温馨提示:本站仅提供公开网络链接索引服务,不存储、不篡改任何第三方内容,所有内容版权归原作者所有
AI智能索引来源:http://www.pwc.com/gx/en/issues/cybersecurity/the-quantum-conundrum.html
点击访问原文链接

The Quantum Conundrum: How to prepare now | PwC Global

The Quantum Conundrum: How to prepare now | PwC Global Skip to content Skip to footer Industries Services Issues About us Careers More

Search Menu

Industries Industries See all industries Consumer markets Energy, utilities and resources Financial services Government and public sector Health industries Industrials and services Private equity and principal investors Technology, media and telecommunications Menu

Industries See all industries Menu

Industries Consumer markets Consumer goods Hospitality and leisure Retail Transportation and logistics Menu

Industries Energy, utilities and resources Chemicals Mining and metals Oil and gas Power and utilities Menu

Industries Financial services Asset and wealth management Banking and capital markets Insurance Real estate Menu

Industries Government and public sector Defence Education and skills Public safety, justice and security Menu

Industries Health industries Health services Pharmaceuticals and life sciences Menu

Industries Industrials and services Aerospace, defence and security Automotive Business services Engineering and construction Industrial manufacturing Space Menu

Industries Private equity and principal investors Capital projects and infrastructure Menu

Industries Technology, media and telecommunications Entertainment and media Semiconductors Technology Telecommunications Value in motion Industry edge Engine by Starling: From launching a bank to launching a software business Menu

Services Services See all services Alliances Artificial intelligence Audit and assurance services Reinvention Business transformation Consulting Crisis management Deals Economics Family business Forensics Legal business solutions Managed services Private Risk services Strategy Sustainability and climate change Tax Trust Workforce Menu

Services See all services Menu

Services Alliances Menu

Services Artificial intelligence Menu

Services Audit and assurance services Accounting advisory Capital markets Corporate reporting Financial audit IFRS Internal audit Next generation audit Risk assurance Sustainability assurance Menu

Services Reinvention Menu

Services Business transformation Menu

Services Consulting Cloud transformation Deals Finance transformation Forensics Front office transformation HR transformation Risk and regulation Strategy Technology Workforce Menu

Services Crisis management Menu

Services Deals Acquisitions Capital markets Corporate finance Deals strategy Joint ventures and alliances Legal business solutions M&A tax Managed services Performance and restructuring Menu

Services Economics Menu

Services Family business Menu

Services Forensics Menu

Services Legal business solutions Employment Entity governance and compliance International business reorganisations Mergers and acquisitions NewLaw Menu

Services Managed services Menu

Services Private Menu

Services Risk services Menu

Services Strategy Menu

Services Sustainability and climate change Climate risk, resilience and adaptation Energy solutions Impact management Legal and sustainability Net zero transformation Sustainability assurance Sustainable capital Sustainability reporting Tax and sustainability Menu

Services Tax Indirect taxes International tax services Mergers and acquisitions Sightline Tax code of conduct Tax controversy and dispute resolution Tax policy and administration Tax transformation Transfer pricing Menu

Services Trust Menu

Services Workforce Culture, leadership and change Employment law Employment tax and payroll HR transformation and technology Inclusion Organisational design People analytics and insights People in deals Retirement and pensions Reward and benefits Workforce risk Workforce strategy Climate risk, resilience and adaptation Business transformation Artificial intelligence Menu

Issues Issues See all issues AI, data, and tech Business transformation C-suite insights Climate and sustainability Cybersecurity Megatrends Reinvention Risk and regulation Trust Upskilling Workforce Menu

Issues See all issues Menu

Issues AI, data, and tech Menu

Issues Business transformation Menu

Issues C-suite insights Accelerating performance Global CEO Survey PwC at Davos strategy+business digital issue Take on Tomorrow: a strategy+business podcast The Leadership Agenda Menu

Issues Climate and sustainability Menu

Issues Cybersecurity Menu

Issues Megatrends Menu

Issues Reinvention Menu

Issues Risk and regulation Menu

Issues Trust Menu

Issues Upskilling Menu

Issues Workforce PwC’s 29th Global CEO Survey Value in motion Next Tech Agenda Menu

About us About us See more About Us Alumni Analyst relations Asia Pac Client case studies Code of Conduct Corporate sustainability Ethics and compliance Global Annual Review Human rights policy Inclusion Network leadership, governance, and structure Newsroom Office locations Policy and regulation Purpose, values, and behaviours Strategy& Menu

About us See more About Us Menu

About us Alumni Menu

About us Analyst relations Menu

About us Asia Pac Menu

About us Client case studies Menu

About us Code of Conduct Menu

About us Corporate sustainability Menu

About us Ethics and compliance Menu

About us Global Annual Review Menu

About us Human rights policy Menu

About us Inclusion Menu

About us Network leadership, governance, and structure Menu

About us Newsroom Menu

About us Office locations Menu

About us Policy and regulation Menu

About us Purpose, values, and behaviours Menu

About us Strategy& Value in motion Global Annual Review 2025 Menu

Careers Careers Find out more about careers Search for a job Menu

Careers Find out more about careers Menu

Careers Search for a job Global Annual Review Purpose, values, and behaviours Loading Results

View All Results

The Quantum Conundrum:

How to prepare now for Quantum’s challenges and opportunities Insight 4 minute read March 15, 2025 Share Copy Link Link Copied Close The line between science fiction and reality is wearing thin, thanks in large part to how AI has quickly and irrevocably changed the ways in which we work and live. Now with recent advancements in quantum computing, that line may soon become a double-edge sword for business leaders concerned about safeguarding their data. Rob Joyce, PwC US Cyber, Risk & Regulatory Senior Fellow, former Cybersecurity Director, National Security Agency, shares his thoughts on quantum computing.  Quantum computers – machines capable of exponential leaps in computational power beyond the “bits” of classical computing – could theoretically break today’s standard encryption methods, putting sensitive business, government, and other private personal data at risk. Yet quantum also promises greater security, using the same principles to confirm that no one can tamper with or intercept cryptographic keys without detection. 

This is the Quantum Conundrum – a paradox that forces us to balance both quantum’s benefits and risks with a thoughtful and measured approach. The challenge is deciding how to pivot from existing classical computing systems to ones that can stand up to these next-generation capabilities and safeguard sensitive data.  

With technology innovation moving faster than ever, there’s little time to waste. Businesses should prepare now for data security in a post-quantum world. 

What is quantum technology? Quantum computers work very differently from the classical computers we use today. Instead of processing information one step at a time, quantum computers can consider many possibilities at once, making them incredibly powerful for certain tasks. Imagine doing a jigsaw puzzle when every piece can be tried in every possible position and orientation simultaneously. This means a quantum computer could potentially solve more complex problems much faster than traditional computers.  

Although specialists already know how quantum computers could break current encryption, the technology isn't powerful enough – yet. But it’s coming – last December, Google’s 105-qubit (quantum bit) Willow processor performed a computation that the world’s most advanced supercomputer would have needed 10 septillion (10,000,000,000,000,000,000,000,000) years to achieve. 

Google’s 105-qubit (quantum bit) Willow processor performed a computation that the world’s most advanced supercomputer would have needed 10,000,000,000,000,000,000,000,000 years to achieve.

SourceGoogle Is quantum computing an immediate threat to data security? Quantum opens up exciting possibilities, including faster data analysis, breakthrough research, and more efficient supply chains. But it also sparks legitimate concerns. Many standard cryptographic techniques that protect financial transactions, personal records, and trade secrets could be rendered obsolete by a sufficiently advanced quantum machine.  

In October 2024, articles emerged claiming “Chinese scientists hack military-grade encryption on a quantum computer.” Spoiler alert: this wasn't quite the quantum computing apocalypse the first articles made it out to be. The researchers worked on a trivial problem with a relative of a quantum computer that isn't capable of running the necessary algorithms to break the encryption we rely upon.  

While the actual threat was far from substantial and did not represent any immediate danger to current encryption standards, it nevertheless serves as a valuable reminder that quantum’s timeline is unpredictable. Many specialists predict that quantum computers capable of threatening existing encryption could be less than a decade away – however, because data today can be stored and then decrypted in the future, all that cybercriminals need to do is wait until quantum technology catches up. The potential for this kind of “store now, decrypt later” attack is driving a worldwide race to develop and standardize post-quantum algorithms complex enough to withstand quantum decryption attempts.  

What does the government say about quantum? In May 2022, the White House issued a Presidential Executive Order directing the acceleration of the release of quantum-resistant encryption standards. It also required government departments and agencies to transition to quantum-resistant algorithms by 2035.  

The US Government ran a public competition to develop new encryption algorithms and set standards that can safeguard against future quantum threats. The next phase is to plan the upgrade path for software and systems to use this new protection. 

What key steps should I take to prepare? Assess your risk profile The first step on the road to quantum-resistant security is discovery and inventory. Where is public key cryptography used in your enterprise? Who maintains the software that has encryption and authentication routines? This is not just about the encryption that secures communication but also the authentication protocols that secure access to your systems. Quantum computers could also break protections (e.g., digital signatures) that confirm software is trusted and that documents haven't been altered.

Talk to your vendors and partners Are they tracking these concerns? Do they have a plan for a transition to quantum resistance? Ask your security vendors, consultants, and industry partners about their specific steps towards quantum resistance. And keep in mind that this is an industry-wide issue. The external ecosystem such as cloud and network providers have skin in the game and should also be dealing with this risk.

Budget for the quantum transition You will need to update your software, systems, and services to use quantum-resistant algorithms. Budgeting now can prevent future risks and enable a smoother transition, similar to the successful Y2K preparations.

Stay informed and educate your team Encourage your IT and security teams to monitor developments in quantum computing. Share updates across leadership so decisions can be made with the right context.

Address your crypto agility This is the ability to update your cryptography as standards emerge and evolve. By embracing crypto agility, systems can remain secure and compliant in the face of advancements in both classical and quantum cryptography.

Collaborate and communicate Collaboration between business leaders, policymakers, and cybersecurity specialists is key. Regularly communicate the roadmap to stakeholders so there’s clarity and buy-in when it’s time to transition.

Turn the Quantum Conundrum to your advantage The interest in developing quantum computers is real. Corporate private data, such as financial information, personal communications, sensitive business records, defence information, and intellectual property may be threatened by a capable quantum computer. More importantly, the keys to critical infrastructure access are also at risk. Recent nation state intrusions into energy grids, water treatment facilities, and large-scale communications systems demonstrated that the threat will be broad.  

As with any monumental technology shift, quantum computing demands foresight, adaptability, and collaboration. When we stop thinking of quantum as purely a threat or purely a solution, we can better prioritize investments, start testing post-quantum encryption, and stay close to research developments so we’re better prepared for the post-quantum future.  

Sources Chinese Scientists Hack Military-Grade Encryption on a Quantum Computer Executive Order on Enhancing the National Quantum Initiative Advisory Committee White House to require post-quantum encryption plans from agencies How we can help Learn more Contact Sean Joyce

Partner, Global Cybersecurity & Privacy Leader, PwC United States

Email View More Follow us PwC office locations Site map Contact us © 2017 - 2026 PwC. All rights reserved. PwC refers to the PwC network and/or one or more of its member firms, each of which is a separate legal entity. Please see http://pwc.zhutiblog.com/com/structure for further details. This content is for general information purposes only, and should not be used as a substitute for consultation with professional advisors.

Legal notices Privacy Cookie policy Legal disclaimer Terms and conditions

智能索引记录