{"id":201823,"date":"2025-10-15T12:57:06","date_gmt":"2025-10-15T12:57:06","guid":{"rendered":"https:\/\/www.newsbeep.com\/uk\/201823\/"},"modified":"2025-10-15T12:57:06","modified_gmt":"2025-10-15T12:57:06","slug":"warning-quantum-computers-to-soon-crack-modern-encryption-information-age","status":"publish","type":"post","link":"https:\/\/www.newsbeep.com\/uk\/201823\/","title":{"rendered":"Warning: Quantum computers to soon crack modern encryption | Information Age"},"content":{"rendered":"<p>Australian companies are on high alert as quantum computing races towards  shattering modern encryption, threatening to expose the nation\u2019s most sensitive data unless defences are upgraded fast.<\/p>\n<p>On Tuesday, the Australian Signals Directorate\u2019s Australian Cyber Security Centre (ACSC) released its <a href=\"https:\/\/www.cyber.gov.au\/about-us\/view-all-content\/reports-and-statistics\/annual-cyber-threat-report-2024-2025\" rel=\"nofollow noopener\" target=\"_blank\">Annual Cyber Threat Report 2024-2025<\/a>.<\/p>\n<p>In addition to finding that Australians have continued to report cybercrime incidents once every six minutes, the report warned businesses should prepare for a significant shakeup to modern cryptography.<\/p>\n<p>According to the report, the development of a cryptographically relevant quantum computer (<a href=\"https:\/\/ia.acs.org.au\/article\/2025\/companies-ignore-quantum-decryption-threat.html\" rel=\"nofollow noopener\" target=\"_blank\">CRQC<\/a>) is \u201con the horizon\u201d.<\/p>\n<p>Such a device would be capable of \u201cbreaking contemporary public key cryptography\u201d, enabling cybercriminals to crack and access encrypted data in ways not previously possible.<\/p>\n<p>Minister for Defence Richard Marles said that while CRQCs are \u201cstill a few years down the track\u201d, he warned Australians will indeed see the advent of much more powerful computers that are able to break [the] encryptions that exist today.<\/p>\n<p>\u201cIt\u2019s important that companies are getting ready for that world.\u201d<\/p>\n<p>What is post-quantum cryptography?<\/p>\n<p>Conventional data encryption typically relies on cryptographic algorithms to scramble sensitive data so it can only be viewed by intended parties.<\/p>\n<p>Advancements in quantum computing, however, are expected to one day offer cybercriminals access to systems capable of breaking these algorithms \u2013 an event commonly forewarned as \u2018<a href=\"https:\/\/www.wired.com\/story\/q-day-apocalypse-quantum-computers-encryption\" rel=\"nofollow noopener\" target=\"_blank\">Q-Day<\/a>\u2019.<\/p>\n<p>The ACSC report explained businesses should prepare for the likelihood of such computers by adopting \u2018post-quantum cryptography\u2019.<\/p>\n<p>In practice, this would mean using encryption products that incorporate quantum-resistant algorithms \u2013 math so complex it\u2019s considered difficult for both classical and quantum computers.<\/p>\n<p>Speaking in Canberra on Tuesday, Marles emphasised there are already existing products for companies to protect themselves.<\/p>\n<p>\u201cIt\u2019s really important that they get on board with those products as soon as possible,\u201d said Marles.<\/p>\n<p>Andrew Wilson, chief executive of encryption specialist Senetas, encouraged organisations to \u201cbegin their quantum-safe migration without delay\u201d by using \u201cdedicated encryption systems to safeguard sensitive and high-value data\u201d.<\/p>\n<p>Wilson told Information Age there was also a \u201charvest-now, decrypt-later\u201d threat which meant criminals who have stolen encrypted data may eventually be able to make use of it \u201conce a quantum computer becomes available\u201d.<\/p>\n<p>\u201cThe report sends a clear message,\u201d said Wilson.<\/p>\n<p>\u201cThis is a critical national security challenge that Australian organisations must address immediately.\u201d<\/p>\n<p>Throw out the old tech<\/p>\n<p>The report recommended businesses and network owners also focus on three other \u201cbig moves\u201d to prepare for future cybersecurity challenges: implementing best-practice logging; managing third-party risk; and replacing legacy IT systems.<\/p>\n<p>\u201cKeeping legacy IT on a network increases the likelihood of a cybersecurity incident,\u201d read the report.<\/p>\n<p>\u201cIt can also make any cybersecurity incident that does occur much more impactful.\u201d<\/p>\n<p>The issue is particularly rife in government, with more than 70 per cent of Commonwealth entities still relying on legacy IT systems that \u201care costly to maintain, pose significant cybersecurity vulnerabilities, and inhibit innovation\u201d, according to consulting firm <a href=\"https:\/\/mandalapartners.com\/reports\/unlocking-the-productivity-dividend-of-digital-government\" rel=\"nofollow noopener\" target=\"_blank\">Mandala<\/a>.<\/p>\n<p>The ACSC report urged businesses to \u201celiminate the risks associated with legacy IT\u201d by replacing it with systems which are still receiving support.<\/p>\n<p>Where this isn\u2019t possible, the ACSC said \u201ctemporary measures\u201d should be adopted to mitigate some of the risk.<\/p>\n<p>\u201cOld IT systems are gateways for cybercriminals,\u201d said Marles.<\/p>\n<p>Notably, Microsoft\u2019s Windows 10 operating system <a href=\"https:\/\/ia.acs.org.au\/article\/2025\/windows-10-reaches-end-of-life.html\" rel=\"nofollow noopener\" target=\"_blank\">reached end-of-life<\/a> earlier this week, setting a three-year deadline before the vendor stops providing security updates to paying users.<\/p>\n<p>Hackers zero in on Aussie IDs<\/p>\n<p>In the foreword of the report, Marles said cybercriminals had \u201crelentlessly targeted Australians\u201d over the past year.<\/p>\n<p>As ransomware attacks and data breaches increased in frequency, reporting tool ReportCyber received more than 84,700 cybercrime reports for the 2024-25 financial year.<\/p>\n<p>This marked a small three per cent decrease, though Australians still averaged <a href=\"https:\/\/ia.acs.org.au\/article\/2024\/small-business-costs-rise-as-cyber-attacks-refine.html\" rel=\"nofollow noopener\" target=\"_blank\">one report every six minutes<\/a>.<\/p>\n<p>Over 42,500 calls were made to the Australian Cyber Security Hotline \u2013 a 16 per cent increase for the service and an average 116 calls per day \u2013 while 30 per cent of self-reported cybercrime for individuals was identity fraud, marking the most reported category and an eight per cent increase from the year prior.<\/p>\n<p>The cost of self-reported cybercrimes averaged $36,633 per person, with online shopping fraud and online banking fraud being the second and third-most common.<\/p>\n<p>Businesses meanwhile suffered a significant increase in costs following a cybercrime incident, climbing 50 per cent to an average of $80,850.<\/p>\n<p>\u201c[Cybersecurity] is an area that is having a big impact on our economy, and it\u2019s really important that everyone \u2013 companies and individuals alike \u2013 are doing everything they can to ensure the public cyber health of our nation,\u201d said Marles.<\/p>\n","protected":false},"excerpt":{"rendered":"Australian companies are on high alert as quantum computing races towards shattering modern encryption, threatening to expose the&hellip;\n","protected":false},"author":2,"featured_media":201824,"comment_status":"","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[21],"tags":[4323,86,56,54,55],"class_list":{"0":"post-201823","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-computing","8":"tag-computing","9":"tag-technology","10":"tag-uk","11":"tag-united-kingdom","12":"tag-unitedkingdom"},"_links":{"self":[{"href":"https:\/\/www.newsbeep.com\/uk\/wp-json\/wp\/v2\/posts\/201823","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.newsbeep.com\/uk\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.newsbeep.com\/uk\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.newsbeep.com\/uk\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.newsbeep.com\/uk\/wp-json\/wp\/v2\/comments?post=201823"}],"version-history":[{"count":0,"href":"https:\/\/www.newsbeep.com\/uk\/wp-json\/wp\/v2\/posts\/201823\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.newsbeep.com\/uk\/wp-json\/wp\/v2\/media\/201824"}],"wp:attachment":[{"href":"https:\/\/www.newsbeep.com\/uk\/wp-json\/wp\/v2\/media?parent=201823"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.newsbeep.com\/uk\/wp-json\/wp\/v2\/categories?post=201823"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.newsbeep.com\/uk\/wp-json\/wp\/v2\/tags?post=201823"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}