Threats, opportunities and the need for post-quantum cryptography

Issue 1 2025 AI & Data Analytics, Infrastructure


Carrie Peter

The first quantum computer was created almost three decades ago, in 1998. Yet the topic still seems to illicit images of ‘Back to the Future’ for most. While its applications are still unknown to many, this advanced field combines computer science, physics, and mathematics to deliver solutions the world has been trying to find for aeons – and those it does not yet know it needs.

Rivalling classical computers and coming out on top, quantum computing uses quantum mechanics to find fast and complete answers to complex problems. According to Carrie Peter, Managing Director at Impression Signatures and Advocacy Committee Vice-Chair at the Cloud Signature Consortium, “Although it sounds futuristic, quantum computing is advancing at a rapid rate – certainly faster than expected. Today, many countries already possess their own quantum computers, with quantum computing even being available as a SaaS solution.”

As is the case with most technological developments, however, the opportunities offered by quantum computing are equalled by the threats this advanced computer science introduces. “The evolution of quantum computing puts the security of any data available in the digital space in jeopardy,” warns Peter.

IBM recently published an article about quantum computing noting that “quantum technology will soon be able to solve complex problems that supercomputers can’t solve, or can’t solve fast enough.” But what if the problem it’s trying to solve, is breaking through security firewalls or encryptions?

“This poses a massive threat to encryption as a quantum computer could decrypt traditional encryption in a fraction of the time. While this surely won’t halt the evolution of the quantum computer, it does mean that security must be bolstered,” adds Peter. Thankfully, global standards and security bodies have been hard at work developing and testing a new set of post-quantum encryption algorithms, with the first three standards being released on 13 August 2024.

As published by the National Institute of Standards and Technology (NIST), these new standards include the Federal Information Processing Standard (FIPS) 203, intended as the primary standard for general encryption; FIPS 204, intended as the primary standard for protecting digital signatures; and FIPS 205, also designed for digital signatures and employing the Sphincs+ algorithm.

Prepare for the risks of quantum computing

In parallel, as standards and security measures are fortified against the threats of quantum computing, it is essential that organisations begin paying attention to post-quantum cryptography (PQC). “Somewhat short-sightedly, many business leaders are countering the argument for PQC with the misguided belief that we are ‘years’ away from commercially available quantum computers,” says Peter. “The reality is that these computers are already being miniaturised and will likely come to market much sooner than expected.”

Additionally, putting PQC measures in place now will protect data from nefarious strategies such as Store-Now Decrypt-Later (SNDL). “This cyber threat entails storing large amounts of encrypted data now, in an effort to decode and use it later, once quantum computers become more widely available.”

In a recent blog entry, HP put it like this, “A sufficiently powerful quantum computer will break the cryptography we rely on in our digital lives. An attacker can intercept and store encrypted data today, and when quantum computers become feasible, the attacker could decrypt the stored data.”

Lastly, Peter motivated that companies need to start thinking about PQC now, because some devices (such as cars) that are being produced today will most certainly be on the road when quantum computing is proliferated. “In 2023, the US government already put out a mandate that companies must transition onto PQC as soon as possible. Now, with the release of the new standards, it is critical to take the need to transition onto PQC seriously.”

Of course, with many global standards being incorporated into these algorithms, any standards-based organisation or solution (such as digital signature providers) will be forced to adopt and comply with PQC. This means for users of these solutions, the switch to the more secure standard will be seamless.

However, it is important for companies to note that encryption is only as good as the authentication they apply while using encryption. “For organisations to guarantee that they are, in fact, secure, they must ensure appropriate access management, authentication, and zero trust within their organisations.”




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

SA businesses embrace GenAI, but strategy and skills lag
News & Events AI & Data Analytics
South African enterprises are rapidly integrating Generative AI (GenAI) into their operations, but most are doing so without formal strategies, dedicated leadership, or the infrastructure required to maximise value and minimise risk.

Read more...
Eagle Eye Precision Person & Vehicle Detection
Surveillance Products & Solutions AI & Data Analytics
Eagle Eye’s new Precision Person & Vehicle Detection feature detects people and vehicles at long distances with high accuracy and is especially designed for customers who actively monitor for intruders

Read more...
Can AI improve operational challenges?
AI & Data Analytics Industrial (Industry)
AI offers local manufacturers an answer to a growing list of operational challenges. The increasing sophistication of AI solutions could not come at a better time for South African manufacturers, who are grappling with declining sales and the uncertainty of global trade.

Read more...
Managing stock efficiently and cost-effectively
Asset Management Infrastructure Logistics (Industry)
Rina Redelinghuys, customer services executive at Cquential, a member of the Argility Technology Group, examines stock management across various industries, including retail, fast-moving consumer goods, food and dairy, automotive, apparel, industrial, accessories, paint and chemicals, and pharmaceuticals.

Read more...
Upgrade your PCs to improve security
Information Security Infrastructure
Truly secure technology today must be designed to detect and address unusual activity as it happens, wherever it happens, right down to the BIOS and silicon levels.

Read more...
Hikvision launches AcuSeek NVR
Surveillance Products & Solutions AI & Data Analytics
By integrating natural language interaction, Hikvision’s AcuSeek NVR enables precise video and image retrieval within seconds, marking a transformative milestone for the security industry's advance into intelligent and efficient applications.

Read more...
Open source code can also be open risk
Information Security Infrastructure
Software development has changed significantly over the years, and today, open-source code increasingly forms the foundation of modern applications, with surveys indicating that 60 – 90% of the average application's code base consists of open-source components.

Read more...
Fastest PCIe Gen 5.0 NVMe SSD
Products & Solutions Infrastructure
Sandisk has unveiled the WD_BLACK SN8100 NVMe SSD with PCIe Gen 5.0 technology, an internal SSD delivering speeds up to 14 900 MB/s and capacities up to 4 TB, with 8 TB solutions available soon.

Read more...
Unified storage solution
Products & Solutions Infrastructure
CASA Software has announced the local availability of Nexsan’s upgraded unified storage solution, Unity NV4000, which is ideal for mixed workloads, from virtualisation and video surveillance to secure backup and recovery.

Read more...
Suprema unveils BioStar Air
Suprema neaMetrics News & Events Access Control & Identity Management Infrastructure
Suprema launches BioStar Air, the first cloud-based access control platform designed to natively support biometric authentication and feature true zero-on-premise architecture. BioStar Air simplifies deployment and scales effortlessly to secure SMBs, multi-branch companies, and mixed-use buildings.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.