Hasty Briefsbeta

Bilingual

We need Post-Quantum Cryptography more than ever

9 hours ago
  • #encryption
  • #cybersecurity
  • #quantum-computing
  • Quantum computers pose a growing threat to current encryption methods like RSA and ECC, which may be entirely broken by quantum algorithms.
  • Shor's algorithm has been improved to require fewer qubits for breaking RSA, and quantum attacks on ECC have become more efficient, accelerating the risk.
  • Major tech companies (Google, Microsoft, IBM) are advancing quantum computer development, pushing the feasibility of these attacks closer.
  • Organizations like Google and Cloudflare are adopting post-quantum cryptography timelines (e.g., by 2029), but some agencies, such as America's CISA, still lack support.
  • Adversaries use Harvest Now, Decrypt Later (HNDL) attacks to store encrypted data for future decryption, with threats more severe for governments and businesses due to long-term data value.
  • While some personal data (e.g., passports, credit cards) loses value over time, not all expires, keeping consumers at risk, and the transition to post-quantum security must happen before quantum hardware advances further.