What is Quantum computing?
Quantum computers are the next generation of computing machines. They use methods that are extremely different to conventional computers, making them significantly faster, more powerful, and more secure than today’s machines. While they may soon outperform even the fastest supercomputers currently in use (Googolplex), early suggestions show that these systems could be used for cybersecurity purposes.
Quantum computing uses quantum-mechanical phenomena, such as superposition and entanglement, to perform operations on data. Quantum computers are based on the principles of quantum mechanics, which is the science that describes the behavior of very small particles, such as atoms and subatomic particles. One of the unique properties of quantum computers is that they can be in multiple states or configurations at the same time, known as superposition. This allows them to perform many calculations in parallel, which means they have the potential to be much faster than classical computers for certain types of problems.
Quantum computers also use a different type of data unit called a qubit, which can represent both a 0 and a 1 at the same time. This allows them to perform multiple calculations simultaneously, which again makes them much faster than classical computers for certain types of problems.
Quantum computers are still in the early stages of development and are not yet widely available. However, they have the potential to revolutionize fields such as drug discovery, weather prediction, and financial modeling, by enabling the solution of problems that are currently too complex for classical computers to tackle.

Why is quantum Computing a potential cybersecurity risk?
Quantum computing combines the capabilities of classical computing with quantum mechanics, a branch of physics that describes the basic constituents of matter and forces. One potential use of such computers is to help cybersecurity professionals defend against global threats. Two examples of this are post-quantum cryptography and quantum-resistant cryptography. This means they have the potential to break many of the cryptographic algorithms that are used to secure online communications and protect sensitive data. This is because they are able to perform certain calculations much faster than classical computers, and could potentially be used to factorize large numbers or solve other mathematical problems that are currently considered to be computationally infeasible.
If an attacker were able to access a quantum computer, they could potentially use it to break the encryption that is used to protect sensitive data, such as financial transactions, medical records, and government communications. This could lead to widespread security breaches and the compromise of sensitive information. To personalize the risk potentially it could expose your finances, identity or other personal data online if implemented properly.
There are ongoing efforts to develop new cryptographic algorithms that are resistant to attacks by quantum computers, but it is not yet clear how successful these efforts will be. In the meantime, it is important for organizations to be aware of the potential risks posed by quantum computing and to take steps to protect themselves as much as possible. A “nuts and bolts” level and example of where quantum computers could create risk is based on what is known as Shor’s Algorithm – This is used for factoring numbers, encryption is based on using prime and semi-prime numbers as they basis for how they work. Shor’s reduces the complexity from exponential to polynomial, which means a Quantum Computer can reduce the time to crack a very secure (by today’s standard) encryption swiftly. So the tangible risk here is a quantum computer can be used to break encryption codes and make it easier for hackers to steal valuable information,
How can you mitigate risks of quantum computing via cybersecurity?
A new approach to cybersecurity is emerging: quantum computing. Quantum computers use quantum mechanics to perform certain operations that remain difficult to hack or even reverse-engineer, even if the attacker has full access to the target system in its entirety. This makes it very hard for hackers to crack or tamper with systems protected by these quantum computers. These defenses are being investigated today by engineers and computer scientists. Short term there are several things you can do to try to stay ahead of quantum risk.
- Stay informed: Stay up to date on the latest developments in quantum computing and the potential risks it poses to cybersecurity. This will help you understand the potential impact on your organization and how you can prepare.
- Use stronger encryption: One way to protect against quantum computing attacks is to use stronger encryption algorithms that are resistant to quantum attacks. For example, algorithms such as post-quantum cryptography (PQC) are specifically designed to be resistant to attacks by quantum computers.
- Adopt a “quantum-safe” strategy: Develop a long-term strategy for transitioning to quantum-safe cryptographic algorithms and protocols. This may involve updating your infrastructure, applications, and processes to use quantum-resistant algorithms.
- Use multiple layers of security: Don’t rely on a single layer of security to protect your data. Instead, use multiple layers of security, such as firewalls, intrusion detection systems, and authentication protocols, to provide multiple points of defense against attacks.
- Regularly update your systems: Make sure to keep your systems and software up to date with the latest patches and updates. This can help to protect against vulnerabilities that could be exploited by attackers.
Overall, it is important to be proactive in addressing the potential risks posed by quantum computing to cybersecurity. By staying informed, using stronger encryption, adopting a “quantum-safe” strategy, using multiple layers of security, and regularly updating your systems, you can help to mitigate these risks and protect your organization’s sensitive data.
It is very important to note at this time only nation states, giant corporations and large universities are advancing quantum computing however it’s logical to look at all other technology advancement sin the last century and expect this will quickly be technology which becomes far less expensive, complex.
For Further Reading
Cybersecurity by the National Institute of Standards and Technology (NIST): https://www.nist.gov/cybersecurity
“Cyberspace Solarium Commission” by the Institute for Critical Infrastructure Technology (ICIT): https://icitech.org/wp-content/uploads/2020/03/CSC-Final-Report.pdf