IBM says quantum computing could be a big risk to the future of cryptography

One report (opens in a new tab) from IBM has stated quantum computing poses an “existential risk” to current cryptographic protocols that secure our most sensitive data, such as digital transactions.
Protocols such as public-key cryptography (PKC) are said to be vulnerable “once quantum decryption solutions are viable,” which IBM calls a “harvest now, decrypt later” tactic.
“Even if some data is irrelevant or rapidly loses value to hackers, data related to national security, infrastructure, medical records, intellectual capital, etc. can stay the same or increase in value over time,” the company notes.
Quantum Computing Risks
The report highlights that not only may our data be at risk, but potentially our lives as well. An increasingly intelligent world, with cars and planes able to communicate with each other, also uses PKC to protect communication networks, which could be at risk from violence triggered by quantum computing .
IBM hopes quantum computing will “impact computing strategies across industries” by the end of the decade, however, while it may still be in the spotlight for now, reports of Its threat to cryptography dates back many years.
In 2016, the US Institute of Standards and Technology (opens in a new tab) began working on public-key quantum secure cryptographic algorithms, with 82 proposals narrowed down to four.
IBM is keen to advertise its involvement in the development of two of the main algorithms: CRYSTALS-Kyber (for public key encryption and key establishment) and CRYSTALS-Dilithium (for digital signatures). Also selected for digital signature algorithms are FALCON and SPHINCS+.
Going forward, IBM argues that cooperation in setting new standards is critical to protecting our online activity as the quantum computing movement continues to grow.