
Quantum computing cybersecurity risk
Quantum next: Navigating a new cyber threat landscape. Is your organization ready for a post-quantum world? How will you carve a path to resilience for the post-quantum age?
Quantum computers – machines capable of exponential leaps in computational power beyond the “bits” of classical computing – could theoretically break today’s standard encryption methods, putting sensitive business, government, and other private personal data at risk. Yet quantum also promises greater security, using the same principles to confirm that no one can tamper with or intercept cryptographic keys without detection.
This is the Quantum Conundrum – a paradox that forces us to balance both quantum’s benefits and risks with a thoughtful and measured approach. The challenge is deciding how to pivot from existing classical computing systems to ones that can stand up to these next-generation capabilities and safeguard sensitive data.
With technology innovation moving faster than ever, there’s little time to waste. Businesses should prepare now for data security in a post-quantum world.
Quantum computers work very differently from the classical computers we use today. Instead of processing information one step at a time, quantum computers can consider many possibilities at once, making them incredibly powerful for certain tasks. Imagine doing a jigsaw puzzle when every piece can be tried in every possible position and orientation simultaneously. This means a quantum computer could potentially solve more complex problems much faster than traditional computers.
Although specialists already know how quantum computers could break current encryption, the technology isn't powerful enough – yet. But it’s coming – last December, Google’s 105-qubit (quantum bit) Willow processor performed a computation that the world’s most advanced supercomputer would have needed 10 septillion (10,000,000,000,000,000,000,000,000) years to achieve.
Google’s 105-qubit (quantum bit) Willow processor performed a computation that the world’s most advanced supercomputer would have needed 10,000,000,000,000,000,000,000,000 years to achieve.
SourceGoogleQuantum opens up exciting possibilities, including faster data analysis, breakthrough research, and more efficient supply chains. But it also sparks legitimate concerns. Many standard cryptographic techniques that protect financial transactions, personal records, and trade secrets could be rendered obsolete by a sufficiently advanced quantum machine.
In October 2024, articles emerged claiming “Chinese scientists hack military-grade encryption on a quantum computer.” Spoiler alert: this wasn't quite the quantum computing apocalypse the first articles made it out to be. The researchers worked on a trivial problem with a relative of a quantum computer that isn't capable of running the necessary algorithms to break the encryption we rely upon.
While the actual threat was far from substantial and did not represent any immediate danger to current encryption standards, it nevertheless serves as a valuable reminder that quantum’s timeline is unpredictable. Many specialists predict that quantum computers capable of threatening existing encryption could be less than a decade away – however, because data today can be stored and then decrypted in the future, all that cybercriminals need to do is wait until quantum technology catches up. The potential for this kind of “store now, decrypt later” attack is driving a worldwide race to develop and standardize post-quantum algorithms complex enough to withstand quantum decryption attempts.
In May 2022, the White House issued a Presidential Executive Order directing the acceleration of the release of quantum-resistant encryption standards. It also required government departments and agencies to transition to quantum-resistant algorithms by 2035.
The US Government ran a public competition to develop new encryption algorithms and set standards that can safeguard against future quantum threats. The next phase is to plan the upgrade path for software and systems to use this new protection.
The interest in developing quantum computers is real. Corporate private data, such as financial information, personal communications, sensitive business records, defense information, and intellectual property may be threatened by a capable quantum computer. More importantly, the keys to critical infrastructure access are also at risk. Recent nation state intrusions into energy grids, water treatment facilities, and large-scale communications systems demonstrated that the threat will be broad.
As with any monumental technology shift, quantum computing demands foresight, adaptability, and collaboration. When we stop thinking of quantum as purely a threat or purely a solution, we can better prioritize investments, start testing post-quantum encryption, and stay close to research developments so we’re better prepared for the post-quantum future.
Quantum next: Navigating a new cyber threat landscape. Is your organization ready for a post-quantum world? How will you carve a path to resilience for the post-quantum age?
The dawn of quantum computing could lead to a new era of cybersecurity challenges. Quantum cryptography is an emerging way to respond.
Check out the latest findings of PwC’s 2025 Global Digital Trust Insights Survey, reflecting the views of over 4,000 executives.
Learn the 5 keys steps to take when maturing your organisation's cyber threat intelligence capabilities.