We need Post-Quantum Cryptography more than ever
9 hours ago
- #encryption
- #cybersecurity
- #quantum-computing
- Quantum computers pose a growing threat to current encryption methods like RSA and ECC, which may be entirely broken by quantum algorithms.
- Shor's algorithm has been improved to require fewer qubits for breaking RSA, and quantum attacks on ECC have become more efficient, accelerating the risk.
- Major tech companies (Google, Microsoft, IBM) are advancing quantum computer development, pushing the feasibility of these attacks closer.
- Organizations like Google and Cloudflare are adopting post-quantum cryptography timelines (e.g., by 2029), but some agencies, such as America's CISA, still lack support.
- Adversaries use Harvest Now, Decrypt Later (HNDL) attacks to store encrypted data for future decryption, with threats more severe for governments and businesses due to long-term data value.
- While some personal data (e.g., passports, credit cards) loses value over time, not all expires, keeping consumers at risk, and the transition to post-quantum security must happen before quantum hardware advances further.