and governments prepare for this transition, collaboration and adaptability will be key to securing the digital world in the quantum era. What are your thoughts on the urgency of this transition? Are we prepared for the quantum age, or are we underestimating the speed at which it might arrive? #TechNews #Technology #Innovation #QuantumComputing #Encryption
-
Quantum computing is no longer a distant possibility—it's here. For cybersecurity leaders, that means the encryption methods we rely on today will eventually be obsolete. Quantum computers have the potential to break traditional cryptographic algorithms, and as a result, preparing for post-quantum cryptography is a necessity. Ultimately, the challenge is timing. Waiting for quantum threats to materialize is not an option. Organizations need to start evaluating their cryptographic dependencies, identifying vulnerabilities, and exploring quantum-resistant solutions now. The transition won’t happen overnight, but those who plan ahead will be in a far stronger position when quantum advancements move from the lab to widespread use. #Cybersecurity #QuantumComputing #CISO
-
🚨 Quantum Computing: A Game-Changer for Cybersecurity – Both a Savior and a Threat 🚨 In the evolving cybersecurity landscape, quantum computing is emerging as both a formidable tool and a potential threat. Recent developments highlight its dual impact: 🔹 Advancements in Ransomware Decryption: A notable example is the recent development of a decryptor for the Akira ransomware. Security researcher Yohanes Nugroho leveraged the immense parallel processing capabilities of NVIDIA RTX 4090 GPUs to brute-force decryption keys, successfully recovering data without succumbing to ransom demands. 🔹 Impending Threats to Traditional Encryption: As quantum computing progresses, it poses significant risks to current encryption standards. Algorithms like RSA and elliptic curve cryptography, foundational to securing digital communications, could become vulnerable. This potential shift underscores the urgency for organizations to transition to quantum-resistant cryptographic methods. 🔹 Proactive Measures and Industry Response: Recognizing these challenges, entities like NIST are spearheading efforts to develop and standardize post-quantum cryptography. These initiatives aim to safeguard data against future quantum threats, ensuring the resilience of our digital infrastructure. The convergence of quantum computing with cybersecurity necessitates a proactive and informed approach. Are you and your organization preparing for the post-quantum era? #CyberSecurity #QuantumComputing #AI #Ransomware #DataProtection #InfoSec #ThreatIntelligence #PostQuantumCryptography #CISO #Encryption #RiskManagement #Technology #CyberThreats https://lnkd.in/grjCS5pT