Why quantum computers threaten our global security (2024)

Q-Day is when a quantum computer so powerful is built it could break the public encryption systems. How concerned should we be?

Why quantum computers threaten our global security (1)ADVERTIsem*nT

There may come a day known as Q-Day, which will shatter global security as we know it.

It could be in a few years from now, or in 10 years or more. But scientists, mathematicians, and governments are not waiting idly by for the quantum threat to happen.

Q-Day is when a quantum computer so powerful is built, it could break the public encryption systems that protect our online conversations, bank accounts, and most vital infrastructure, wreaking havoc on governments and businesses.

How this digital doomsday would happen comes down to simple maths.

How it started

Since the beginning of the Internet, cryptography has protected our online data and conversations by hiding or coding information that only the person receiving the message can read on traditional computers.

In the 1970s, mathematicians built encryption methods that consisted of numbers hundreds of digits long. The difficulty of mathematical problems was such that it could take at hundreds of years to solve if using the right parameter size and numbers.

To break the encryption, the numbers need to be split into their prime factors, but this could take hundreds if not thousands of years with traditional computers.

The threat of codes being cracked was therefore not a big worry.

That was until 1994 when the American mathematician Peter Shor showed how it could be done with an algorithm using a then hypothetical quantum computer that could split large numbers into their factors much quicker than a traditional computer.

The rise of quantum

The quantum threat was still not a significant concern back then but it started to become an issue four years later when the first quantum computer was built.

Though that quantum computer - and those currently being built - are still not powerful enough to use Shor’s algorithm to decrypt the numbers, in 2015, intelligence agencies determined that the advancement in quantum computing is happening at such a speed that it poses a threat to cyber security.

At the moment, qubits, the processing units of quantum computers, are not stable for long enough to decrypt large amounts of data.

Related

  • 'Quantum computers have their flaws and won’t solve everything. But they’re still revolutionary'

But tech companies such as IBM and Google have slowly but steadily started making progress in building machines strong enough to deliver the benefits of quantum, which include pharmaceutical research, subatomic physics, and logistics.

“It’s a matter of time and it's a matter of how long does it take until we have a large quantum computer to go,” Dr Jan Goetz, CEO and co-founder of IQM Quantum Computers, a start-up that builds quantum computers, told Euronews Next.

If it takes 30 years to build a strong enough computer, there would be less reason to panic as most of the encrypted data might no longer be relevant.

Why quantum computers threaten our global security (2)ADVERTIsem*nT

But “if someone comes up with a very clever idea and can already, do the code-breaking in 3 to 5 years, the whole situation also looks different,” Goetz said.

Who should be worried?

Individuals should not be concerned by Q-Day as there are probably few people who have data that is very sensitive and will still be relevant in years to come.

Goetz said once the new technology comes, encryption codes will be updated on all computers and phones and “you should not be too concerned about this because the industry will take care of this”.

Why quantum computers threaten our global security (3)

But governments, organisations, and businesses should be concerned by the quantum threat.

Why quantum computers threaten our global security (4)ADVERTIsem*nT

There is a concept called “store now, decrypt later”. It means someone could be storing the data and waiting for a quantum computer strong enough to come along and decrypt it.

“Governments in particular are harvesting data from the Internet,” said Dr Ali El Kaafarani, founder and CEO of quantum-safe cryptography company PQShield.

“They are storing data that they can't access or read at the moment, but they can keep them there until the cryptography layer becomes weaker until they know of a way to attack it and then they break it and they read those communications,” he told Euronews Next.

A post-quantum cryptography world

Governments are not standing by for that to happen and the cryptographic community are building encryption methods that can withstand the quantum threat, known as post-quantum cryptography (PQC).

Why quantum computers threaten our global security (5)ADVERTIsem*nT

This year, sometime between May and June, the final standardisation of PQC will be released by the US National Institute of Standards and Technology.

This will be a game-changer as it will be on the market for all industries.

The US legislation has mandated that the timeline to change to PQC will be from 2025 until 2033, by which time the cyber secure supply chain will have to have transitioned to using PQC by default.

In 2025, web browsers and software updates will have to become post-quantum secure by default if they are sold to the US, said El Kaafarani.

Why quantum computers threaten our global security (6)ADVERTIsem*nT

This is why some companies, such as Google Chrome and Cloudflare, have already started using PQC.

The US’s PQC standards are international standards, but every country has their own guidelines governments do collaborate.

The US, UK, French government, German, and Dutch governments, among others, have all weighed in and produced whitepapers and guidelines for the industry to push them to start the transition phase to post-quantum cryptography as they understand that it is a process that will take time.

“Governments take care of standardising the algorithms so that we all speak the same language,” said El Kaafarani, but it is the cryptographic community that comes up with the new encryption methods that are not vulnerable against quantum computers.

Why quantum computers threaten our global security (7)ADVERTIsem*nT

Related

  • Can quantum computers really accelerate the path to net zero?

Most of the cryptographic standards are developed in Europe by European cryptographers, he added, whose UK-based company had four encryption methods selected to be in the US’s PQC standards.

Once developed, the encryption methods are ruthlessly scrutinised by the wider cryptographic community, governments, and everyone else who is interested in cracking the encryption methods.

“Some get broken along the way. And that's the whole point of the process, is to root out the weak ones and keep them the strong ones,” said El Kaafarani.

But there is no perfect encryption method or security method that can ensure that everything will stay secure forever.

Why quantum computers threaten our global security (8)ADVERTIsem*nT

“Therefore cryptography is naturally an evolving field and that's why we need to keep ahead and keep an eye on how things are evolving,” he said.

Why quantum computers threaten our global security (2024)

FAQs

Why quantum computers threaten our global security? ›

Q-Day is when a quantum computer so powerful is built, it could break the public encryption systems that protect our online conversations, bank accounts, and most vital infrastructure, wreaking havoc on governments and businesses.

What are the bad things about quantum computers? ›

One of the biggest challenges is that they are very fragile. They are easily disturbed by things like heat, light, and even disturbances in the earth's magnetic field. This makes them difficult to use in the real world. Another challenge is that quantum computers require very low temperatures to operate.

Will quantum computers break security? ›

Researchers typically estimate that it will be many years until quantum computers can crack cryptographic keys—the strings of characters used in an encryption algorithm to protect data—faster than ordinary computers.

How does quantum computing affect the world? ›

Complex problems that currently take the most powerful supercomputer several years could potentially be solved in seconds. Future quantum computers could open hitherto unfathomable frontiers in mathematics and science, helping to solve existential challenges like climate change and food security.

What is the most major impact of quantum computing on cybersecurity? ›

The most pressing concern is the potential vulnerability of current encryption methods. Modern encryption, such as RSA and ECC, relies on the computational difficulty of problems like integer factorization and discrete logarithms.

Why is quantum computing a threat? ›

Quantum computers will be able to break common encryption methods at an alarming speed. Encryption tools currently used to protect everything from banking and retail transactions to business data, documents and digital signatures can be rendered ineffective – fast.

Should we be worried about quantum computing? ›

In short, quantum computers can threaten our data and privacy to the extent that this will force the largest technology upgrade cycle in computer history.

Why did NASA stop quantum computing? ›

The abrupt shutdown of NASA's quantum computing project was triggered by an unforeseen incident during a routine test. During the analysis of a complex simulation, the quantum computer demonstrated unprecedented computational power, solving a previously intractable problem.

Are quantum computers bad for the environment? ›

Additionally, quantum computers require significant amounts of energy to operate, which could have environmental impacts, including greenhouse gas emissions and the depletion of non-renewable energy resources.

How to protect against quantum computing? ›

12 Cybersecurity Measures To Defend Against The Rise Of AI And Quantum Computing
  1. First, take stock of how your data is currently accessed. ...
  2. Leverage human behavior with a manual key. ...
  3. Build a robust data loss prevention program. ...
  4. Identify your organization's internal champions.
Feb 7, 2024

Which country leads the world in quantum computing? ›

These are just a few of the possibilities that may be enabled by quantum computing, which harnesses the laws of physics to perform calculations much faster than even the most powerful traditional computers. They all hinge on research here in the United States, the world's undisputed leader in quantum computing.

Who is leading the quantum computer race? ›

1. International Business Machines Corporation (IBM)

Who is the famous person in quantum technology? ›

Arun Kumar Pati is an Indian physicist notable for his research in quantum information, quantum computation and Foundations of quantum mechanics. He has made pioneering contributions in the area of quantum information. He is considered as the Father of Indian Quantum Computing.

What are the negative effects of quantum computing? ›

Unintended consequences of quantum computing

The main concern is cybersecurity, especially at the advent of large-scale quantum adoption. Quantum computers can easily crack today's best encryption. This means that, especially from a geopolitical perspective, whoever gets there first will have a major advantage.

What is the biggest problem with quantum computing? ›

Compared with standard computers, quantum computers are extremely susceptible to noise. The quantum state of qubits is extremely fragile and any disturbance, such as a slight vibration or a change in temperature, can uncontrollably affect the computer, causing information stored to be lost.

What are quantum attacks? ›

A cybersecurity quantum attack refers to the risk that quantum computers may be used to attack traditional cryptographic schemes. It is assumed that quantum computers will solve encryption equations faster than standard computers.

What are the failures of quantum computers? ›

All of today's quantum computers are prone to errors. These errors may be due to imperfect hardware and control systems, or they may arise from the inherent fragility of the quantum bits, or qubits, used to perform quantum operations.

What are the pros and cons of quantum computing? ›

What are the pros and cons of quantum computing?
ProsCons
Improves medical research since quantum computers can exactly simulate molecules and genes as well as process big dataCalculations cover a wide range of results and in certain circ*mstances could be less precise than binary computers
4 more rows
Aug 31, 2023

What are the disadvantages of quantum mechanics? ›

Quantum mechanics cannot predict the exact location of a particle in space, only the probability of finding it at different locations. The brighter areas represent a higher probability of finding the electron.

Top Articles
Power Your Spring Refresh with Crypto-funded Gift Cards | BitPay
FIFO vs. LIFO: How to Pick an Inventory Valuation Method - NerdWallet
English Bulldog Puppies For Sale Under 1000 In Florida
Katie Pavlich Bikini Photos
Gamevault Agent
Pieology Nutrition Calculator Mobile
Hocus Pocus Showtimes Near Harkins Theatres Yuma Palms 14
Hendersonville (Tennessee) – Travel guide at Wikivoyage
Compare the Samsung Galaxy S24 - 256GB - Cobalt Violet vs Apple iPhone 16 Pro - 128GB - Desert Titanium | AT&T
Vardis Olive Garden (Georgioupolis, Kreta) ✈️ inkl. Flug buchen
Craigslist Dog Kennels For Sale
Things To Do In Atlanta Tomorrow Night
Non Sequitur
Crossword Nexus Solver
How To Cut Eelgrass Grounded
Pac Man Deviantart
Alexander Funeral Home Gallatin Obituaries
Energy Healing Conference Utah
Geometry Review Quiz 5 Answer Key
Hobby Stores Near Me Now
Icivics The Electoral Process Answer Key
Allybearloves
Bible Gateway passage: Revelation 3 - New Living Translation
Yisd Home Access Center
Pearson Correlation Coefficient
Home
Shadbase Get Out Of Jail
Gina Wilson Angle Addition Postulate
Celina Powell Lil Meech Video: A Controversial Encounter Shakes Social Media - Video Reddit Trend
Walmart Pharmacy Near Me Open
Marquette Gas Prices
A Christmas Horse - Alison Senxation
Ou Football Brainiacs
Access a Shared Resource | Computing for Arts + Sciences
Vera Bradley Factory Outlet Sunbury Products
Pixel Combat Unblocked
Movies - EPIC Theatres
Cvs Sport Physicals
Mercedes W204 Belt Diagram
Mia Malkova Bio, Net Worth, Age & More - Magzica
'Conan Exiles' 3.0 Guide: How To Unlock Spells And Sorcery
Teenbeautyfitness
Where Can I Cash A Huntington National Bank Check
Topos De Bolos Engraçados
Sand Castle Parents Guide
Gregory (Five Nights at Freddy's)
Grand Valley State University Library Hours
Hello – Cornerstone Chapel
Stoughton Commuter Rail Schedule
Nfsd Web Portal
Selly Medaline
Latest Posts
Article information

Author: Reed Wilderman

Last Updated:

Views: 6577

Rating: 4.1 / 5 (52 voted)

Reviews: 91% of readers found this page helpful

Author information

Name: Reed Wilderman

Birthday: 1992-06-14

Address: 998 Estell Village, Lake Oscarberg, SD 48713-6877

Phone: +21813267449721

Job: Technology Engineer

Hobby: Swimming, Do it yourself, Beekeeping, Lapidary, Cosplaying, Hiking, Graffiti

Introduction: My name is Reed Wilderman, I am a faithful, bright, lucky, adventurous, lively, rich, vast person who loves writing and wants to share my knowledge and understanding with you.