Cloud quantum computing: A trillion-dollar opportunity with dangerous hidden risks

Share This Post

[ad_1]

Join the event trusted by enterprise leaders for nearly two decades. VB Transform brings together the people building real enterprise AI strategy. Learn more


Quantum computing (QC) brings with it a mix of groundbreaking possibilities and significant risks. Major tech players like IBM, Google, Microsoft and Amazon have already rolled out commercial QC cloud services, while specialized firms like Quantinuum and PsiQuantum have quickly achieved unicorn status. Experts predict that the global QC market could add more than $1 trillion to the world’s economy between 2025 and 2035. However, can we say with certainty that the benefits outweigh the risks?

On the one hand, these cutting-edge systems hold the promise of revolutionizing areas such as drug discovery, climate modeling, AI and maybe even artificial general intelligence (AGI) development. On the other hand, they also introduce serious cybersecurity challenges that should be addressed right now, even though fully functional quantum computers capable of breaking today’s encryption standards are still several years away.

Understanding the QC threat landscape

The main cybersecurity fear tied to QC is its potential to break encryption algorithms that have been deemed unbreakable. A survey by KPMG revealed that around 78% of U.S. companies and 60% of Canadian companies anticipate that quantum computers will become mainstream by 2030. More alarmingly, 73% of U.S. respondents and 60% of Canadian respondents believe it’s just a matter of time before cybercriminals start using QC to undermine current security measures.

Modern encryption methods rely heavily on mathematical problems that are virtually unsolvable by classical computers, at least within a reasonable timeframe. For instance, factoring the large prime numbers used in RSA encryption would take such a computer around 300 trillion years. However, with Shor’s algorithm (developed in 1994 to help quantum computers factor large numbers quickly), a sufficiently powerful quantum computer could potentially solve this exponentially faster.

Grover’s algorithm, designed for unstructured search, is a real game-changer when it comes to symmetric encryption methods, as it effectively cuts their security strength in half. For instance, AES-128 encryption would only offer the same level of security as a 64-bit system, leaving it open to quantum attacks. This situation calls for a push towards more robust encryption standards, such as AES-256, which can stand firm against potential quantum threats in the near future.

Harvesting now, decrypting later

The most concerning is the “harvest now, decrypt later” (HNDL) attack strategy, which involves adversaries gathering encrypted data today, only to decrypt it once QC technology becomes sufficiently advanced. It poses a significant risk to data that holds long-term value, like health records, financial details, classified government documents and military intelligence.

Given the potentially dire consequences of HNDL attacks, many organizations responsible for vital systems around the world must adopt “crypto agility.” This means they should be ready to swiftly swap out cryptographic algorithms and implementations whenever new vulnerabilities come to light. This concern is also reflected in the U.S. National Security Memorandum on Promoting U.S. Leadership in Quantum Computing While Mitigating Risk to Vulnerable Cryptographic Systems, which specifically points out this threat and calls for proactive measures to counter it.

The threat timeline

When it comes to predicting the timeline for quantum threats, expert opinions are all over the map. A recent report from MITRE suggests that we probably won’t see a quantum computer powerful enough to crack RSA-2048 encryption until around 2055 to 2060, based on the current trends in quantum volume – a metric used to compare the quality of different quantum computers. 

At the same time, some experts are feeling more optimistic. They believe that recent breakthroughs in quantum error correction and algorithm design could speed things up, possibly allowing for quantum decryption capabilities as early as 2035. For instance, researchers Jaime Sevilla and Jess Riedel released a report in late 2020, expressing a 90% confidence that RSA-2048 could be factored before 2060. 

While the exact timeline is still up in the air, one thing is clear: Experts agree that organizations need to start preparing right away, no matter when the quantum threat actually arrives.

Quantum machine learning – the ultimate black box?

Apart from the questionable crypto agility of today’s organizations, security researchers and futurists have been also worrying about the seemingly inevitable future merging of AI and QS. Quantum technology has the potential to supercharge AI development because it can handle complex calculations at lightning speed. It can play a crucial role in reaching AGI, as today’s AI systems need trillions of parameters to become smarter, which leads to some serious computational hurdles. However, this synergy also opens up scenarios that might be beyond our ability to predict. 

You don’t need AGI to grasp the essence of the problem. Imagine if quantum computing were to be integrated into machine learning (ML). We could be looking at what experts call the ultimate black box problem. Deep neural networks (DNNs) are already known for being quite opaque, with hidden layers that even their creators struggle to interpret. While tools for understanding how classical neural networks make decisions already exist, quantum ML would lead to a more confusing situation.

The root of the issue lies in the very nature of QC, namely the fact that it uses superposition, entanglement and interference to process information in ways that don’t have any classical equivalents. When these quantum features are applied to ML algorithms, the models that emerge might involve processes that are tough to translate into reasoning that humans can grasp. This raises some rather obvious concerns for vital areas like healthcare, finance and autonomous systems, where understanding AI decisions is crucial for safety and compliance.

Will post-quantum cryptography be enough?

To tackle the rising threats posed by QC, the U.S. National Institute of Standards and Technology (NIST) kicked off its Post-Quantum Cryptography Standardization project back in 2016. This involved conducting a thorough review of 69 candidate algorithms from cryptographers around the globe. Upon completing the review, NIST chose several promising methods that rely on structured lattices and hash functions. These are mathematical challenges thought capable of withstanding attacks from both classical and quantum computers. 

In 2024, NIST rolled out detailed post-quantum cryptographic standards, and major tech companies have been taking steps to implement early protections ever since. For instance, Apple unveiled PQ3 — a post-quantum protocol — for its iMessage platform, aimed at safeguarding against advanced quantum attacks. On a similar note, Google has been experimenting with post-quantum algorithms in Chrome since 2016 and is steadily integrating them into its various services. 

Meanwhile, Microsoft is making strides in enhancing qubit error correction without disturbing the quantum environment, marking a significant leap forward in the reliability of QC. For instance, earlier this year, the company announced that it has created a “new state of matter” (one in addition to solid, liquid and gas) dubbed “topological qubit,” which could lead to fully realized QCs in years, rather than decades.

Key transition challenges 

Still, the shift to post-quantum cryptography comes with a host of challenges that must be tackled head-on:

  • The implementation timeframe: U.S. officials are predicting it could take anywhere from 10 to 15 years to roll out new cryptographic standards across all systems. This is especially tricky for hardware that’s located in hard-to-reach places like satellites, vehicles and ATMs. 
  • The performance impact: Post-quantum encryption usually demands larger key sizes and more complex mathematical operations, which could slow down both encryption and decryption processes. 
  • A shortage of technical expertise. To successfully integrate quantum-resistant cryptography into existing systems, organizations need highly skilled IT professionals who are well-versed in both classical and quantum concepts. 
  • Vulnerability discovery: Even the most promising post-quantum algorithms might have hidden weaknesses, as we’ve seen with the NIST-selected CRYSTALS-Kyber algorithm. 
  • Supply chain concerns: Essential quantum components, like cryocoolers and specialized lasers, could be affected by geopolitical tensions and supply disruptions.

Last but certainly not least, being tech-savvy is going to be crucial in the quantum era. As companies rush to adopt post-quantum cryptography, it’s important to remember that encryption alone won’t shield them from employees who click on harmful links, open dubious email attachments or misuse their access to data. 

A recent example is when Microsoft found two applications that unintentionally revealed their private encryption keys — while the underlying math was solid, human error made that protection ineffective. Mistakes in implementation often compromise systems that are theoretically secure. 

Preparing for the quantum future

Organizations need to take a few important steps to get ready for the challenges posed by quantum security threats. Here’s what they should do, in very broad terms: 

  • Conduct a cryptographic inventory — take stock of all systems that use encryption and might be at risk from quantum attacks. 
  • Assess the lifetime value of data — figure out which pieces of information need long-term protection, and prioritize upgrading those systems. 
  • Develop migration timelines — set up realistic schedules for moving to post-quantum cryptography across all systems. 
  • Allocate appropriate resources — make sure to budget for the significant costs that come with implementing quantum-resistant security measures. 
  • Enhance monitoring capabilities – put systems in place to spot potential HNDL attacks. 

Michele Mosca has come up with a theorem to help organizations plan for quantum security: If X (the time data needs to stay secure) plus Y (the time it takes to upgrade cryptographic systems) is greater than Z (the time until quantum computers can crack current encryption), organizations must take action right away.

Conclusion

We’re stepping into an era of quantum computing that brings with it some serious cybersecurity challenges, and we all need to act fast, even if we’re not entirely sure when these challenges will fully materialize. It might be decades before we see quantum computers that can break current encryption, but the risks of inaction are simply too great. 

Vivek Wadhwa of Foreign Policy magazine puts it bluntly: “The world’s failure to rein in AI — or rather, the crude technologies masquerading as such — should serve to be a profound warning. There is an even more powerful emerging technology with the potential to wreak havoc, especially if it is combined with AI: Quantum computing.” 

To get ahead of this technological wave, organizations should start implementing post-quantum cryptography, keep an eye on adversarial quantum programs and secure quantum supply chain. It’s crucial to prepare now — before quantum computers suddenly make our current security measures entirely obsolete.

Julius Černiauskas is CEO at Oxylabs.


[ad_2]
Source link

Related Posts

User-Friendly IPTV Player for Daily Streaming Needs

In today’s fast-paced digital lifestyle, viewers want quick, smooth,...

Mobile Crane Hire for Roofing Projects: Enhancing Safety and Efficiency

When it comes to large-scale roofing projects, the logistics...

Compact Mobile Crane Hire for Tight Spaces

When working on construction projects in urban areas, narrow...

Προγνωστικά Οβερ Σήμερα: Αγώνες με Στατιστική Υπεροχή

Τα προγνωστικά οβερ σήμερα αποτελούν βασικό εργαλείο για τους...

Private Disposable Phone Numbers for Business and Personal Use

In today’s fast-paced digital world, maintaining privacy while staying...

Receive SMS Free Anytime, Anywhere

In the modern digital landscape, phone numbers have become...
- Advertisement -spot_img
Slot Gacor Slot777slot mahjongslot mahjongjudi bola onlinesabung ayam onlinejudi bola onlinelive casino onlineslot danaslot thailandsabung ayam onlinejudi bola onlinesitus live casino onlineslot mahjong waysbandar togel onlinejudi bolasabung ayam onlinejudi bolaSABUNG AYAM ONLINESABUNG AYAM ONLINEJUDI BOLA ONLINESABUNG AYAM ONLINEjudi bola onlineslot mahjong wayslive casino onlinejudi bola onlinejudi bola onlinesabung ayam onlinejudi bola onlinemahjong wayssabung ayam onlinesbobet88slot mahjongsabung ayam onlinesbobet mix parlayslot777judi bola onlinesabung ayam onlinesabung ayam onlinejudi bola onlinelive casino onlineslot mahjong waysjuara303juara303juara303juara303juara303juara303juara303juara303SV388Mix ParlayBLACKJACKSLOT777Sabung Ayam OnlineBandar Judi BolaAgen Sicbo Online
agen sabung ayamslot mahjong gacorsabung ayam onlinejudi bola onlinelive casino onlineslot mahjongsabung ayam onlinejudi bola onlinelive casino onlineslot mahjongslot mahjongsabung ayam onlinescatter hitamlive casino onlinemix parlaysabung ayam onlinelive casinomahjong waysmix parlaysabung ayam onlinelive casinomahjong waysmix parlaySBOBETSBOBETCASINO ONLINESBOBETSBOBET88SABUNG AYAM ONLINESBOBETagen judi bolalive casino onlinesabung ayam onlinejudi bola sbobetsabung ayam onlineSabung Ayam OnlineJudi Bola OnlineAgen Live Casino OnlineMahjong Ways 2Sabung Ayam OnlineJudi Bola OnlineAgen Live Casino OnlineMahjong Ways 2Sabung Ayam OnlineJudi Bola OnlineAgen Live Casino OnlineMahjong Ways 2slot gacorjudi bolamix parlayjudi bolasv388SABUNG AYAM ONLINELIVE CASINO ONLINEJUDI BOLAMAHJONG WAYSSLOT MAHJONGJUDI BOLA ONLINELIVE CASINO ONLINESABUNG AYAM ONLINE
SABUNG AYAM ONLINESABUNG AYAM ONLINEJUDI BOLA ONLINEJUDI BOLA ONLINESABUNG AYAM ONLINESABUNG AYAM ONLINESABUNG AYAM ONLINESABUNG AYAM ONLINEjudi bola onlinesabung ayam onlinelive casino onlinesitus toto 4djudi bola onlinejudi bola onlinesabung ayam onlinelive casino onlinejudi bola onlinemix parlaysbobet88sv388sbobet mix parlayws168sbobet88sv388sv388sbobet88sabung ayam onlinejudi bola onlinesabung ayam onlinesbobet mix parlaysabung ayam onlinejudi bola onlineslot gacorsabung ayam onlinejudi bola onlinelive casino onlineslot mahjong waysjuara303juara303juara303juara303juara303juara303juara303juara303juara303juara303juara303juara303juara303juara303juara303juara303SV388Mix ParlayLive Casino OnlineSitus Slot GacorSV388SBOBET WAPBlackjackPragmatic PlaySV388Judi Bola OnlineBlackjackKakek ZeusSV388Mix ParlayAgen BlackjackSlot Gacor Onlinesabung ayam onlinejudi bola onlinesabung ayam onlinejudi bola onlinejudi bola onlinejudi bola onlinejudi bola onlinesabung ayam onlinejudi bola onlineslot mahjong wayssabung ayam onlinejudi bolaslot mahjonglive casino onlinesabung ayam onlinejudi bola onlineslot mahjong gacorsitus toto togel 4Dsabung ayam onlinesitus toto togel 4Dsitus live casinojudi bola onlinesitus slot mahjongjudi bolasabung ayam onlinesabung ayam onlinemahjong wayssabung ayam onlinejudi bolasabung ayam onlinejudi bola
judi bola onlinejudi bola onlinejudi bola onlinejudi bola onlineJUDI BOLA ONLINESBOBET88JUDI BOLA ONLINEJUDI BOLA ONLINESV388Judi Bola OnlineBlackjackKakek ZeusSV388SBOBET WAPAgen BlackjackSlot Gacor Onlinejuara303juara303juara303juara303juara303juara303juara303juara303judi bola onlinejudi bola onlinejudi bola onlinesabung ayam onlinejudi bolasabung ayam onlinesabung ayam onlinejudi bola onlinesitus live casino onlineslot mahjong wayssabung ayam onlinesitus live casinojudi bola onlinedexel
Slot Mahjong Waysslot danaslot danaslot danasabung ayam onlinesabung ayam onlineJUDI BOLA ONLINESV388Mix ParlayAgen Casino OnlineSLOT777Sabung Ayam OnlineAgen Judi BolaLive Casino Onlinesabung ayam onlinesabung ayam onlinejudi bola onlineslot mahjong wayssabung ayam onlinejudi bola onlinesitus live casino onlineagen togel onlineSabung Ayam OnlineJudi Bola OnlineSlot MahjongBandar togelSabung Ayam OnlineJudi Bola Onlinejudi bola onlinejudi bola onlinesabung ayam onlinelive casino onlineJUDI BOLA ONLINESBOBET88JUDI BOLA ONLINEmix parlaymix parlaylive casinosabung ayam onlinemix parlayslot danaslot mahjongslot mahjongjudi bolaMAHJONG WAYS 2SABUNG AYAM ONLINELIVE CASINO ONLINESABUNG AYAM ONLINESBOBETLIVE CASINO ONLINESLOT MAHJONG WAYSSABUNG AYAM ONLINEMIX PARLAYSABUNG AYAM ONLINESABUNG AYAM ONLINEWALA MERONWALA MERONSITUS SABUNG AYAMSITUS SABUNG AYAMjudi bola terpercayaSabung Ayam Onlinemix parlaySabung Ayam OnlineZeus Slot GacorSitus Judi BolaSabung Ayam Onlinesitus sabung ayamSlot MahjongSV388SBOBET88live casino onlineslot mahjong gacorSV388SBOBET88live casino onlineslot mahjong gacorSabung Ayam OnlineJudi Bola OnlineCasino OnlineMahjong Ways 2Sabung Ayam OnlineJudi Bola OnlineLive Casino OnlineMahjong Ways 2judi bolacasino onlinesv388sabung ayam onlinejudi bola onlineagen live casino onlinemahjong waysLIVE CASINOJUDI BOLA ONLINESABUNG AYAM ONLINESITUS BOLASV388LIVE CASINO ONLINESLOT QRISSABUNG AYAM ONLINEMIX PARLAYMIX PARLAYJUDI BOLA ONLINESLOT MAHJONG
Mahjong Ways 2mahjong ways 2indojawa88daftar dan login wahanabetCapWorks Official ContactAynsley Official SitedexelHarifuku Clinic Official AccessNusa Islands Bali Official PackagesTrinidad and Tobago Pilots’ Association Official About PageNusa Islands Bali Official ContactCapworks Official SiteTech With Mike First Official SiteSahabat Tiopan Official SiteOcean E Soft Official SiteCang Vu Hai Phong Official SiteThe Flat Official SiteTop Dawg Tavern Official SiteDuhoc Interlink Official SiteRatiohead Official SiteMAN Surabaya E-Learning Official SiteShaker Group Official SiteTakaKawa Shoten Official SiteBrydan Solutions Official SiteConcursos Rodin Official SiteConmou Official SiteCareer Wings Official SiteMontero Espinosa Official SiteBDF Ventura Official SiteAkura Official SiteNamulanda Technical Institute Official Sitemenu home roasted coffeetosayama academy workshopjudi bola onlineContactez le Monaco Rugby Sevens - Club Professionnel à 7Virtual Eco Museum Official Event 2025DRT Seitai Official Contacta leading company in UWB technology development