Google’s introduction of a state-of-the-art quantum computing chip in December 2024 represented a massive step forward for the industry. Major technology players like IBM, Microsoft, and Amazon have also put their quantum stakes in the ground, recognizing quantum for what it is — the future of high-end computing.
Quantum is a double-edged sword. It has the potential for substantial transformation and benefits, such as revolutionizing fields like drug discovery and science. But the same computing technology that will accelerate breakthroughs will also change the cybersecurity landscape as we know it, easily cracking current encryption models, exposing sensitive information, and upending digital trust.
Securing Today for the Quantum World of Tomorrow
If you ask 10 people when they think Q-Day — the day quantum computers will be powerful enough to break current encryption protocols — will arrive, you’ll likely get 10 different answers. To take one benchmark I generally agree with, Gartner predicts that by 2029, advances in quantum computing will make asymmetric cryptography unsafe and by 2034 fully breakable.
This isn’t stopping cybercriminals from taking action now. “Harvest now, decrypt later” is widely reported as a tactic used by multiple nations, whereby they are literally making copies of the entire internet, especially encrypted data, in the hopes that they can use quantum computers to break the encryption in the future.
Where there is an offensive, equal work is underway on the defensive through research and development of post-quantum cryptography (PQC). The National Institute of Standards and Technology (NIST) initiated its PQC standardization process nearly a decade ago to develop algorithms resistant to quantum computer attacks. Last year, NIST released three finalized post-quantum encryption standards for immediate use. (Fun fact: my boss, Akamai co-founder and CEO Dr. Tom Leighton helped develop a digital signature algorithm that NIST is now recommending to help defend critical infrastructure against quantum attacks).
IT teams need to take inventory of where their enterprise currently uses cryptography. You may be surprised by what you find. Cryptography underpins everyday functions — from password protection to encrypted emails and secure web browsing. It also encompasses “things at rest” at the hardware level, like disk encryption. Taking inventory will give an organization a baseline understanding of which assets and processes need to be updated to PQC standards.
Another step is getting ready to update Transport Layer Security (TLS) protocols. PQC algorithms are already integrated into TLS 1.3 to fend off future attacks from quantum computers. While TLS 1.3 has been available since 2018, some organizations are still using its older version, leaving their company open to vulnerabilities and risks. Akamai sees more than 80% of traffic on TLS 1.3. While this is a substantial amount, it does mean there’s still work to do until everyone has migrated to the updated protocols.
Taking Advantage of Future Opportunities
Quantum computing isn’t all doom and gloom. Quantum computers can process and draw samples from vast information spaces that are inaccessible to any conventional computer — meaning we can’t even fathom all the benefits this technology will bring.
Take financial services, for example. In portfolio optimization, it can rapidly evaluate numerous asset combinations, improving the speed and quality of investment decisions. For risk analysis, quantum-enhanced simulations reduce the number of iterations needed, enabling faster, more accurate assessments of financial exposure. In fraud detection, quantum machine learning can uncover hidden patterns in large, complex datasets, potentially catching fraud earlier than traditional methods. It can even be used to try to help solve some of the most pressing challenges our society is facing today, by modeling complex climate systems and improving carbon capture and climate adoption technologies. It’s important that teams know how to take advantage of quantum’s offerings when they’re more mainstream.
The first step is preparing existing infrastructure for the influx of quantum computing. Quantum represents a fundamentally new paradigm for computing — so integrating data and insights from quantum with classical computing will not be a set-and-forget process. One place to start is by training workforces — something many are currently in the process of doing for artificial intelligence. This can be done by upskilling staff, hiring new talent with backgrounds in quantum, and investing in workshops to get employees smart on quantum. Another method is to build a community of quantum experts by partnering with startups and academic institutions — pooling your combined expertise to get an understanding of the basics can foster information sharing and innovation.
Another is to start thinking about how quantum computers can help analyze massive amounts of data that traditional computers couldn’t handle. Quantum techniques, like eigenvalue estimation, offer a new way to analyze massive datasets. Industries like healthcare will benefit from quantum computing’s ability to analyze large volumes of data that can be used to improve diagnostic accuracy, accelerate the development of new drugs, and forecast patient trends. It’s not too early to begin thinking about ways to experiment with quantum computers once available. Small, hands-on experiences will provide a better understanding of how to utilize quantum down the road.
Quantum computing isn’t science fiction. It’s going to become a very real opportunity and threat soon. Preparing now will position companies to keep data safeguarded and secure while also being ready to lead and innovate in this next era of computing.