CIOReview
| |FEBRUARY 20258CIOReviewIN MY OPINIONQuantum computing holds the potential to solve immense challenges facing humanity, from global logistics forecasting and synthesizing new materials via chemistry simulations, to exponentially expanding the training capabilities of artificial intelligence models. While the reduction in computational effort and time savings offered by quantum computing is highly promising, a new frontier of cybersecurity risk accompanies this emergent technology. Where organizations once felt safe and secure in the cryptographic protections offered by contemporary encryption algorithms, they must now wonder how long their protection strategy will remain intact--both for on-premise data and data presently encrypted using at-risk algorithms but is in the hands of cyber threat actors. This article will briefly explore some of the cybersecurity considerations businesses may contend with as 2025 unfolds and as Quantum Computing as a Service increases in both short-term adoption and long-term maturity. Recent Uses of Quantum Computers in a Cybersecurity ContextWhile the University of Shanghai in China has recently claimed to have compromised a 50-bit RSA key in early 2024, this is a significant stretch toward compromising a 2048-bit RSA key. RSA publicly challenged these findings, providing linked resources to the United States National Institutes of Standards and Technology (NIST), which stated contemporary public key encryption methods are expected to remain secure up to 2030. Businesses should familiarize themselves with the following quantum-resistant encryption algorithms, digital signature, and hashing standards, and create a roadmap to implement these standards sooner rather than later:· FIPS 203: Module-Lattice-Based Key-Encapsulation Mechanism Standard· FIPS 204: Module-Lattice-Based Digital Signature Standard· FIPS 205: Stateless Hash-Based Digital Signature StandardFIPS 203, FIPS 204, and FIPS 205 introduce advanced cryptographic standards designed to enhance key establishment and digital signature security in the face of emerging threats like quantum computing. FIPS 203 specifies the Module-Lattice-Based Key-Encapsulation Mechanism (ML-KEM), a secure key establishment scheme derived from the CRYSTALS-KYBER NAVIGATING THE QUANTUM REALM IN 2025By Adam Kohnke, Information Security Manager, Charter Next GenerationAdam Kohnke
< Page 7 | Page 9 >