What is the cyber security risk from quantum computing? - KPMG Australia (2024)

What is the cyber security risk from quantum computing? - KPMG Australia (1)

Learn how quantum risk management could help mitigate new cyber security threats that arise from advancements in quantum technology.

Learn how quantum risk management could help mitigate new cyber security threats.

  • 1000
  • View Print friendly version of this article Opens in a new window
  • Home
  • Insights
  • What is the cyber security risk from quantum computing?

Planning | Understanding | Regulation | Risk management implementation | Quantum risk preparation | Contact

Quantum computing is set to harness the laws of quantum mechanics to solve problems too complex for today’s classical digital computers. But will the rise of quantum computing increase cyber security risk?

Business concerns about quantum computing

The emerging quantum computing industry has already made enormous advances. As more organisations discover its potential, the global market is expected to hit US$50 billion by the end of this decade.1 Major technology companies such as Amazon, IBM, Google and Microsoft have launched commercial quantum-computing cloud services, and there are significant investments in new players such as Quantinuum and PsiQuantum.

But surveys suggest that businesses have concerns around cyber security and data protection from quantum computing.

What is quantum computing?

Quantum computers are designed to use quantum physics for computing, which introduces unprecedented capabilities over traditional computation methods. Quantum computing has the power to transform drug research, energy use, manufacturing, cyber security and communications, as well as AI applications, autonomous-vehicle navigation, and financial modelling.

Research by KPMG Australia shows that protecting data and dealing with cyber risks is viewed by C-suite executives and board members from private sector enterprises as a top challenge in 2024 – and for the next 3 to 5 years.2

In Australia, to address this quantum threat, the Australian Signals Directorate (ASC) are encouraging organisations to understand and make plans to transition to the use of Post-Quantum Cryptographic algorithms within their own environments.

The ASD have outlined planning considerations for post-quantum cryptography, including, an inventory of encryption, data value assessment, a transition plan for implementing PQC and decommissioning legacy cryptography, vendor engagement and education on the use of PQC.

Encryption is everywhere. As an immediate step, organisations need to understand their risk from the use of public key cryptography and how they value data in their environment. This will impact multiple systems and applications that are fundamental to business operation. The transition to a quantum resilient environment will take many years and multiple budget cycles, so the best strategy is to start understanding this risk now.

Michael Egan
Director – Quantum, KPMG Australia

KPMG in Canada surveyed 250 large corporations and found that around 60 percent of organisations in Canada and 78 percent in the US expect quantum computers to become mainstream by 2030.3 But as quantum computing proliferates, so do concerns about its potential impact on cyber security.

Most of the businesses surveyed were ‘extremely concerned’ about quantum computing’s potential to break through their data encryption. Sixty percent of respondents in Canada and 73 percent in the US believe ‘it’s only a matter of time’ before cybercriminals are using the power of quantum to decrypt and disrupt today’s cyber security protocols. At the same time, however, 62 percent of respondents in Canada and 81 percent in the US admit that they need to do a better job of evaluating their current capabilities to ensure their data remains secure3.

KPMG in Germany’s research in collaboration with Germany’s Federal Office for Information Security (BSI) showed that 95 percent of respondents believe quantum computing’s relevance and potential impact on today’s cryptographic security systems is ‘very high or high’, and 65 percent said the average risk to their own data security is ‘very high or high’. Only 25 percent of firms said the threat posed is currently being addressed in their risk management strategy.4

Planning for quantum computing risk

Quantum computers will be able to break common encryption methods at an alarming speed. Encryption tools currently used to protect everything from banking and retail transactions to business data, documents and digital signatures can be rendered ineffective – fast.Attacks using a ‘harvest-now, decrypt-later’ approach can enable adversaries to steal encrypted files and store them until more advanced quantum computers emerge. So, data with a long life time value, such as health data, financial records and government files will be of immediate interest to bad actors.

The level of preparation that organisations do today is expected to be critical to limiting exposure and vulnerability to emerging threats, making quantum risk planning a priority.

Businesses need to understand the quantum risk in order to take action in areas including:

  • web browsing
  • remote access
  • software
  • digital signatures
  • communication
  • crypto currencies.

Understanding the quantum-risk landscape

Organisations need to quickly understand the risk factors that quantum may pose to their business operations and security. Every organisation that holds and processes data should consider the lifetime value of the data that they use, and the impact of that data being used or misrepresented by bad actors. For example:

Sensitive organisational data

  • Highly confidential data held by military services, national intelligence, finance and government organisations.

Critical infrastructure providers

  • Organisations whose complex systems are critical to the functioning of communities, cities, states, and countries, including healthcare, transportation, utilities and telecommunications. Imagine, for example, the potentially disastrous impact of quantum disrupting the operation of a city’s sprawling power grid.

Long-life infrastructure providers

  • Organisations providing systems built to have a long life span for profitability, including satellite communications, payment terminals, Internet of Things (IoT) sensor networks and transportation. Whether data consists of customer information, medical records or government classified data, a breach can have catastrophic financial, reputational and legal consequences. And some organisations are currently unaware of cyber attackers already accessing and storing encrypted company data with the aim of decrypting it in the future, using a quantum computer.

Personal data handlers

  • Organisations managing personal data with a long confidentiality span are required by law to protect such data, including government, healthcare, financial firms and insurance organisations. They need to ensure protection over an extended period of 5, 10, 20 years or more.

Dr Michele Mosca has developed a theorem that suggests a pathway to consider in order to protect data and keep it quantum-safe.

Mosca’s theorem stresses the need for organisations to begin due diligence in the post-quantum space immediately. It states that the amount of time that data must remain secure (X), plus the time it takes to upgrade cryptographic systems (Y), is greater than the time at which quantum computers have enough power to break cryptography (Z).

Once organisations are aware of their risk environment, they should be in a position to prioritise activity and mitigate or eliminate risks. However, this may not be a quick or simple process and may take years for each organisation.

Managing technical debt, for example, can be a significant challenge for organisations relying on systems that will be incapable of running modern cryptographic profiles. There is now an opportunity to evaluate migration timelines and understand how long it will take to make infrastructure quantum resistant. To do this, organisations should understand the challenge and allocate budgets for both the mitigation and ongoing monitoring that the post-quantum world will require.

It’s critical that organisations not only prepare for the quantum threat in their long-term risk planning, but also strengthen data protection now to help minimise quantum’s potentially disruptive and costly impacts.

Quantum-specific legislation and regulation

As quantum emerges and organisations continue to explore and discover both its game-changing advantages and threats, new legislation and regulations are being developed. In 2022, a US law was passed that requires government agencies to take action in using post-quantum cryptography and encourages the private sector to follow suit7.

In December 2023, the National Institute of Standards and Technology (NIST) in the United States released two draft publications to guide organisations aiming to redefine their capabilities and combat potential quantum-based attacks. The documents Quantum Readiness: Cryptographic Discovery and Quantum Readiness: Testing Draft Standards for Interoperability and Performance outlines concrete issues and potential solutions when migrating to a new post-quantum cryptographic standard8.

The growing list of initiatives includes:

  • the Quantum Computing Cyber security Preparedness Act 2022, advising US federal organisations to prepare now for a post-quantum cyber security (PQC) world
  • National Security Memorandum on Promoting US Leadership in Quantum Computing While Mitigating Risk to Vulnerable Cryptographic Systems
  • White House Memorandum on Migration to Post-Quantum Cryptography
  • Monetary Authority of Singapore MAS/TCRS/2024/01: Advisory on Addressing the Cyber security Risks Associated with Quantum9
  • Quantum Security for the Financial Sector: Informing Global Regulatory Approaches, World Economic Forum in collaboration with the Financial Conduct Authority10.

As we see a global movement towards the identification of risks and requirements of secure quantum technology, further quantum-specific legislation, regulation and compliance is likely to follow.

When should companies implement quantum risk management?

The answer is now. While quantum computing may seem like a futuristic science fiction concept, the technology is poised to exert major consequences across today’s cyber security capabilities. KPMG believes innovation to protect against quantum cyber threats is needed without delay.

In the US, in 2014, the NIST released a draft of the NIST Cyber security Framework 2.0 (CSF 2.0) – a major update to the Cyber Security Framework (CSF)– to help organisations reduce cyber security risk. To be finalised and published in 2024, CSF 2.0 reflects changes in the cyber security landscapeand will offer additional guidance on implementing the CSF11.

The NIST has also chosen four encryption tools that it says are designed “to withstand the assault of a future quantum computer, which could potentially crack the security used to protect privacy in the digital systems we rely on every day12.” The four encryption algorithms will become part of NIST’s post-quantum cryptographic standard and all are expected to be finalised and ready for use in 202413.

Meanwhile, improvements and standards in Quantum Random Number Generators14 (QRNGs), for entropy enhancement and randomisation, and Quantum Key Distribution15, a secure communication method for exchanging encryption keys only known between shared parties, also aim to harness the power of quantum technology and protect data.

It’s important to note that today’s post quantum solutions may create a false sense of security, as we do not know if the quantum algorithms considered resistant today will remain that way as quantum computers become larger and more effective. The danger is illustrated by the discovery of vulnerabilities in the NIST-selected encryption algorithm CRYSTALS-Kyber16.

How can organisations prepare for quantum computing risks?

Organisations can start to prepare for quantum threats by gaining a precise understanding of potential risks across their value chain. They should also identify methods to become more cryptographically agile in updating and deploying new cryptographic techniques as they become available. It’s also crucial to create end-of-life strategies for data, products and systems that will become obsolete or unable to support new cyber security requirements in a quantum-computing world.

Key questions as quantum evolves

  • How long does your data need to be secure and are you liable for its management?
  • What is the actual and reputational damage to your business in case of compromise by quantum computers?
  • How long will it take to increase your quantum resilience to an acceptable level?
  • Do you have an inventory of cyber security measures?
  • Are you liable for a third-party service or cloud provider and are they are moving to a quantum-safe environment?

Key actions to help mitigate quantum risks

  • Provide quantum impact awareness training, education and roadmaps to senior leadership.
  • Implement roadmaps and solutions to modernise cryptographic environments.
  • Provide guidance on investing in quantum-resistant technologies.
  • Develop contingency and mitigation plans to prevent a quantum attack.
  • Continuously monitor the fast-evolving quantum and security environment.

How KPMG can help with quantum risk

KPMG’s technology consulting specialists have extensive experience in cyber security and quantum technologies. By providing quantum risk assessments tailored to your business, we can help you understand specific threats posed by quantum technology.

We can help you prioritise at-risk data and systems, and develop a customised cyber security strategy into your long-term risk planning to assist with preparation for quantum threats.

Steps to quantum-secure encryption include:

  1. Discover: Identify cryptographic algorithms and protocols used to protect data and assets.
  2. Assess: Perform a risk assessment to identify quantum-vulnerable systems and assets.
  3. Manage: Prioritise remediation efforts and develop a remediation roadmap.
  4. Remediate: Implement mechanisms that enable crypto agility, and transition-vulnerable cryptographic systems to post-quantum cryptography based on priority.
  5. Monitor: Perform ongoing monitoring of remediation efforts and changes to the threat and regulatory landscape.

KPMG specialists are using our quantum readiness assessment methodology and innovative collaborations to help make a difference for clients. KPMG firms’ collaboration with IBM Quantum (Quantum Safe) and InfoSec Global allow us to begin understanding the cryptographic footprint/baseline and work towards remediation and potential digital solutions. KPMG specialists are here to help.

Further reading

Find out how to prepare for quantum cyber security risk

KPMG's quantum computing specialists

To arrange a quantum readiness assessment or learn more about quantum computing, get in touch.

blog postsMichael Egan

Director, Quantum Technologies

KPMG Australia

Profile|

|Phone

blog postsGregory Miller

Partner, Cyber Security – Critical Infrastructure & Government Lead

KPMG Australia

Profile|

|Phone

Quantum technologiesQuantum technologiesThe age of quantum is nowThe age of quantum is now

1https://home.kpmg/ca/en/home/market-insights/predictions/technology/quantum-computing-will-help-us-solve-our-most-difficult-problems.html

2Top 5 issues facing Australian business leaders in 2024

3 https://kpmg.com/ca/en/home/media/press-releases/2023/05/quantum-computing-is-coming-but-few-are-ready-for-it.html

4Ibid.

5https://www.bsi.bund.de/SharedDocs/Downloads/EN/BSI/Crypto/Marktumfrage_EN_Kryptografie_Quantencomputing.pdf?__blob=publicationFile&v=3

6Mosca’s Theorem, Michele Mosca

7QuantumComputing Cybersecurity Preparedness Act - This act addresses the migration of executive agencies' information technology systems to post-quantumcryptography.

8https://www.nextgov.com/cybersecurity/2023/12/nist-releases-2-draft-guides-prepare-post-quantum-migration/392934/

9https://www.mas.gov.sg/regulation/circulars/advisory-on-addressing-the-cybersecurity-risks-associated-with-quantum

10https://www.weforum.org/publications/quantum-security-for-the-financial-sector-informing-global-regulatory-approaches/

11https://csrc.nist.gov/projects/post-quantum-cryptography

12https://www.nist.gov/news-events/news/2023/08/nist-standardize-encryption-algorithms-can-resist-attack-quantum-computers

13Ibid.

14https://phys.org/news/2023-05-quantum-random-generator-independently-source.html

15https://quside.com/how-does-quantum-key-distribution-qkd-work/

16https://eprint.iacr.org/2023/1084

What is the cyber security risk from quantum computing? - KPMG Australia (2024)
Top Articles
Compound Interest Investments | The Power of Compounding
Bad Credit Statistics Statistics: Market Data Report 2024
Bank Of America Financial Center Irvington Photos
2018 Jeep Wrangler Unlimited All New for sale - Portland, OR - craigslist
Victory Road Radical Red
Splunk Stats Count By Hour
Palm Coast Permits Online
Online Reading Resources for Students & Teachers | Raz-Kids
Ixl Elmoreco.com
Here are all the MTV VMA winners, even the awards they announced during the ads
St Als Elm Clinic
Horoscopes and Astrology by Yasmin Boland - Yahoo Lifestyle
Mikayla Campinos Videos: A Deep Dive Into The Rising Star
3656 Curlew St
Oppenheimer Showtimes Near Cinemark Denton
Bc Hyundai Tupelo Ms
Healing Guide Dragonflight 10.2.7 Wow Warring Dueling Guide
D10 Wrestling Facebook
Eka Vore Portal
Curtains - Cheap Ready Made Curtains - Deconovo UK
Huntersville Town Billboards
Espn Horse Racing Results
Haunted Mansion Showtimes Near Epic Theatres Of West Volusia
Dashboard Unt
Pensacola Tattoo Studio 2 Reviews
Lacey Costco Gas Price
Cona Physical Therapy
Maine Racer Swap And Sell
Harrison 911 Cad Log
Bi State Schedule
King Soopers Cashiers Check
Wasmo Link Telegram
Craigslist Dallastx
Litter-Robot 3 Pinch Contact & DFI Kit
Cvb Location Code Lookup
Wildfangs Springfield
159R Bus Schedule Pdf
Taylor University Baseball Roster
Fapello.clm
Mississippi weather man flees studio during tornado - video
Rocky Bfb Asset
UWPD investigating sharing of 'sensitive' photos, video of Wisconsin volleyball team
The Sports Academy - 101 Glenwest Drive, Glen Carbon, Illinois 62034 - Guide
The Latest Books, Reports, Videos, and Audiobooks - O'Reilly Media
Sleep Outfitters Springhurst
Publix Store 840
Maurices Thanks Crossword Clue
Provincial Freeman (Toronto and Chatham, ON: Mary Ann Shadd Cary (October 9, 1823 – June 5, 1893)), November 3, 1855, p. 1
라이키 유출
Nfhs Network On Direct Tv
Primary Care in Nashville & Southern KY | Tristar Medical Group
Latest Posts
Article information

Author: Msgr. Benton Quitzon

Last Updated:

Views: 5721

Rating: 4.2 / 5 (43 voted)

Reviews: 82% of readers found this page helpful

Author information

Name: Msgr. Benton Quitzon

Birthday: 2001-08-13

Address: 96487 Kris Cliff, Teresiafurt, WI 95201

Phone: +9418513585781

Job: Senior Designer

Hobby: Calligraphy, Rowing, Vacation, Geocaching, Web surfing, Electronics, Electronics

Introduction: My name is Msgr. Benton Quitzon, I am a comfortable, charming, thankful, happy, adventurous, handsome, precious person who loves writing and wants to share my knowledge and understanding with you.