BusinessPostCorner.com
No Result
View All Result
Saturday, May 2, 2026
  • Home
  • Business
  • Finance
  • Accounting
  • Tax
  • Management
  • Marketing
  • Crypto News
  • Human Resources
BusinessPostCorner.com
  • Home
  • Business
  • Finance
  • Accounting
  • Tax
  • Management
  • Marketing
  • Crypto News
  • Human Resources
No Result
View All Result
BusinessPostCorner.com
No Result
View All Result

Will quantum computers disrupt critical infrastructure?

February 21, 2025
in Business
Reading Time: 8 mins read
A A
0
Will quantum computers disrupt critical infrastructure?
ShareShareShareShareShare
Joe Fay

Technology Reporter

Google An engineer works on part of a quantum computer.Google

Many organisations are developing quantum computers

Twenty five years ago computer programmers were racing to fix the millennium bug amidst fears that it would cause banking systems to crash and planes to fall out of the sky.

Much to everyone’s relief the impact turned out to be minimal.

Today, some fear there is a new critical threat to the world’s digital infrastructure. But this time, we cannot predict exactly when it will move from theory to reality, while the ubiquity of digital technology means fixing the problem is even more complicated.

That’s because the arrival of quantum computing means that many of the encryption algorithms that underpin and secure our hyperconnected world will be trivially easy to crack.

Quantum computing is radically different to the “classical” computing used today. Instead of processing binary bits which exist in one of two states – one or zero, on or off – quantum computing uses qubits, which can exist in multiple states, or superpositions.

“The reason why it’s so powerful is because you’re doing all those possible computations simultaneously,” Prof Nishanth Sastry, director of research for computer science at the University of Surrey, explains. This means it’s “much, much more efficient, much, much more powerful.”

This means quantum systems offer the possibility of solving key problems that are beyond classical computers, is areas such as medical research and materials science, or cracking particularly complex mathematical problems.

The problem is some of those same mathematical problems underpin the encryption algorithms that help to ensure trust, confidentiality and privacy across today’s computer networks.

Today’s computers would take thousands, even millions of years, to crack current encryption standards, such as RSA. A suitably powerful quantum computer could, theoretically, do the job in minutes.

This has implications for everything from electronic payments and ecommerce to satellite communications. “Anything that’s protected by something that’s vulnerable becomes fair game for people that have access to quantum relevant computers,” says Jon France, chief information security officer at non-profit cybersecurity organization ISC2.

Quantum computers capable of breaking asymmetric encryption are thought to be years away.

But progress is being made.

In December, Google said its new quantum chip incorporates key “breakthroughs” and “paves the way to a useful, large-scale quantum computer”.

Some estimates say a quantum device capable of breaking current encryption would require 10,000 qubits, while others say millions would be needed. Today’s systems have a few hundred at most.

But businesses and governments face a problem right now, as attackers could harvest encrypted information and decrypt it later when they do gain access to suitably powerful devices.

Google Close up of Google's quantum computer chip called WillowGoogle

Google’s says its new computer chip brings useful quantum computers closer

Greg Wetmore, vice president for software development at security firm Entrust, says if such devices could emerge in the next decade, technology leaders need to ask, “What data in your organization is valuable for that period of time?”

That could be national security information, personal data, strategic plans, and intellectual property and secrets – think of a soft drink company’s “secret” formula or the precise balance of herbs and spices in a fast food recipe.

Mr France adds, if quantum computing becomes widespread, the threat becomes more immediate with the encryption that protects our daily banking transactions, for example, potentially trivial to break.

The good news is that researchers and the technology industry have been working on solutions to the problem. In August, the National Institute of Standards and Technology in the US released three post quantum encryption standards.

The agency said these would “secure a wide range of electronic information, from confidential email messages to e-commerce transactions that propel the modern economy.” It is encouraging computer system administrators to transition to the new standards as soon as possible, and said a further 18 algorithms are being evaluated as backup standards.

Getty Images An aerial shots of the round ponds of a water treatment plant.Getty Images

Critical infrastructure like water treatment plants will need security upgrades

The problem is this means a massive upgrade process touching virtually all our technology infrastructure.

“If you think about the number of things out there with asymmetric encryption in them, it’s billions of things. We’re facing a really big change problem,” says Mr France.

Some digital infrastructure will be relatively easy to upgrade. Your browser, for example, will simply receive an update from the vendor says Mr France. “The challenge really comes in discrete devices and the internet of things (IOT),” he continues.

These might be hard to track down, and geographically inaccessible. Some equipment – legacy devices in critical national infrastructure such as water systems, for example – might not be powerful enough to handle the new encryption standards.

Mr Wetmore says the industry has managed encryption transitions in the past, but “It’s the sharper discontinuity that makes this threat more serious.”

So, it is trying to help customers build “crypto agility” by setting out policies now and using automation to identify and manage their cryptographic assets. “That’s the secret to making this transition an orderly one and not a chaotic one.”

And the challenge extends into space. Prof Sastry says many satellites – such as the Starlink network – should be relatively straightforward to upgrade, even if it means briefly taking an individual device offline temporarily.

“At any given point in time, especially with the LEO (low earth orbit) satellites, you’ve got 10 to 20 satellites above your head,” Prof Sastry says. “So, if one can’t serve you, well so what? There are nine others that can serve you.”

More challenging, he says, are “remote sensing” satellites, which include those used for geographical or intelligence purposes. These carry a lot more compute power on board and typically include some sort of secure computing module. A hardware upgrade effectively means replacing the whole device. However, says Prof Sastry, this is now less of a problem thanks to more frequent and lower cost satellite launches.

While the impact of the millennium bug might have been minimal in the first days of 2000, that’s because an immense amount of work had gone into fixing it ahead of a known deadline, says François Dupressoir, associate professor in cryptography at the University of Bristol.

By contrast, he adds, that it is not possible to predict when current encryption will become vulnerable.

“With cryptography,” says Mr Dupressoir “If somebody breaks your system, you will only know once they’ve got your data.”

Credit: Source link

ShareTweetSendPinShare
Previous Post

Meta slashes staff stock awards as group embarks on AI spending drive

Next Post

What does Jack Ma’s return to the public spotlight mean?

Next Post
What does Jack Ma’s return to the public spotlight mean?

What does Jack Ma's return to the public spotlight mean?

Maryland signs alternative CPA pathway bill into law

Maryland signs alternative CPA pathway bill into law

May 1, 2026
SoftBank plans to list new AI and robotics company in the US

SoftBank plans to list new AI and robotics company in the US

April 29, 2026
AICPA & CIMA roll out AI Skills Accelerator program

AICPA & CIMA roll out AI Skills Accelerator program

April 27, 2026
Emerging market stocks hit record high as Asian chipmakers surge

Emerging market stocks hit record high as Asian chipmakers surge

April 29, 2026
XRP Price Prediction: Ripple Conspiracy Theories and Broken NDAs

XRP Price Prediction: Ripple Conspiracy Theories and Broken NDAs

April 26, 2026
BNB Chain Activated Osaka Hard Fork: BNB Price to 0?

BNB Chain Activated Osaka Hard Fork: BNB Price to $700?

April 28, 2026
BusinessPostCorner.com

BusinessPostCorner.com is an online news portal that aims to share the latest news about following topics: Accounting, Tax, Business, Finance, Crypto, Management, Human resources and Marketing. Feel free to get in touch with us!

Recent News

Trump says a ‘final proposal’ for a taxpayer-funded takeover of Spirit Airlines is under review

Trump says a ‘final proposal’ for a taxpayer-funded takeover of Spirit Airlines is under review

May 1, 2026
Mortgages, jobs and energy bills

Mortgages, jobs and energy bills

May 1, 2026

Our Newsletter!

Loading
  • Contact Us
  • Privacy Policy
  • Terms of Use
  • DMCA

© 2023 businesspostcorner.com - All Rights Reserved!

No Result
View All Result
  • Home
  • Business
  • Finance
  • Accounting
  • Tax
  • Management
  • Marketing
  • Crypto News
  • Human Resources

© 2023 businesspostcorner.com - All Rights Reserved!