In a laboratory in Silicon Valley, Cambridge, or Shanghai, a quantum computer could right now be decrypting the security systems that protect our banking transactions, government communications, and corporate secrets.

Current encryption systems, developed under the principles of classical computing, may become obsolete in the face of the disruptive power of quantum computers. These machines can solve in minutes mathematical problems that would take traditional computers thousands of years.

This is not a distant threat nor a science fiction scenario. It is a technological reality that is already challenging the foundations of global cybersecurity. Cybersecurity experts have embarked on a race against time to develop new protection algorithms: post-quantum cryptography (PQC).

What is Post-Quantum Cryptography?

Post-quantum cryptography is a new paradigm of digital security designed to withstand attacks from future quantum computers.

Unlike current encryption systems, which rely on the mathematical difficulty of factoring large numbers (a challenge for traditional computers), post-quantum algorithms are built on mathematical structures complex enough to challenge even quantum processing capabilities.

What is at stake is crucial: quantum computers could break in minutes the encryption systems we now consider unbreakable, exposing sensitive data belonging to companies, governments, and individuals.

Global Responses

Faced with this challenge, governments and international organisations have begun adopting key measures.

In Europe, the European Commission has issued a recommendation urging member states to develop and implement a comprehensive strategy for transitioning to post-quantum cryptography. This initiative aims to secure digital infrastructure and protect the safety of citizens, the economy, and the digital single market.

Meanwhile, the US National Institute of Standards and Technology (NIST) has taken a significant step by publishing three standards for post-quantum cryptography algorithms designed to withstand cyberattacks by quantum computers. These new standards mark an important milestone in the transition to a secure quantum economy. According to NIST, these algorithms can secure a wide range of electronic information, from confidential email messages to e-commerce transactions that drive the modern economy.

IBM, for instance, has developed two of the first three post-quantum cryptography standards recognised by NIST: the ML-KEM (originally CRYSTAL-Kyber) and ML-DSA (CRYSTAL-Dilithium) algorithms. A fourth IBM algorithm, FN-DSA (FALCON), has been selected for future standardisation.
,>

Apple has also made a significant move with PQ3, a new encryption protocol designed to enhance iMessage security, elevating the app’s protection to Level 3.

In the banking sector, Santander is working with companies like Microsoft and GitHub, as well as entities like NIST, to develop new security measures resistant to potential quantum computer attacks while continuing to safeguard traditional systems.

Interest in post-quantum cryptography is clearly growing. According to a study by Research and Markets, the PQC market will grow from $302 million in 2024 to $1.88 billion by 2029, with a remarkable compound annual growth rate (CAGR) of 44.2%.

Encrypting the Future

Implementing post-quantum cryptography poses significant technical challenges. The new algorithms, designed to resist both traditional and quantum computer attacks, require more computational resources and bandwidth, necessitating the upgrading of entire infrastructures.

This is compounded by a relevant economic challenge: designing, implementing, and maintaining post-quantum cryptographic systems entails substantial investments. Large corporations can afford these costs, but small and medium-sized enterprises, often with more limited budgets, may face significant obstacles. Many will likely need financial support or collaborative models to adapt to the new digital reality without compromising their economic viability.

Although estimates vary, experts agree that within 5 to 10 years, quantum computers capable of breaking current cryptography may exist.

The question is no longer whether we should prepare but how much time we have left to do so. The future of digital security is at stake, and the decisions we make today will determine whether we can protect businesses, governments, and citizens from an imminent quantum threat.



Back

separator to footer

stronger than one