{"id":177638,"date":"2025-09-29T12:18:21","date_gmt":"2025-09-29T12:18:21","guid":{"rendered":"https:\/\/www.newsbeep.com\/ca\/177638\/"},"modified":"2025-09-29T12:18:21","modified_gmt":"2025-09-29T12:18:21","slug":"quantum-computing-unravelling-the-myths","status":"publish","type":"post","link":"https:\/\/www.newsbeep.com\/ca\/177638\/","title":{"rendered":"Quantum computing: unravelling the myths"},"content":{"rendered":"<p>Quantum computing is set to be one of the most transformative technologies of the digital age, unlocking unprecedented computational power to drive innovation at scale.<\/p>\n<p>By harnessing the principles of quantum mechanics, these computers promise to solve complex problems exponentially faster than classical machines, driving breakthroughs in fields like drug discovery, supply chain optimisation, and AI.<\/p>\n<p>However, alongside the opportunity lies a threat. Quantum computing\u2019s immense power has the potential to break many types of traditional encryption, putting both future systems and historic data at risk.<\/p>\n<p>Attackers are <a href=\"https:\/\/www.pwc.com\/m1\/en\/publications\/securing-data-in-the-post-quantum-age.html\" target=\"_blank\" rel=\"sponsored nofollow noopener\">already harvesting encrypted information<\/a> today, aiming to decrypt it once quantum capabilities mature.<\/p>\n<p>Myth: There\u2019s plenty of time to act<\/p>\n<p>According to PwC, one of the most serious misconceptions is the belief that the quantum threat to encryption is still years away. \u201cMany organisations believe quantum computing is a distant concern and are prioritising other issues,\u201d says Clinton Firth, Partner, Cybersecurity, PwC Middle East and Quantum Computing specialist. \u201cRecent research suggests it could be mainstream within five years or less. Replacing legacy encryption with quantum-ready solutions takes time, so businesses must act now to stay ahead of the threat.\u201d<a href=\"#_ftn1\" id=\"_ftnref1\">[1]<\/a><\/p>\n<p>Myth: Only asymmetric encryption is at risk<\/p>\n<p>The form of cryptography most at risk from quantum computing is asymmetric encryption, which uses a pair of mathematically linked keys\u2014one public and one private\u2014allowing secure data exchange such that information can be shared openly but only decrypted by the intended recipient.<\/p>\n<p>However, most businesses are unaware that symmetric encryption, which secures data using a single key for both encryption and decryption, may also be at risk in the future.<\/p>\n<p>\u201cJust as Shor\u2019s algorithm demonstrates how quantum machines can break asymmetric encryption, Grover\u2019s algorithm presents a challenge for symmetric encryption,\u201d adds Firth. \u201cThe concern is that quantum computing will make brute-force attacks far more effective.\u201d<a href=\"#_ftn2\" id=\"_ftnref2\">[2]<\/a> <a href=\"https:\/\/en.wikipedia.org\/wiki\/Grover%27s_algorithm\" target=\"_blank\" rel=\"sponsored nofollow noopener\">[3]<\/a><\/p>\n<p>Anton Tkachov, Managing Director, Cybersecurity, PwC UK, explains further: \u201cComplex systems, such as satellite arrays or ATM networks, are required to transport encryption keys to meet requirements around periodic key rotation. These keys are \u2018wrapped\u2019 using asymmetric key exchange algorithms. Instead of trying to brute-force access to encrypted information, an attacker armed with quantum computer, could crack the \u2018wrapper\u2019 and obtain keys to decrypt sensitive data.\u201d<\/p>\n<p>Myth: Vendors will take care of the challenge<\/p>\n<p>Another concern highlighted by PwC\u2019s quantum specialists, is businesses relying on vendors to address the quantum threat.<\/p>\n<p>\u201cIf I\u2019m a CIO running a complex technology estate, I might be well-prepared for quantum myself\u2014but I\u2019m still heavily reliant on vendors. Replacing a key vendor could take three-to-five years, and by the time I realise they\u2019re falling behind on their quantum journey, it may already be too late,\u201d says Tkachov. \u00a0<\/p>\n<p>Firth agrees: \u201cBusinesses can\u2019t outsource risk\u2014it remains their responsibility. Vendors won\u2019t upgrade their cryptography by default. Without strong pressure from businesses, it simply won\u2019t happen.\u201d<\/p>\n<p>Another challenge stems from the increasing \u201cnoise\u201d around quantum solutions.<\/p>\n<p>\u201cEvery time a major vendor announces a quantum breakthrough\u2014whether that\u2019s a new chip or an emulation tool\u2014boards and executives, often reading headlines in mainstream business publications, immediately ask: \u2018Is our encryption broken? Are we about to be hacked? Can you prove we\u2019re safe?\u2019 This creates huge pressure and extra work for security teams, often without cause,\u201d says Tkachov.<\/p>\n<p>Getting ready for the post-quantum world<\/p>\n<p>To help their businesses cut through these myths and misconceptions, CISOs must first raise awareness of the scale of the encryption risk\u2014and the urgency of acting now.<\/p>\n<p>Tkachov concludes: \u201cThe time is now. Businesses must develop a post-quantum encryption strategy, build internal awareness, map the assets at risk, and redesign their applications.<\/p>\n<p>\u201cNo single encryption algorithm will solve the challenge. Instead, organisations need an agile approach that allows them to rapidly adopt new standards as soon as old ones are broken\u2014staying one step ahead of threat actors.\u201d<\/p>\n<p>To learn more about how organisations can prepare for the post-quantum world, register for PwC\u2019s new webinar <a href=\"https:\/\/global.resources.cio.com\/resources\/why-post-quantum-cryptography-must-be-a-key-security-priority\/\" target=\"_blank\" rel=\"sponsored nofollow noopener\">here<\/a>. <\/p>\n<p>To find out more about Clinton Firth, click <a href=\"https:\/\/www.linkedin.com\/in\/cybermiddleeastclintonfirth\/\" target=\"_blank\" rel=\"sponsored nofollow noopener\">here<\/a>.<\/p>\n<p>To find out more about Anton Tkachov, click <a href=\"https:\/\/www.linkedin.com\/in\/tkachov\/\" target=\"_blank\" rel=\"sponsored nofollow noopener\">here<\/a>. <\/p>\n<p>To learn more visit us <a href=\"https:\/\/www.pwc.com\/us\/en\/services\/consulting\/cybersecurity-risk-regulatory\/library\/quantum-computing-cybersecurity-risk.html\" target=\"_blank\" rel=\"sponsored nofollow noopener\">here<\/a>. <\/p>\n<p>This is for general information purposes only.<\/p>\n<p>2025 PwC. All rights reserved<\/p>\n<p><a href=\"#_ftnref1\" id=\"_ftn1\">[1]<\/a> PwC, \u201cIs quantum computing about to radically change the world?,\u201d <a href=\"https:\/\/www.pwc.com\/gx\/en\/issues\/reinventing-the-future\/take-on-tomorrow\/quantum-computing-podcast-episode.html\" target=\"_blank\" rel=\"sponsored nofollow noopener\">https:\/\/www.pwc.com\/gx\/en\/issues\/reinventing-the-future\/take-on-tomorrow\/quantum-computing-podcast-episode.html<\/a><\/p>\n<p><a href=\"#_ftnref2\" id=\"_ftn2\">[2]<\/a> <a href=\"https:\/\/en.wikipedia.org\/wiki\/Shor%27s_algorithm\" target=\"_blank\" rel=\"sponsored nofollow noopener\">Wikipedia \u2013 Shor\u2019s algorithm<\/a><\/p>\n<p><a href=\"#_ftnref3\" id=\"_ftn3\">[3]<\/a> <a href=\"https:\/\/en.wikipedia.org\/wiki\/Grover%27s_algorithm\" target=\"_blank\" rel=\"sponsored nofollow noopener\">Wikipedia \u2013 Grover\u2019s algorithm<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"Quantum computing is set to be one of the most transformative technologies of the digital age, unlocking unprecedented&hellip;\n","protected":false},"author":2,"featured_media":177639,"comment_status":"","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[21],"tags":[49,48,285,61],"class_list":{"0":"post-177638","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-computing","8":"tag-ca","9":"tag-canada","10":"tag-computing","11":"tag-technology"},"_links":{"self":[{"href":"https:\/\/www.newsbeep.com\/ca\/wp-json\/wp\/v2\/posts\/177638","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.newsbeep.com\/ca\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.newsbeep.com\/ca\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.newsbeep.com\/ca\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.newsbeep.com\/ca\/wp-json\/wp\/v2\/comments?post=177638"}],"version-history":[{"count":0,"href":"https:\/\/www.newsbeep.com\/ca\/wp-json\/wp\/v2\/posts\/177638\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.newsbeep.com\/ca\/wp-json\/wp\/v2\/media\/177639"}],"wp:attachment":[{"href":"https:\/\/www.newsbeep.com\/ca\/wp-json\/wp\/v2\/media?parent=177638"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.newsbeep.com\/ca\/wp-json\/wp\/v2\/categories?post=177638"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.newsbeep.com\/ca\/wp-json\/wp\/v2\/tags?post=177638"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}