
Quantum computing is about to be one of the transformative applied sciences of the digital age, unlocking unprecedented computational energy to drive innovation at scale.
By harnessing the ideas of quantum mechanics, these computer systems promise to unravel complicated issues exponentially quicker than classical machines, driving breakthroughs in fields like drug discovery, provide chain optimisation, and AI.
Nonetheless, alongside the chance lies a risk. Quantum computing’s immense energy has the potential to interrupt many varieties of conventional encryption, placing each future programs and historic knowledge in danger.
Attackers are already harvesting encrypted info at this time, aiming to decrypt it as soon as quantum capabilities mature.
Fable: There’s loads of time to behave
In line with PwC, one of the critical misconceptions is the idea that the quantum risk to encryption remains to be years away. “Many organisations consider quantum computing is a distant concern and are prioritising different points,” says Clinton Firth, Accomplice, Cybersecurity, PwC Center East and Quantum Computing specialist. “Current analysis suggests it could possibly be mainstream inside 5 years or much less. Changing legacy encryption with quantum-ready options takes time, so companies should act now to remain forward of the risk.”[1]
Fable: Solely uneven encryption is in danger
The type of cryptography most in danger from quantum computing is uneven encryption, which makes use of a pair of mathematically linked keys—one public and one non-public—permitting safe knowledge change such that info might be shared overtly however solely decrypted by the meant recipient.
Nonetheless, most companies are unaware that symmetric encryption, which secures knowledge utilizing a single key for each encryption and decryption, can also be in danger sooner or later.
“Simply as Shor’s algorithm demonstrates how quantum machines can break uneven encryption, Grover’s algorithm presents a problem for symmetric encryption,” provides Firth. “The priority is that quantum computing will make brute-force assaults far simpler.”[2] [3]
Anton Tkachov, Managing Director, Cybersecurity, PwC UK, explains additional: “Advanced programs, comparable to satellite tv for pc arrays or ATM networks, are required to move encryption keys to satisfy necessities round periodic key rotation. These keys are ‘wrapped’ utilizing uneven key change algorithms. As an alternative of attempting to brute-force entry to encrypted info, an attacker armed with quantum laptop, might crack the ‘wrapper’ and acquire keys to decrypt delicate knowledge.”
Fable: Distributors will deal with the problem
One other concern highlighted by PwC’s quantum specialists, is companies counting on distributors to deal with the quantum risk.
“If I’m a CIO operating a posh expertise property, I is likely to be well-prepared for quantum myself—however I’m nonetheless closely reliant on distributors. Changing a key vendor might take three-to-five years, and by the point I realise they’re falling behind on their quantum journey, it might already be too late,” says Tkachov.
Firth agrees: “Companies can’t outsource threat—it stays their duty. Distributors received’t improve their cryptography by default. With out robust strain from companies, it merely received’t occur.”
One other problem stems from the rising “noise” round quantum options.
“Each time a serious vendor proclaims a quantum breakthrough—whether or not that’s a brand new chip or an emulation software—boards and executives, usually studying headlines in mainstream enterprise publications, instantly ask: ‘Is our encryption damaged? Are we about to be hacked? Are you able to show we’re protected?’ This creates large strain and further work for safety groups, usually with out trigger,” says Tkachov.
Preparing for the post-quantum world
To assist their companies minimize by means of these myths and misconceptions, CISOs should first increase consciousness of the dimensions of the encryption threat—and the urgency of appearing now.
Tkachov concludes: “The time is now. Companies should develop a post-quantum encryption technique, construct inner consciousness, map the property in danger, and redesign their purposes.
“No single encryption algorithm will clear up the problem. As an alternative, organisations want an agile method that permits them to quickly undertake new requirements as quickly as previous ones are damaged—staying one step forward of risk actors.”
To study extra about how organisations can put together for the post-quantum world, register for PwC’s new webinar right here.
To search out out extra about Clinton Firth, click on right here.
To search out out extra about Anton Tkachov, click on right here.
To study extra go to us right here.
That is for common info functions solely.
2025 PwC. All rights reserved
[1] PwC, “Is quantum computing about to transform the world?,” https://www.pwc.com/gx/en/points/reinventing-the-future/take-on-tomorrow/quantum-computing-podcast-episode.html