{"id":69830,"date":"2025-08-15T09:01:07","date_gmt":"2025-08-15T09:01:07","guid":{"rendered":"https:\/\/www.newsbeep.com\/au\/69830\/"},"modified":"2025-08-15T09:01:07","modified_gmt":"2025-08-15T09:01:07","slug":"three-minute-explainer-on-q-day-raconteur","status":"publish","type":"post","link":"https:\/\/www.newsbeep.com\/au\/69830\/","title":{"rendered":"Three-minute explainer on&#8230; Q-day &#8211; Raconteur"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/assets.raconteur.net\/uploads\/2023\/10\/TME_header-01.svg\" alt=\"Three-minute explainer\" class=\"wp-image-206427\"\/><\/p>\n<p>The success of the modern digital economy depends on encryption. Without it, digital services such as ecommerce platforms, collaboration apps, messaging tool and software-as-a-service would be rendered practically useless. Private messages, payment data and sensitive information of all sorts would bleed out from their intended channels, threatening the privacy and security of essentially every internet user.<\/p>\n<p>Encryption, the process of securing data and internet traffic, is a cornerstone of the connected world. But experts warn that quantum technology could one day cause these traditional privacy protections to crumble \u2013 and security pros are calling that impending event \u2018Q-day\u2019.<\/p>\n<p>What is Q-day and why does it matter?<\/p>\n<p>Traditional computing runs on binary \u2018bits\u2019 of information, where each unit can be coded as either 0 or 1. Quantum computing, however, uses so-called qubits, or quantum bits, which can occupy both 0 and 1 positions at the same time. This ability to hold seemingly conflicting information simultaneously is known as superposition, and it\u2019s similar in this way to the human brain, which can hold contradictory thoughts.<\/p>\n<p>Although quantum computers already exist, they are unwieldy and only useful for specialised tasks, such as solving complicated mathematical equations. However, once the machines are stable or commercially available, their ability to make such calculations, through methods such as <a href=\"https:\/\/en.wikipedia.org\/wiki\/Shor&#039;s_algorithm\" target=\"_blank\" rel=\"nofollow noopener\">Shor\u2019s algorithm<\/a>, might put encryption at risk.<\/p>\n<p>Encryption relies on factoring extremely large numbers, which is difficult for even the most powerful classical computers. Quantum computers will one day be able to solve such equations easily, thereby \u2018breaking\u2019 encryption codes.<\/p>\n<p>While quantum computers are not yet powerful or stable enough to crack these codes, and likely won\u2019t be for decades, their potential has security professionals worried. And, with quantum researchers at <a href=\"https:\/\/www.ft.com\/content\/2fe4b1a3-b0d3-403a-bdd3-f033b3e5e56a\" target=\"_blank\" rel=\"nofollow noopener\">Google and IBM<\/a> working diligently to progress the technology, Q-day might come quicker than we\u2019d previously assumed.<\/p>\n<p>Q-day: the security implications of quantum computing<\/p>\n<p>Countries were quietly investing in quantum computing long before generative AI captured the headlines. <a href=\"https:\/\/www.raconteur.net\/technology\/britain-mustnt-let-jingoism-cloud-our-judgement-over-chinese-tech\" rel=\"nofollow noopener\" target=\"_blank\">The Chinese government has ploughed significant resources<\/a> into quantum initiatives, hoping to become a leader in the field. It already publishes more research papers on quantum computing than the US, its biggest rival and the current leader in the field. Meanwhile, the UK has just switched on a new machine, described by the BBC as the \u201cmost advanced in the world\u201d, in Oxfordshire at the National Quantum Computing Centre.<\/p>\n<p>Private sector businesses readily share their progress on quantum computing. But experts worry government-backed labs could develop a stable, powerful quantum computer and not share the news with anyone. Such a machine would enable its owner to decipher any encrypted communications on the planet. No wonder then that they\u2019d choose to keep their breakthrough a secret.<\/p>\n<p>Cybercriminals are preparing for Q-day, too. Many have implemented a \u2018harvest now, decrypt later\u2019 strategy, meaning they steal as much data as possible \u2013 even encrypted data that they can\u2019t currently access \u2013 with the hope that they will be able to decrypt it later.<\/p>\n<p>In response, so-called quantum-readiness initiatives are gaining momentum. Encryption labs are developing post-quantum cryptography methods, which are designed to be unsolvable even by powerful quantum machines.<\/p>\n<p>While Q-day may still be years away \u2013 and some argue that it will never arrive; it\u2019s a myth, drummed up by quantum companies to build hype \u2013 firms would do well nonetheless to investigate their cryptographic capabilities with up-to-date risk assessments, ensuring that internet traffic and data is as secure as possible and ready for whatever the future holds.<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/assets.raconteur.net\/uploads\/2023\/10\/TME_header-01.svg\" alt=\"Three-minute explainer\" class=\"wp-image-206427\"\/><\/p>\n<p>The success of the modern digital economy depends on encryption. Without it, digital services such as ecommerce platforms, collaboration apps, messaging tool and software-as-a-service would be rendered practically useless. Private messages, payment data and sensitive information of all sorts would bleed out from their intended channels, threatening the privacy and security of essentially every internet user.<\/p>\n<p>Encryption, the process of securing data and internet traffic, is a cornerstone of the connected world. But experts warn that quantum technology could one day cause these traditional privacy protections to crumble \u2013 and security pros are calling that impending event &#8216;Q-day&#8217;.<\/p>\n<p>What is Q-day and why does it matter?<\/p>\n","protected":false},"excerpt":{"rendered":"The success of the modern digital economy depends on encryption. Without it, digital services such as ecommerce platforms,&hellip;\n","protected":false},"author":2,"featured_media":69831,"comment_status":"","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[21],"tags":[64,63,257,284,1294,4206,105,55160],"class_list":{"0":"post-69830","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-computing","8":"tag-au","9":"tag-australia","10":"tag-computing","11":"tag-cybersecurity","12":"tag-risk","13":"tag-security","14":"tag-technology","15":"tag-three-minute-explainer"},"_links":{"self":[{"href":"https:\/\/www.newsbeep.com\/au\/wp-json\/wp\/v2\/posts\/69830","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.newsbeep.com\/au\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.newsbeep.com\/au\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.newsbeep.com\/au\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.newsbeep.com\/au\/wp-json\/wp\/v2\/comments?post=69830"}],"version-history":[{"count":0,"href":"https:\/\/www.newsbeep.com\/au\/wp-json\/wp\/v2\/posts\/69830\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.newsbeep.com\/au\/wp-json\/wp\/v2\/media\/69831"}],"wp:attachment":[{"href":"https:\/\/www.newsbeep.com\/au\/wp-json\/wp\/v2\/media?parent=69830"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.newsbeep.com\/au\/wp-json\/wp\/v2\/categories?post=69830"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.newsbeep.com\/au\/wp-json\/wp\/v2\/tags?post=69830"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}