PRESS RELEASE

Quantum and Security: Fact or Fiction? – Report Summary

Analyst(s): Dr. Bob Sutor
Publication Date: February 13, 2025

As public focus on quantum computing has grown over the years, there has only been one “bad” potential application of the technology: security. Will we ever have a big and powerful enough quantum computer to break encryption/decryption protocols such as RSA? Are there new cryptography standards that will be unhackable by quantum systems? If so, which companies are implementing them? Can quantum tech be used for “good” security applications?

Key Points:

  • For three decades, it has been well-known that quantum computing might someday threaten encryption protocols such as RSA (Rivest–Shamir–Adleman) and Elliptic Curve Cryptography.
  • In August 2024, the US National Institute of Standards and Technology (NIST) published three new standards that researchers believe are impervious to eventual quantum attack. These form the basis for Post-Quantum Cryptography (PQC) products.
  • Many companies offer Quantum Key Distribution (QKD) products to secure the sharing of cryptographic keys.
  • Random number generation has many applications, from security to casino gambling, and the nature of quantum mechanics can provide safer approaches than classical alternatives.
  • The companies offering these products are distributed over very few countries, with the USA represented well.

Overview:

One of the “practical” applications requiring a sufficiently large and powerful quantum computer is breaking some current cryptographic protocols. For most people, that would not seem to be a good use of a quantum computer, though national security agencies might like to have such a system. The development of “Post-Quantum Cryptography” standards should ameliorate this threat, and many companies worldwide have started supporting planning for and implementing the new standards.

On the more positive side, quantum techniques can guarantee that the general exchange of cryptographic keys can be performed securely. Random numbers, including those generated by quantum processes, are used in cybersecurity, process simulation, statistical optimization, and even gambling.

The way to break an encryption-decryption protocol is by solving some very hard problems. In the case of RSA and Elliptic Curve Cryptography, that hard problem is factoring some large number into its two composite prime numbers. What does this have to do with quantum? In 1994, Peter Shor, then a Bell Labs scientist and now an MIT professor, discovered a factoring algorithm almost exponentially faster than the best classical method. After an eight-year international process, the United States NIST published three new PQC security standards that we believe cannot be attacked by quantum computers.

Another aspect of quantum and security is QKD. The nature of the process allows us to learn if any intermediate party has looked at the quantum information for the key we sent.

A third area of interaction is the generation of random numbers. It may seem strange, but random numbers are essential to our security infrastructure. We can use the Quantum Mechanics model from Physics and quantum technologies in different ways to create unique and unpredictable random numbers.

This report looks in detail at these three areas related to quantum and security and their current commercial support. It lists which companies in which countries are working in these three product and offering areas.

The full report is available via subscription to the Quantum Computing IQ service from Futurum Intelligence—click here for inquiry and access.

Futurum clients can read more about it in the Futurum Intelligence Platform. Nonclients can learn more here: Futurum Intelligence.

About the Futurum Quantum Computing Practice

The Futurum Quantum Computing Practice provides actionable, objective insights for market leaders and their teams so they can respond to emerging opportunities and innovate. Public access to our coverage can be seen here. Follow news and updates from the Futurum Practice on LinkedIn and X. Visit the Futurum Newsroom for more information and insights.

Author Information

Dr. Bob Sutor

Dr. Bob Sutor is a Consulting Analyst for Futurum and an expert in quantum technologies with 40+ years of experience. He is an accomplished author of the quantum computing book Dancing with Qubits, Second Edition. Bob is dedicated to evolving quantum to help solve society's critical computational problems. For Futurum, he helps clients understand sophisticated technologies and how to make the best use of them for success in their organizations and industries.

He’s the author of a book about quantum computing called Dancing with Qubits, which was published in 2019, with the Second Edition released in March 2024. He is also the author of the 2021 book Dancing with Python, an introduction to Python coding for classical and quantum computing. Areas in which he’s worked: quantum computing, AI, blockchain, mathematics and mathematical software, Linux, open source, standards management, product management and marketing, computer algebra, and web standards.

Thank you, we received your request, a member of our team will be in contact with you.