The quantum timeline

The threat of quantum computers breaking modern encryption isn’t science fiction, but it’s also not an immediate catastrophe. The core issue stems from Shor’s algorithm, developed in 1994, which demonstrates the potential for a quantum computer to efficiently factor large numbers and compute discrete logarithms – the mathematical foundations of widely used public-key cryptography like RSA and Elliptic Curve Cryptography (ECC). This means that much of the secure communication we rely on today, from online banking to secure websites, could become vulnerable.

Estimating when quantum computers will pose a real threat is difficult. Experts disagree, and progress in quantum hardware is unpredictable. Most estimates center around the 2030-2040 timeframe for building a cryptographically relevant quantum computer – one capable of breaking current encryption standards. However, the "harvest now, decrypt later" attack strategy adds urgency. Attackers are already intercepting encrypted data with the intention of decrypting it once quantum computers become powerful enough.

Currently, quantum computers are still in their nascent stages. They suffer from issues with qubit stability, coherence, and scalability. IBM, Google, and other companies are making progress, but building a fault-tolerant quantum computer with enough qubits to run Shor’s algorithm remains a significant engineering challenge. The number of stable, reliable qubits needed is estimated to be in the thousands, and we’re still operating in the dozens and low hundreds.

These timelines are guesses. A single breakthrough in error correction could move the date up by years, while hardware scaling issues might push it back. Preparing now is about managing that uncertainty rather than waiting for a deadline that might move.

Quantum-safe cybersecurity: Protecting data from future quantum computing threats.

New algorithms for a post-quantum world

Post-Quantum Cryptography (PQC) refers to cryptographic algorithms that are believed to be secure against attacks by both classical and quantum computers. The National Institute of Standards and Technology (NIST) has been leading a multi-year effort to standardize new PQC algorithms. In 2022, NIST announced the first set of algorithms selected for standardization, marking a significant milestone in the transition to quantum-safe cryptography.

The selected algorithms fall into several categories, each based on different mathematical problems. CRYSTALS-Kyber and CRYSTALS-Dilithium are lattice-based algorithms, considered strong candidates due to their performance and security. Falcon is another lattice-based scheme offering advantages in signature size. SPHINCS+ is a stateful hash-based signature scheme, providing a different security foundation.

Lattice-based cryptography relies on the difficulty of solving problems involving lattices – geometric structures in high-dimensional space. Code-based cryptography, while not initially selected for primary standardization, is based on the difficulty of decoding general linear codes. Multivariate cryptography uses systems of polynomial equations, and hash-based signatures rely on the security of cryptographic hash functions. Each approach has its own strengths and weaknesses.

It’s crucial to understand that PQC algorithms aren’t meant to add to existing security measures, but to replace them. RSA and ECC will eventually become vulnerable, and these new algorithms are designed to take their place. The transition won’t be seamless, and careful planning is needed to ensure compatibility and maintain security throughout the process. There's ongoing research into the performance and side-channel vulnerabilities of these algorithms, so the standardization process is iterative.

  1. CRYSTALS-Kyber handles key-encapsulation to establish shared secrets.
  2. CRYSTALS-Dilithium: Digital signature algorithm.
  3. Falcon: Digital signature algorithm – prioritizes smaller signature sizes.
  4. SPHINCS+: Digital signature algorithm – particularly resilient, but less efficient.

NIST Post-Quantum Cryptography (PQC) Finalist Comparison - 2026

Algorithm NameCategoryKey Size (approximate)Signature Size (approximate)Security Considerations
CRYSTALS-KyberLattice-based Key Encapsulation Mechanism (KEM)768 bytes (Kyber512)768 bytesGenerally considered to have a good security margin, but ongoing analysis continues to refine understanding of lattice structure vulnerabilities.
CRYSTALS-DilithiumLattice-based Digital Signature2528 bytes (Dilithium2)2048 bytesOffers a relatively small signature size. Security relies on the hardness of lattice problems, and research continues on potential attacks.
FalconLattice-based Digital Signature1280 bytes (Falcon-512)690 bytesKnown for its compact signature sizes. Security is based on the Shortest Integer Solution (SIS) problem on lattices. Ongoing research focuses on side-channel resistance.
SPHINCS+Hash-based Digital SignatureVariable, depending on security level (e.g., 32-64 bytes for moderate security)Variable, larger than lattice-based signatures (e.g., 7.6-15.2 KB)Provides strong security based on the assumed security of hash functions. Larger signature sizes are a primary drawback. Stateless nature simplifies key management.
RainbowMultivariate Quadratic (MQ) Digital SignatureApproximately 1 KB (RainbowV-I)Approximately 256 bytesSecurity is based on the difficulty of solving systems of multivariate polynomial equations. Concerns exist about potential structural attacks and the need for large key sizes.

Illustrative comparison based on the article research brief. Verify current pricing, limits, and product details in the official docs before relying on it.

Why hybrid encryption is the safest bet

A practical approach to mitigating the quantum threat is to adopt hybrid cryptography, which combines classical cryptographic algorithms with PQC algorithms. This involves using both RSA or ECC and a PQC algorithm in the same cryptographic operation. The idea is that even if one algorithm is broken, the other will still provide security.

Hybrid cryptography offers several benefits. It provides backwards compatibility, allowing systems to continue functioning even if PQC implementations have issues. It also reduces the risk associated with relying solely on new, unproven algorithms. If a weakness is discovered in a PQC algorithm, the classical algorithm still provides a layer of defense.

Several hybrid schemes and libraries are emerging. OpenSSL, a widely used cryptography library, has begun incorporating PQC algorithms, enabling hybrid key exchange. However, managing multiple cryptographic systems simultaneously presents challenges. It requires careful configuration, testing, and monitoring to ensure that the hybrid scheme is implemented correctly and securely.

The transition to PQC won’t happen overnight. Hybrid approaches provide a sensible pathway for organizations to begin preparing for the quantum era without disrupting existing systems. The key is to start experimenting and building expertise now.

  • Backwards Compatibility: Maintains functionality with existing systems.
  • Reduced Risk: Provides a fallback if a PQC algorithm is compromised.
  • Gradual Transition: Allows organizations to adopt PQC at their own pace.

Quantum-Safe Cybersecurity Readiness Assessment: 2026

  • Inventory Current Cryptographic Assets: Document all current cryptographic algorithms, key lengths, and their implementations across your organization. This includes systems, applications, and data stores.
  • Identify Critical Data for Long-Term Protection: Determine which data assets require protection against future decryption by a quantum computer, considering their sensitivity and lifespan. Prioritize data with long-term confidentiality requirements.
  • Assess Post-Quantum Cryptography (PQC) Algorithm Performance: Evaluate the performance characteristics of leading PQC algorithms within your specific infrastructure and applications. Consider factors like computational overhead and key/ciphertext sizes.
  • Develop a Phased PQC Migration Plan: Create a roadmap for integrating PQC algorithms into your systems. A phased approach minimizes disruption and allows for iterative testing and refinement.
  • Evaluate Hybrid PQC Implementation Options: Research and assess the feasibility of hybrid approaches, combining classical cryptography with PQC algorithms, to provide immediate and future security.
  • Train Security Personnel on PQC Concepts: Equip your security team with the knowledge and skills necessary to understand, implement, and manage PQC solutions. Focus on the implications of quantum computing for cryptography.
  • Review and Update Cryptographic Policies: Adapt your organization’s cryptographic policies to incorporate PQC standards and best practices as they emerge. Ensure alignment with industry guidelines and regulatory requirements.
Excellent! You've taken significant steps towards preparing your organization for the quantum threat. Continue to monitor advancements in PQC and refine your strategy accordingly.

Quantum Key Distribution (QKD): A Different Path

Quantum Key Distribution (QKD) represents a fundamentally different approach to cryptography. Instead of relying on mathematical algorithms, QKD leverages the laws of quantum physics to securely distribute encryption keys. It works by encoding cryptographic keys onto photons (particles of light) and transmitting them over a quantum channel.

The security of QKD is based on the principle that any attempt to intercept or measure the photons will disturb their quantum state, alerting the sender and receiver to the presence of an eavesdropper. This makes it theoretically impossible for an attacker to intercept the key without being detected. This contrasts with PQC, which relies on the computational difficulty of certain mathematical problems.

However, QKD has significant limitations. Its range is limited by signal attenuation and noise, requiring trusted nodes to extend the distance. It’s also expensive to deploy and maintain, requiring specialized hardware and infrastructure. QKD is not a software upgrade; it’s a physical layer security solution.

QKD isn’t a universal solution for all organizations. It’s best suited for situations where the highest levels of security are required and the cost and complexity can be justified – such as securing government communications or financial transactions. It's also valuable where long-term key secrecy is paramount.

Securing AI in a Quantum World

AI systems have their own quantum vulnerabilities. If an attacker uses a quantum computer to crack the encryption on training sets, they can poison the data or reverse-engineer proprietary model parameters. This turns a data breach into a permanent compromise of the model's logic.

The implications are significant. If an attacker can manipulate the training data, they could cause the model to make incorrect predictions or exhibit biased behavior. Compromising model parameters could allow an attacker to control the model’s output. Extracting sensitive information from a trained model could reveal confidential data used during the training process.

Protecting AI systems requires a multi-faceted approach. This includes using quantum-safe cryptography to secure the data used for training and inference, as well as developing quantum-resistant machine learning algorithms. Techniques like homomorphic encryption – which allows computations to be performed on encrypted data – and federated learning – which allows models to be trained on decentralized data without sharing the data itself – can also help mitigate the risk.

The convergence of AI and quantum computing presents both opportunities and challenges. While quantum computers pose a threat to AI systems, they also have the potential to accelerate AI research and development. Ensuring the security of AI in a quantum world will require a collaborative effort between cryptographers, machine learning experts, and security professionals.

Quantum-Safe Cybersecurity: Protecting AI in the Quantum Era

The Looming Quantum Threat ⚠️

Current encryption standards (RSA, ECC) are vulnerable to attacks from future quantum computers. Shor’s algorithm poses a significant risk, potentially breaking widely used cryptographic systems.

This isn't a distant problem. The development of quantum computers is accelerating. We need to prepare now to safeguard our data and systems, especially AI models.

This presentation focuses on protecting AI – a critical asset – in this evolving landscape.

AI Models: New Attack Surfaces

AI models introduce unique vulnerabilities:

  • Model Extraction: Adversaries can steal model intellectual property by querying the model repeatedly.
  • Adversarial Attacks: Subtle, carefully crafted inputs can cause models to make incorrect predictions.
  • Data Poisoning: Manipulating training data to compromise model integrity and performance. This is particularly concerning as AI becomes more data-driven.

These attacks are exacerbated by the complexity of modern AI systems.

Data Poisoning in Detail

Data poisoning attacks aim to compromise the integrity of AI models during the training phase.

How it works:

  1. Adversary injects malicious data into the training dataset.
  2. The model learns from this corrupted data.
  3. The model's behavior is altered, leading to incorrect predictions or biased outputs.

Quantum Impact: Quantum computers could accelerate the discovery of optimal poisoning data, making these attacks more effective.

Quantum-Resistant AI Architectures

Moving towards quantum-resistant AI requires a multi-faceted approach:

  • Post-Quantum Cryptography (PQC): Integrating PQC algorithms into AI systems to protect data in transit and at rest.
  • Homomorphic Encryption: Enables computations on encrypted data, protecting model privacy and integrity.
  • Federated Learning with PQC: Combining the benefits of federated learning (decentralized training) with PQC for enhanced security.
  • Robust AI Training: Developing techniques to make models more resilient to data poisoning attacks.

Defense Strategies: Beyond Algorithms

Technical solutions are crucial, but a holistic security posture is essential:

  • Data Validation & Sanitization: Rigorous checks on training data to detect and remove malicious inputs.
  • Model Monitoring: Continuous monitoring of model performance to identify anomalies indicative of an attack.
  • Access Control: Restricting access to sensitive data and models.
  • Regular Audits: Conducting security audits to identify and address vulnerabilities.
  • Stay Informed: The quantum landscape is evolving rapidly; continuous learning is vital.
1 / 5

Certificate Authorities and Quantum Resistance

Certificate Authorities (CAs) play a critical role in establishing trust on the internet. They issue and manage digital certificates, which are used to verify the identity of websites and other online entities. The transition to quantum-safe cryptography will require CAs to adapt their infrastructure and processes.

Keyfactor.com emphasizes the evolving nature of digital trust management in the quantum era. CAs will need to issue and manage PQC-based certificates, which will require new algorithms, key generation techniques, and certificate formats. The Public Key Infrastructure (PKI) – the system that underlies digital certificates – will need to be updated to support PQC.

Updating the PKI is a complex undertaking. It requires coordinating changes across a vast network of CAs, browsers, operating systems, and other software. There are also challenges related to certificate revocation and key compromise. Ensuring interoperability between different PQC implementations is crucial.

The implications for website security (HTTPS) are significant. HTTPS relies on digital certificates to encrypt communication between web browsers and web servers. Once quantum computers become a threat, current HTTPS certificates will become vulnerable. The transition to PQC-based certificates is essential to maintain the security of online transactions and data.

What you should do in 2026

The time to prepare for the quantum threat is now, even if widespread deployment of PQC is still some years away. For tech experts, the next 12-18 months should focus on awareness, assessment, and planning. This isn’t about immediately replacing all existing cryptography, but about laying the groundwork for a smooth transition.

First, stay informed about the latest developments in PQC. Follow NIST’s standardization efforts and keep abreast of new research and best practices. Second, begin experimenting with PQC libraries and tools. Familiarize yourself with the new algorithms and their performance characteristics. Third, assess your organization’s risk. Identify which systems and data are most vulnerable to quantum attacks.

Fourth, advocate for PQC adoption within your organization. Educate stakeholders about the threat and the importance of preparing for it. Fifth, contribute to the community. Share your knowledge and experience with others. Participate in open-source projects and contribute to the development of PQC tools and libraries.

Finally, start inventorying your cryptographic assets. Understand where cryptography is used in your systems and applications. This is a crucial first step toward identifying and mitigating vulnerabilities.

  1. Stay informed about NIST standards.
  2. Test PQC libraries like liboqs in a sandbox to see how they hit your CPU.
  3. Assess your organization’s risk.
  4. Advocate for PQC adoption.
  5. Inventory cryptographic assets.

Quantum-Safe Cybersecurity FAQ