Quantum Threats to Encryption Scalability

Explore top LinkedIn content from expert professionals.

Summary

Quantum threats to encryption scalability refer to the risk that quantum computers will soon be powerful enough to break the cryptographic methods currently securing our digital data, potentially making sensitive information vulnerable and forcing organizations to rethink how they protect their assets. This looming challenge means that existing encryption systems could be rendered obsolete, so preparation and migration to quantum-resistant solutions are urgent priorities for anyone handling valuable data.

  • Start risk assessment: Identify which data and systems will still be valuable and vulnerable when quantum computers arrive, so you can prioritize protection.
  • Plan migration: Begin preparing to switch from traditional encryption methods to quantum-resistant algorithms and set clear milestones for your organization’s transition.
  • Implement hybrid solutions: Combine classical and post-quantum encryption approaches now to help safeguard your information during the transition period and keep your systems compatible.
Summarized by AI based on LinkedIn member posts
  • View profile for Keith King

    Former White House Lead Communications Engineer, U.S. Dept of State, and Joint Chiefs of Staff in the Pentagon. Veteran U.S. Navy, Top Secret/SCI Security Clearance. Over 15,000+ direct connections & 42,000+ followers.

    42,766 followers

    Quantum Computing Could Shatter Encryption Sooner Than Expected, Google Researcher Warns Introduction: A New Countdown for Cryptographic Security A new study by Google Quantum AI researcher Craig Gidney has dramatically reduced the estimated quantum computing power required to break RSA encryption, slashing previous projections by a factor of 20. While Bitcoin doesn’t use RSA, the breakthrough has serious implications for all public-key cryptography, including the elliptic curve algorithms used by cryptocurrencies. Key Findings and Implications • Quantum Cost of Breaking RSA Reassessed • Gidney’s paper shows that RSA encryption—used in securing data, digital certificates, and some crypto wallets—can be cracked with far fewer quantum resources than previously thought. • The update implies that quantum threats may arrive earlier than the cybersecurity community has prepared for. • Why It Matters for Crypto • While Bitcoin uses elliptic curve cryptography (ECC) rather than RSA, ECC is similarly vulnerable to Shor’s algorithm, which quantum computers could use to extract private keys from public ones. • This raises concerns for crypto holders, exchanges, and developers: if quantum computing advances faster than expected, today’s wallet protections may be obsolete. • No Immediate Threat—Yet • Current quantum machines still lack the millions of error-corrected qubits needed to execute these attacks. • However, the acceleration in theoretical research and hardware development means “crypto-agility”—the ability to switch to post-quantum encryption—should be a top priority. • Call to Action for Developers and Institutions • Security protocols across finance, healthcare, and defense rely on public-key cryptography. • Gidney’s findings reinforce calls for post-quantum cryptographic standards, already in development by agencies like NIST. • For crypto, it underscores the urgency of transitioning to quantum-resistant wallet and transaction structures before the risk becomes real. Why This Matters: The Quantum Clock Is Ticking This research represents more than a mathematical tweak—it’s a strategic warning. Quantum computing is progressing rapidly, and assumptions about how long existing encryption will remain safe may no longer hold. For crypto, finance, and digital infrastructure at large, proactive adaptation to quantum threats isn’t optional—it’s essential. Keith King https://lnkd.in/gHPvUttw

  • View profile for Julien Bouteloup

    Entrepreneur and investor. Running Stake Capital Group

    12,177 followers

    🚨 Two major new research papers just dropped that dramatically accelerate the quantum threat to crypto. Google Quantum AI optimized Shor’s algorithm down to roughly 1K logical qubits, potentially allowing private keys to be cracked in minutes on advanced superconducting hardware. A follow-up from Oratomic then brought neutral-atom implementations down to just 26K physical qubits with a runtime of around 10 days. This makes Q-Day feel much closer, within just a few years of being reachable. This year at Satoshi Roundtable the mood around quantum computing wasn’t very enthusiastic. We openly discussed how a powerful enough quantum computer could break ECDSA signatures (secp256k1) used across Bitcoin, Ethereum, and most protocols, exposing massive on-chain value including dormant and early-mined coins. The big question was: how do we prepare, and prepare well? Crazy times to be living through. Honestly, teams working in encryption and blockchain should seriously consider stopping everything else and prioritizing this now. It’s time to start integrating quantum-resistant encryption algorithms into modern protocols. No matter if a cryptographically relevant quantum computer arrives in one year or in five, adversaries are likely already collecting encrypted traffic and on-chain data today waiting to decrypt everything the day quantum power crosses that threshold. The shift is real: migrating to post-quantum cryptography is no longer optional. It’s urgent infrastructure work for wallets, bridges, staking, exchanges, and every system holding long-term value. https://lnkd.in/dGUR24xH

  • View profile for Razi R.

    ↳ Driving AI Innovation Across Security, Cloud & Trust | Senior PM @ Microsoft | O’Reilly Author | Industry Advisor

    13,611 followers

    Reading A Practitioner’s Guide to Post-Quantum Cryptography from the Cloud Security Alliance made me pause. It highlights something many organizations still underestimate very often: modern cryptography was not designed for a future with cryptographically relevant quantum computers (CRQCs). This threat is also not theoretical. The risk comes from Store Now, Decrypt Later attacks, where encrypted data can be harvested today and broken once quantum capabilities mature. Time, not just technology, becomes the critical risk factor. Key highlights from the guide • Shor’s and Grover’s quantum algorithms threaten most public-key cryptography in use today, including RSA, Diffie-Hellman, and elliptic-curve algorithms • CRQCs may emerge by the early 2030s, putting long-term-value data at risk even if systems are secure today • Data confidentiality and integrity are both impacted by Store Now, Decrypt Later attacks • NIST published post-quantum cryptography standards in 2024 (FIPS-203, FIPS-204, FIPS-205), but enterprise adoption will take time and investment • Risk assessment must begin by identifying which data assets still hold value at “Q-Day,” not by blanket cryptographic replacement Who should take note • Security leaders responsible for long-term data protection strategies • Architects managing encryption for data at rest, data in transit, and non-repudiation • Compliance and governance teams evaluating regulatory and sector-specific quantum readiness requirements • Engineering teams responsible for cryptographic libraries, TLS, VPNs, KMS, and certificate management Why this matters Unlike most cyber threats, quantum risk is driven by time. Data intercepted today may be compromised years later. If enterprises wait until CRQCs arrive, it will already be too late for data with long-term value. At the same time, mitigation is costly, complex, and not yet fully supported by mainstream products. The path forward The guide emphasizes starting with disciplined risk assessment, identifying vulnerable cryptographic functions, and mapping technology components before committing to mitigation. Enterprises should periodically reassess risk, track technology maturity, and align mitigation efforts with CSA Cloud Controls Matrix guidance rather than rushing into premature or unnecessary changes.

  • View profile for Marcos Carrera

    💠 Chief Blockchain Officer | Tech & Impact Advisor | Convergence of AI & Blockchain | New Business Models in Digital Assets & Data Privacy | Token Economy Leader

    31,967 followers

    🛡️ The Quantum Clock is Ticking quietly: Is Your Financial Infrastructure Ready? The financial industry is built on a foundation of digital trust, currently secured by #cryptographic standards like RSA and ECC. However, the rise of Cryptographically Relevant Quantum Computers (CRQC) poses an existential threat to this foundation. As we navigate this transition, here are 3 key pillars from the latest Mastercard R&D white paper that every financial leader must prioritize: 1. Addressing the 'Harvest Now, Decrypt Later' (HNDL) Threat 📥 Malicious actors are already intercepting and storing sensitive #encrypted data today, intending to decrypt it once powerful quantum computers are available. Financial Use Case: Protecting long-term assets such as credit histories, investment records, and loan documents. Unlike transient transaction data (which uses dynamic cryptograms), this "shelf-life" data requires immediate risk analysis and the adoption of quantum-safe encryption for back-end systems. 2. Quantum Resource Estimation & The 10-Year Horizon ⏳ While a CRQC capable of breaking RSA-2048 in hours might be 10 to 20 years away, the migration process itself will take years. Financial Use Case: Developing Agile Cryptography Plans. Financial institutions should set "action alarms" for instance, once a quantum computer reaches 10,000 qubits, a pre-prepared 10-year migration plan must be triggered to ensure infrastructure is updated before the "meteor strike" occurs. 3. Hybrid Implementations: The Bridge to Security 🌉 The transition won't happen overnight. The paper highlights the importance of Hybrid Key Encapsulation Mechanisms (KEM), which combine classical security with PQC. Financial Use Case: Enhancing TLS 1.3 and OpenSSL 3.5 protocols. By implementing hybrid models now, banks can protect against current quantum threats (like HNDL) while maintaining compatibility with existing classical systems, ensuring a smooth and safe transition. The Bottom Line: A reactive approach is no longer an option. Early adopters who evaluate their data's "time value" and begin the migration today will be the ones to maintain resilience and protect global financial assets tomorrow. #QuantumComputing #PostQuantumCryptography #FinTech #CyberSecurity #DigitalTrust #MastercardResearch

  • View profile for Bill Genovese CISSP ITIL

    Chief Quantum Officer | Technology Fellow | Head of Quantum Innovation & Sovereign Computing | Experienced CIO & CTO, Executive Distinguished Architect, Consulting Partner

    29,480 followers

    One of the global leaders in quantum computing is urging governments, companies, and critical infrastructure operators to expedite preparations for the quantum computing era. The warning highlights that today’s encryption systems could be compromised sooner than anticipated, alongside outlining the company's commitments to post-quantum security. This call to action is detailed in a new blog post by Kent Walker, president of global affairs at Google and Alphabet, and Hartmut Neven, founder and lead of Google Quantum AI. They emphasize that quantum computing serves as both a transformative scientific tool and a potential cybersecurity threat. The same machines that are expected to enhance drug discovery, materials science, and energy could also jeopardize the public-key cryptography that safeguards financial transactions, private communications, and classified data. “To put that plainly: The encryption currently used to keep your information confidential and secure could easily be broken by a large-scale quantum computer in coming years,” they state. Google is advocating for the swift adoption of post-quantum cryptography, warning that advancements in quantum computing could soon undermine the encryption securing today’s digital systems. The company has been preparing for a post-quantum world since 2016, implementing quantum-resistant protections across its infrastructure and aligning its migration plans with NIST standards set to be finalized in 2024. Google calls on policymakers to foster society-wide momentum through cloud modernization, global alignment on standards, and closer collaboration with quantum experts to prevent security surprises.

  • View profile for Michaela Eichinger, PhD

    Product Solutions Physicist @ Quantum Machines | I talk about quantum computing.

    16,096 followers

    The quantum threat to encryption is real, but the engineering 'valley of death' between 133 qubits and a million qubits is wider than most realize. Here is what happens when you actually try to run Shor’s algorithm on existing hardware. Researchers from armasuisse Wissenschaft und Technologie, ETH Zürich and PSI Paul Scherrer Institut ran Shor's algorithm on IBM Quantum's 133-qubit system. Their findings aren't just about whether it worked. They're about 𝗪𝗛𝗬 𝗶𝘁 𝗯𝗮𝗿𝗲𝗹𝘆 𝘄𝗼𝗿𝗸𝗲𝗱. Here are the challenges that stood out: 𝗖𝗶𝗿𝗰𝘂𝗶𝘁 𝗦𝗽𝗲𝗰𝗶𝗳𝗶𝗰𝗶𝘁𝘆: You can't just load up Shor's algorithm and factor any number you want. In this study, the modulus N was embedded directly into the gate patterns. This means even if you had the qubits, you need to custom-design, optimize, and validate a circuit for each integer you want to factor. 𝗠𝗮𝗰𝗵𝗶𝗻𝗲 𝗜𝗻𝘀𝘁𝗮𝗯𝗶𝗹𝗶𝘁𝘆: Day-to-day calibration drifts made some experimental runs unusable. One day your system works. The next day, the same circuit fails because error rates shifted. 𝗣𝗹𝗮𝘁𝗳𝗼𝗿𝗺 𝗟𝗼𝗰𝗸-𝗜𝗻: Circuits that worked on IBM hardware failed to even transpile to IonQ and Quantinuum systems using generic pipelines. Cross-platform quantum computing is still aspirational; it currently requires hardware-specific design. 𝗘𝗿𝗿𝗼𝗿 𝗔𝗰𝗰𝘂𝗺𝘂𝗹𝗮𝘁𝗶𝗼𝗻: For N = 35, they hit practical limits because circuit depth exceeded what the hardware can reliably execute. In fact, when using an "unfriendly" base, the noise was so high that the experiment actually failed to detect a statistically significant signal. These aren't problems you solve by just adding more qubits. You solve them by implementing QEC, new 'online' calibration routines, improving gate fidelities, and by developing platform-agnostic compilation toolchains. What is your take on how big this 'algorithmic' gap actually is ? 📸 Credits: Paul BAGOURD, Julian Jang-Jaccard , IBM / The New York Times

  • View profile for Gina Yacone

    CISO (Advisory, vCISO) | Keynote Speaker | Cybersecurity Women of the Year 2024 | Cybersecurity Women of the World (Top 20) 2024 | Moderator & Speaker | Investor | Board Advisor | Board Member

    52,810 followers

    The UK’s National Cyber Security Centre just issued a quiet but critical wake-up call: quantum computing isn’t science fiction anymore — it’s a looming reality with the power to break today’s encryption standards. As someone who follows cybersecurity and tech trends closely, this stood out to me. The NCSC is urging large organisations — especially in energy, transport, and other critical sectors — to start preparing now to migrate to post-quantum cryptography. Why the urgency? Because once quantum machines mature, they’ll be able to crack public key encryption at a speed today’s systems aren’t built to defend against. Their guidance outlines a 10-year roadmap, with milestones in 2028, 2031, and full readiness by 2035. That sounds far off — until you consider how long it takes to upgrade legacy infrastructure and secure bespoke IT systems. We don’t know the exact timeline for a quantum breakthrough, but waiting for it to happen before acting would be a mistake. Is your org already thinking about this shift? How are you preparing for a post-quantum world? #cybersecurity #quantum #technology https://lnkd.in/d-jUCRPS

  • View profile for Antonio Grasso
    Antonio Grasso Antonio Grasso is an Influencer

    Technologist & Global B2B Influencer | Founder & CEO | LinkedIn Top Voice | Driven by Human-Centricity

    42,140 followers

    The rapid advancements in quantum computing are pushing businesses to rethink data protection, requiring swift adaptation to new encryption techniques and infrastructure to stay secure in an increasingly vulnerable digital landscape. Quantum computing, utilizing qubits, can perform computations far faster than traditional computers, presenting challenges for standard cryptographic systems like RSA and ECC, which are vulnerable to quantum attacks. Businesses must assess risks, update their infrastructure with post-quantum cryptography, and train personnel accordingly. Adopting a hybrid strategy combining traditional and quantum-resistant cryptography ensures smoother transitions. Continuous monitoring of technological advancements and compliance with updated regulations is essential for safeguarding sensitive data in the quantum era. #QuantumComputing #cryptography #DataProtection

  • View profile for Şebnem Elif Kocaoğlu Ulbrich, LL.M., MLB

    Tech, Marketing and Expansion Advisor I LinkedIn Top Voice I Published Author I FinTech & LegalTech Expert I Columnist (Fintech Istanbul, Fortune, PSM) I LinkedIn Creator Program Alum I Entrepreneur Coach

    11,161 followers

    🏦 𝗚𝟳 𝗮𝗱𝘃𝗶𝘀𝗲𝘀 𝗮𝗰𝘁𝗶𝗼𝗻 𝘁𝗼 𝗰𝗼𝗺𝗯𝗮𝘁 𝗳𝗶𝗻𝗮𝗻𝗰𝗶𝗮𝗹 𝘀𝗲𝗰𝘁𝗼𝗿 𝗿𝗶𝘀𝗸𝘀 𝗳𝗿𝗼𝗺 𝗤𝘂𝗮𝗻𝘁𝘂𝗺 𝗖𝗼𝗺𝗽𝘂𝘁𝗶𝗻𝗴 The G7 Cyber Expert Group (CEG), chaired by the U.S. Department of the Treasury and the Bank of England, released a public statement this week, highlighting the potential cybersecurity risks associated with developments in quantum computing and recommending steps for financial authorities and institutions to take to address those risks. Quantum computers, expected to emerge within a decade, could break current cryptographic methods that are used to secure financial data. The Committee recommends that financial entities develop quantum-resilience strategies now, including adopting newly released NIST encryption standards, assessing risks, and creating plans to mitigate quantum threats. 𝗙𝗶𝗻𝗮𝗻𝗰𝗶𝗮𝗹 𝗲𝗻𝘁𝗶𝘁𝗶𝗲𝘀 𝘀𝗵𝗼𝘂𝗹𝗱 𝗰𝗼𝗻𝘀𝗶𝗱𝗲𝗿 𝘁𝗮𝗸𝗶𝗻𝗴 𝘁𝗵𝗲 𝗳𝗼𝗹𝗹𝗼𝘄𝗶𝗻𝗴 𝘀𝘁𝗲𝗽𝘀 𝘁𝗼 𝗮𝗱𝗱𝗿𝗲𝘀𝘀 𝘁𝗵𝗶𝘀 𝗲𝗺𝗲𝗿𝗴𝗶𝗻𝗴 𝗿𝗶𝘀𝗸: ►Developing a better understanding of quantum computing, the risks involved, and strategies for mitigating those risks. ►Assessing quantum computing risks in their areas of responsibility. ►Developing a plan for mitigating quantum technology risks. The G7 CEG encourages financial authorities to work closely with firms and other relevant parties in their jurisdiction to raise awareness of the importance of the transition to quantum-resilient technologies. You can read more below 👇 Check out 𝙌𝙪𝙖𝙣𝙩𝙪𝙢–𝙍𝙚𝙖𝙙𝙞𝙣𝙚𝙨𝙨 𝘽𝙚𝙨𝙩 𝙋𝙧𝙖𝙘𝙩𝙞𝙘𝙚𝙨 𝙖𝙣𝙙 𝙂𝙪𝙞𝙙𝙚𝙡𝙞𝙣𝙚𝙨: https://lnkd.in/dDydSP3D #cybersecurity #financialservices #quantumcomputing

Explore categories