Cyber Security

Quantum Computing and Cybersecurity: The Way Forward for a Quantum-Safe Future

By Anant Adya, Executive Vice President and Head of Americas Delivery at Infosys

Imagine a scenario whereย Virtual Private Networks (VPNs)ย across theย worldย are easily hacked, orย Secure Sockets Layer (SSL)ย certificates of billions of websitesย areย made invalid.ย Theseย areย some ofย the foundational cyber-risksย posed by the rise of the quantum era.ย ย ย ย 

The quantum computing ecosystem is evolving rapidly from experimental labs to commercial pathways. Recognizing its transformative potential, governments andย major organizationsย areย making significantย investmentsย in thisย emerging sector.ย In fact, investments in quantum technology grew byย 50ย percentย in 2024 to an all-time high ofย nearly $2 billion. Theย sectorย endeavorsย to evolve beyond the current Noisy Intermediate-Scale Quantum (NISQ) era to an age of fault-tolerant systems,ย ultimatelyย reachingย the Quantum Advantageย โ€”ย when quantum machines easily outperform classical machines.ย 

HNDL: The Primary Quantum Riskย 

As massive computational power gets unlocked, unprecedented risksย areย emerging.ย True,ย the technologyย may mature in future,ย butย the threatsย emergingย nowย are real. Adversaries can steal or harvest dataย now andย decrypt it later when quantum computing matures.ย Thisย makesย current data unsafe.ย And this, in essence, isย the Harvest Now Decrypt Later (HNDL) threat.ย ย 

HNDL is possible becauseย todayโ€™sย secure communicationย usesย asymmetric cryptography.ย This type ofย encryptionย relies onย algorithms like Rivest-Shamir-Adleman (RSA), Elliptic-Curve Cryptography (ECC), and Diffieโ€“Hellman (DH), all of which are based on complexย math problemsย such as factoringย huge numbersย orย finding discrete logarithmic values.ย Regularย or classical computersย wouldย take billions of years to solve thisย math,ย which is whyย encryptionย works.ย ย 

In contrast, the very nature of quantum computersย enablesย them to evaluate multiple solutions simultaneously, making them faster andย veryย powerful. Theย complexย mathย that empowers encryptionย nowย would thenย be solved in exponentially lesserย time,ย successfully crackingย much of the worldโ€™s encryption.ย And this is what HNDL data thieves areย bankingย on.ย 

Risk Delayed, but Realย 

While the timeline forย commercialย production of aย powerfulย quantum computer is uncertain, most industry insiders agree that it is only a matter of time. Inย its 2025 report,ย the Global Risk Institute posits aย five to tenย yearย timeframeย forย the development ofย Cryptographically Relevant Quantumย Computers (CRQC).ย ย 

A quantum-powered adversary may decrypt traffic as it flows, impersonate endpointsย or even intercept authentication credentials in transit. The foundational riskย begins with intercepting VPN traffic around the world and compromising all HTTPS/SSL certificates. Beyond this, large,ย distributed Internet of Thingsย (IoT) systems that rely on light-weight encryption would be compromised. Operational Technology (OT) and Industrial Control Systems (ICS) that cannot be upgraded swiftlyย areย likely toย be compromisedย too, jeopardizing vital sectors like healthcare,ย energyย and transportation.ย ย 

HNDL poses aย significantย risk to long-lasting, sensitive data in finance, healthcare,ย governmentย and critical infrastructure. These sectors are especially vulnerable due to their extended confidentiality requirements, most of which could be beyondย the arrival ofย quantumย computers.ย ย 

Enterprises ignoring this threatย nowย risk future breaches, and regulatory or reputational damage when adversaries deploy quantum decryption. The downstream effects of such breaches could be catastrophic not just to the organization, but to entire ecosystems.ย 

Quantum Solutions to Quantum Problemsย 

HNDL and associated risks are a shared global challenge that merits a worldwide defense focused on building and deploying entirely new, quantum-resistant algorithms. It is time now for quantum-safe Post-Quantum Cryptography (PQC).ย 

PQCย is alreadyย underway.ย Led by the U.S. National Institute of Standards and Technology (NIST), governments and standards bodies are focused on replacing vulnerable cryptographic systems.ย ย 

The migrationย to PQC is a multi-year process involving careful discovery, planning, phasedย implementationย and continual refinement. However, the complexity is inย identifyingย all cryptographic dependencies across IT estates, hardware, software, supplyย chainsย and legacy systems.ย The migrationย must avoid operational disruptionsย byย employing strategies such as parallel classic and quantum-safe systems during transition periods.ย 

Enterprise Quantum Defense is Here

Enterprises must act now to adopt quantum-safe cryptography. Many organizations are already assessing vulnerabilities in current encryption standards, building resilience into digital assets and collaborating with vendors and regulators to set new benchmarks for protection. Quantum readiness is being embedded in governance and architecture across the board in such organizations.

Essential steps for enterprises include:ย 

  • Building a quantum readiness roadmap: Outline which systems rely onย vulnerableย cryptography andย makeย plans to migrate to quantum-safe alternatives.ย 
  • Creating a comprehensive cryptographic inventory:ย Setย migration priorities based on risk exposure,ย catalog all protocols,ย algorithmsย and keys in use.ย 
  • Establishingย crypto-agilityย to swap algorithms easily: Integrate quantum readiness into long-term risk management.ย 

Some enterprises are piloting hybrid cryptographic schemesย byย combining classical and quantum-resistant algorithms during transition.ย Thisย ensuresย backward compatibility, balancedย securityย andย performanceย and interoperability.ย ย 

The Rosy Day Beyond the Red Dawnย 

Meetingย quantum challenges is an enterprise-wide cybersecurityย endeavor thatย involvesย multiple stakeholders. Ecosystem collaboration,ย involvingย cloud providers, hardware vendors, identity platforms,ย regulatorsย and industry consortiaย will define new security standards andย helpย transitionย systems more easily.ย ย 

The movement towards a quantum-safe ecosystem isย undoubtedlyย building up, although unevenly. Leading sectors such as financial services are publishing detailed quantum-readiness roadmaps to guide industry-wide benchmarks, procurementย policiesย and regulatory compliance. Initiatives like joint testing, sharedย standardsย and coordinated timelines among ecosystem players ensure interoperability and reduce systemic quantum risk.ย 

Quantum migrationย reinforcesย broader cyber resilience programs, offering opportunities for modernization and strengthening defenses.ย ย 

Author

Related Articles

Back to top button