8 results ·
● Live web index
F
fortinet.com
article
https://www.fortinet.com/resources/cyberglossary/quantum-computing-security
# Quantum Computing Security. ## Understanding quantum computing risks and how they impact business security. ## How quantum computing poses a threat to business security? Quantum computing advancements pose several cybersecurity risks for industries that heavily rely on encryption for data security. Enterprises are moving to quantum-resistant encryption like CRYSTALS-Kyber, now ML-KEM, a National Institute of Standards and Technology’s (NIST) recommended algorithm, which is adopted for securing data in this era of post-quantum threats. Organizations must adopt a proactive approach by conducting comprehensive quantum computing security audits, identifying vulnerable encryption systems, and transitioning to quantum-safe encryption. Fortinet offers quantum-safe encryption solutions to help businesses transition to quantum-resistant security frameworks. ### What business sizes face risks from cybersecurity quantum computing threats? Any business, regardless of size, that uses encryption for data security, transactions, or communications must transition to quantum-resistant security frameworks to prevent future breaches.
I
industrialcyber.co
article
https://industrialcyber.co/critical-infrastructure/isaca-warns-that-quantum-c…
[Home](https://industrialcyber.co/ "Go to Industrial Cyber.")[Attacks and Vulnerabilities](https://industrialcyber.co/category/threats-attacks/ "Go to the Attacks and Vulnerabilities category archives.")ISACA warns that quantum computing poses major cybersecurity risk, as few firms are ready. Clyde added that “We also need to implement browsers and websites that support new [NIST-approved algorithms](https://industrialcyber.co/critical-infrastructure/wef-recognizes-cybersecurity-challenges-in-quantum-computing-as-nist-debuts-encryption-algorithms/) for post-quantum cryptography. [](https://industrialcyber.co/nist/nist-develops-trustworthy-ai-in-critical-infrastructure-profile-to-align-risk-resilience-and-infrastructure-security/). [](https://industrialcyber.co/threat-landscape/cyber-resilience-moves-beyond-incident-response-as-ai-threats-and-third-party-risks-grow/). [](https://industrialcyber.co/features/industrial-systems-face-structural-gap-as-quantum-risks-drive-urgency-for-crypto-agility-and-post-quantum-readiness/). [](https://industrialcyber.co/building-management-systems/claroty-says-cea-852-adoption-accelerates-risk-as-building-systems-become-exposed-to-critical-infrastructure-threats/). [](https://industrialcyber.co/industrial-cyber-attacks/internet-exposed-ics-devices-running-insecure-modbus-leave-critical-infrastructure-open-to-disruption-comparitech-finds/). [](https://industrialcyber.co/industrial-cyber-attacks/censys-warns-systemic-exposure-of-rockwell-plcs-enable-iran-linked-targeting-of-critical-infrastructure-ot-networks/). [](https://industrialcyber.co/reports/ccn-reports-cybersecurity-maturity-becoming-prerequisite-in-critical-infrastructure-industrial-supply-chains/).
S
safe.security
article
https://safe.security/resources/insights/understanding-quantum-computing-in-c…
[Platform](https://safe.security/resources/insights/understanding-quantum-computing-in-cybersecurity/). [Solutions](https://safe.security/resources/insights/understanding-quantum-computing-in-cybersecurity/#). [Customers](https://safe.security/resources/insights/understanding-quantum-computing-in-cybersecurity/#). [Partners](https://safe.security/resources/insights/understanding-quantum-computing-in-cybersecurity/#). [FAIR](https://safe.security/resources/insights/understanding-quantum-computing-in-cybersecurity/#). [Why SAFE?](https://safe.security/resources/insights/understanding-quantum-computing-in-cybersecurity/#). [Resources](https://safe.security/resources/insights/understanding-quantum-computing-in-cybersecurity/#). [Company](https://safe.security/resources/insights/understanding-quantum-computing-in-cybersecurity/#). 1. [What is Quantum Computing?](https://safe.security/resources/insights/understanding-quantum-computing-in-cybersecurity/#What-is-Quantum-Computing--0). 1. [Key Differences from Classical Computing](https://safe.security/resources/insights/understanding-quantum-computing-in-cybersecurity/#Key-Differences-from-Classical-Computing-1). 2. [Impact on Computational Speed](https://safe.security/resources/insights/understanding-quantum-computing-in-cybersecurity/#Impact-on-Computational-Speed-2). 2. [Quantum Computing in Cybersecurity](https://safe.security/resources/insights/understanding-quantum-computing-in-cybersecurity/#Quantum-Computing-in-Cybersecurity-3). 1. [Current Use Cases](https://safe.security/resources/insights/understanding-quantum-computing-in-cybersecurity/#Current-Use-Cases-4). 3. [Potential Cybersecurity Risks with Quantum Computing](https://safe.security/resources/insights/understanding-quantum-computing-in-cybersecurity/#Potential-Cybersecurity-Risks-with-Quantum-Computing-5). 4. [Practical Applications for Cybersecurity Professionals](https://safe.security/resources/insights/understanding-quantum-computing-in-cybersecurity/#Practical-Applications-for-Cybersecurity-Professionals-6). 5. [The Future of Quantum Computing in Cybersecurity](https://safe.security/resources/insights/understanding-quantum-computing-in-cybersecurity/#The-Future-of-Quantum-Computing-in-Cybersecurity-7). 6. [Frequently Asked Questions](https://safe.security/resources/insights/understanding-quantum-computing-in-cybersecurity/#-------------------Frequently-Asked-Questions-----------------8). At its core, [quantum computing](https://www.ibm.com/think/topics/quantum-computing?utm_medium=website&utm_source=direct&utm_campaign=safe-security) uses the fundamental principles of quantum mechanics—such as qubits, superposition, and entanglement—to process data at significantly faster rates than classical computers for certain types of problems. Quantum Computing](https://safe.security/wp-content/uploads/Traditional-vs.-Quantum-Computing-1024x576.png). However, future large-scale quantum computers could break these encryption standards by leveraging [Shor’s Algorithm](https://www.classiq.io/insights/shors-algorithm-explained?utm_medium=website&utm_source=direct&utm_campaign=safe-security), a quantum algorithm that efficiently factors large prime numbers and computes discrete logarithms, rendering RSA and ECC encryption vulnerable. **Solution:** Quantum-resistant encryption algorithms, such as [lattice-based cryptography](https://www.redhat.com/en/blog/post-quantum-cryptography-lattice-based-cryptography?utm_medium=website&utm_source=direct&utm_campaign=safe-security), are being developed to mitigate this risk. As part of its [Post-Quantum Cryptography (PQC) Standardization Project,](https://csrc.nist.gov/projects/post-quantum-cryptography?utm_medium=website&utm_source=direct&utm_campaign=safe-security) NIST has been evaluating and selecting encryption algorithms designed to withstand attacks from quantum computers.
K
kpmg.com
article
https://kpmg.com/xx/en/our-insights/ai-and-technology/quantum-and-cybersecuri…
* [Preferences](https://kpmg.com/xx/en/account/preference-management.html). * [All Insights](https://kpmg.com/xx/en/our-insights.html). * [AI and Technology](https://kpmg.com/xx/en/our-insights/ai-and-technology.html). * [ESG](https://kpmg.com/xx/en/our-insights/esg.html). * [Operations](https://kpmg.com/xx/en/our-insights/operations.html). * [Risk and Regulation](https://kpmg.com/xx/en/our-insights/risk-and-regulation.html). * [Transformation](https://kpmg.com/xx/en/our-insights/transformation.html). * [Workforce](https://kpmg.com/xx/en/our-insights/workforce.html). Back [Industries](https://kpmg.com/xx/en/what-we-do/industries.html). * [Financial Services](https://kpmg.com/xx/en/what-we-do/industries/financial-services.html). [Services](https://kpmg.com/xx/en/what-we-do/services.html). * [Advisory](https://kpmg.com/xx/en/what-we-do/services/advisory.html). * [AI](https://kpmg.com/xx/en/what-we-do/services/ai.html). * [Audit and Assurance](https://kpmg.com/xx/en/what-we-do/services/audit.html). * [Legal](https://kpmg.com/xx/en/what-we-do/services/legal.html). * [Tax](https://kpmg.com/xx/en/what-we-do/services/tax.html). * [ServiceNow](https://kpmg.com/xx/en/what-we-do/alliances/service-now.html). * [About KPMG](https://kpmg.com/xx/en/about.html). * [Who we are](https://kpmg.com/xx/en/careers/who-we-are.html). * [What we do](https://kpmg.com/xx/en/careers/what-we-do.html). * [](https://kpmg.com/xx/en/our-insights/ai-and-technology/quantum-and-cybersecurity.html). * [](https://kpmg.com/xx/en/our-insights/ai-and-technology/quantum-and-cybersecurity.html). * [Preferences](https://kpmg.com/xx/en/account/preference-management.html). * [Preferences](https://kpmg.com/xx/en/account/preference-management.html). * [opens in a new tab](https://www.linkedin.com/shareArticle?mini=true&url=https://kpmg.com/xx/en/our-insights/ai-and-technology/quantum-and-cybersecurity.html&title=). * [opens in a new tab](http://twitter.com/share?text=&url=https://kpmg.com/xx/en/our-insights/ai-and-technology/quantum-and-cybersecurity.html). * [opens in a new tab](http://www.facebook.com/sharer.php?u=https://kpmg.com/xx/en/our-insights/ai-and-technology/quantum-and-cybersecurity.html&p[title]=). [KPMG firms are helping organizations](https://kpmg.com/xx/en/what-we-do/services/advisory/consulting/technology-consulting.html)mitigate quantum risks. ### [Cybersecurity considerations 2024](https://kpmg.com/xx/en/our-insights/ai-and-technology/cybersecurity-considerations-2024.html). [Read more](https://kpmg.com/xx/en/our-insights/ai-and-technology/cybersecurity-considerations-2024.html). [](https://kpmg.com/xx/en/our-insights/ai-and-technology/cybersecurity-considerations-2024.html). ### [Cyber Security Services](https://kpmg.com/xx/en/what-we-do/services/advisory/risk-consulting/cyber-security-services.html). [Read more](https://kpmg.com/xx/en/what-we-do/services/advisory/risk-consulting/cyber-security-services.html). [](https://kpmg.com/xx/en/what-we-do/services/advisory/risk-consulting/cyber-security-services.html). ### [KPMG recognized as a Leader in Cybersecurity Consulting Services in Europe](https://kpmg.com/xx/en/our-insights/ai-and-technology/kpmg-recognized-as-a-leader-in-cybersecurity-consulting-services-in-europe.html). [Read more](https://kpmg.com/xx/en/our-insights/ai-and-technology/kpmg-recognized-as-a-leader-in-cybersecurity-consulting-services-in-europe.html). [](https://kpmg.com/xx/en/our-insights/ai-and-technology/kpmg-recognized-as-a-leader-in-cybersecurity-consulting-services-in-europe.html). * [mail](https://kpmg.com/xx/en/our-insights/ai-and-technology/quantum-and-cybersecurity.html#). * [mail](https://kpmg.com/xx/en/our-insights/ai-and-technology/quantum-and-cybersecurity.html#). 1 https://home.kpmg/ca/en/home/market-insights/predictions/technology/quantum-computing-will-help-us-solve-our-most-difficult-problems.html. 2 https://kpmg.com/ca/en/home/media/press-releases/2023/05/quantum-computing-is-coming-but-few-are-ready-for-it.html. * [Newsroom](https://kpmg.com/xx/en/media.html). * [Newsroom](https://kpmg.com/xx/en/media.html). * [About Us](https://kpmg.com/xx/en/about.html). * [About Us](https://kpmg.com/xx/en/about.html). * [Privacy](https://kpmg.com/xx/en/misc/privacy.html). * [Help](https://kpmg.com/xx/en/misc/help.html). You can manage your preferences at any time by clicking [manage choices](https://kpmg.com/xx/en/our-insights/ai-and-technology/quantum-and-cybersecurity.html#).
R
researchgate.net
research
https://www.researchgate.net/publication/379798084_The_Impact_of_Quantum_Comp…
This article explores the emerging trends in cybersecurity in response to the advent of quantum computing, focusing on the development of quantum-safe
R
reddit.com
article
https://www.reddit.com/r/QuantumComputing/comments/1hnjxyy/how_do_you_think_q…
[Skip to main content](https://www.reddit.com/r/QuantumComputing/comments/1hnjxyy/how_do_you_think_quantum_computing_will_affect/#main-content)How do you think quantum computing will affect cybersecurity? Open menu Open navigation[](https://www.reddit.com/)Go to Reddit Home. Get App Get the Reddit app [Log In](https://www.reddit.com/login/)Log in to Reddit. [ Go to QuantumComputing](https://www.reddit.com/r/QuantumComputing/). [r/QuantumComputing](https://www.reddit.com/r/QuantumComputing/)•1y ago. [Dependent_Storage184](https://www.reddit.com/user/Dependent_Storage184/). [Question](https://www.reddit.com/r/QuantumComputing/?f=flair_name%3A%22Question%22). By continuing, you agree to our[User Agreement](https://www.redditinc.com/policies/user-agreement)and acknowledge that you understand the[Privacy Policy](https://www.redditinc.com/policies/privacy-policy). [Impact of quantum computing on cybersecurity](https://www.reddit.com/answers/812fdea3-cc2c-4df1-8de2-3016a22a4878/?q=Impact+of+quantum+computing+on+cybersecurity&source=PDP). [Best quantum security companies](https://www.reddit.com/answers/2ab8942e-97de-488f-85a1-3dcdfa46441f/?q=Best+quantum+security+companies&source=PDP). [Post-quantum cryptography companies](https://www.reddit.com/answers/aaba6fe6-e68d-42c1-95ce-5a75aa0aefd4/?q=Post-quantum+cryptography+companies&source=PDP). [Quantum safe encryption methods](https://www.reddit.com/answers/98de7b29-d4af-46a4-814d-1baa226f7e04/?q=Quantum+safe+encryption+methods&source=PDP). [Latest breakthroughs in quantum algorithms](https://www.reddit.com/answers/a2a2f3ff-33b6-422e-a872-a0959b740cba/?q=Latest+breakthroughs+in+quantum+algorithms&source=PDP). * [Reddit reReddit: Top posts of December 27, 2024 * * *](https://www.reddit.com/posts/2024/december-27-1/global/). * [Reddit reReddit: Top posts of December 2024 * * *](https://www.reddit.com/posts/2024/december/global/). * [Reddit reReddit: Top posts of 2024 * * *](https://www.reddit.com/posts/2024/global/). [Reddit Rules](https://www.redditinc.com/policies/content-policy)[Privacy Policy](https://www.reddit.com/policies/privacy-policy)[User Agreement](https://www.redditinc.com/policies/user-agreement)[Your Privacy Choices](https://support.reddithelp.com/hc/articles/43980704794004)[Accessibility](https://support.reddithelp.com/hc/sections/38303584022676-Accessibility)[Reddit, Inc. All rights reserved.](https://redditinc.com/). * [About Reddit](https://www.redditinc.com/). * [Advertise](https://ads.reddit.com/register?utm_source=web3x_consumer&utm_name=left_nav_cta). * [Developer Platform](https://developers.reddit.com/?utm_source=reddit&utm_medium=left_nav_resources). * [Reddit Pro BETA](https://www.reddit.com/reddit-pro?utm_source=reddit&utm_medium=left_nav_resources). * [Help](https://support.reddithelp.com/hc?utm_source=reddit&utm_medium=footer&utm_campaign=evergreen). * [Careers](https://www.redditinc.com/careers). * [Press](https://www.redditinc.com/press). * [Best of Reddit](https://www.reddit.com/posts/2026/global/). * [Reddit Rules](https://www.redditinc.com/policies/content-policy). * [Privacy Policy](https://www.reddit.com/policies/privacy-policy). * [User Agreement](https://www.redditinc.com/policies/user-agreement). * [Your Privacy Choices](https://support.reddithelp.com/hc/articles/43980704794004). * [Accessibility](https://support.reddithelp.com/hc/sections/38303584022676-Accessibility). All rights reserved.](https://redditinc.com/). .
S
sciencedirect.com
article
https://www.sciencedirect.com/science/article/abs/pii/S0045790625005920
In Table 2, the research questions are systematically formulated by first identifying critical cybersecurity challenges posed by quantum computing (e.g., threats to RSA, ECC, and AES via Shor’s and Grover’s algorithms) and then pairing each question with proposed quantum-resistant solutions (e.g., post-quantum cryptography, QKD, or hybrid systems). ### [Embracing the quantum frontier: Investigating quantum communication, cryptography, applications and future directions](https://www.sciencedirect.com/science/article/pii/S2452414X24000384). ### [Using quantum key distribution for cryptographic purposes: A survey](https://www.sciencedirect.com/science/article/pii/S0304397514006963). ### [Quantum computing research in medical sciences](https://www.sciencedirect.com/science/article/pii/S2352914824001631). ### [Role of quantum computing in shaping the future of 6 G technology](https://www.sciencedirect.com/science/article/pii/S0950584924000594). ### [Distributed quantum computing: A survey](https://www.sciencedirect.com/science/article/pii/S1389128624005048). ### [Unraveling quantum computing system architectures: An extensive survey of cutting-edge paradigms](https://www.sciencedirect.com/science/article/pii/S0950584923002355). ### [Quantum computing: Vision and challenges](https://www.sciencedirect.com/science/article/pii/B9780443290961000088). ### [Quantum decryption using Shor’s algorithm](https://www.sciencedirect.com/science/article/pii/S2214785323038178). ### [Using quantum amplitude amplification in genetic algorithms](https://www.sciencedirect.com/science/article/pii/S0957417422013604). * ### [Classification of security challenges and mitigation approaches in the quantum software engineering](https://www.sciencedirect.com/science/article/pii/S0164121226001172). * ### [Integrating quantum computing with federated learning for enhanced security and privacy in IoT networks](https://www.sciencedirect.com/science/article/pii/S259012302504544X).
B
belfercenter.org
article
https://www.belfercenter.org/publication/quantum-computing-and-cybersecurity
GAO calls on the Department of Homeland Security and Office of Management and Budget to build out initiatives to improve agencies’ capabilities for managing cyber risks.[31](https://live-hksbelfer.pantheonsite.io/publication/quantum-computing-and-cybersecurity#footnote-009) The federal government should invest time and resources into identifying and prioritizing the activities required to improve understanding of vulnerabilities and migrate to quantum-resistant encryption. * [Executive Summary](https://www.belfercenter.org/publication/quantum-computing-and-cybersecurity#in-this-section-nav-1 "Executive Summary"). * [Risks and Mitigations](https://www.belfercenter.org/publication/quantum-computing-and-cybersecurity#in-this-section-nav-4 "Risks and Mitigations"). 3. [](https://www.belfercenter.org/publication/quantum-computing-and-cybersecurity#footnote-ref-3)Predictions about the timescale for quantum technology development vary. 9. [](https://www.belfercenter.org/publication/quantum-computing-and-cybersecurity#footnote-ref-9)National Academies of Sciences, Engineering, and Medicine, “Quantum Computing: Progress and Prospects,” 2019, [https://doi.org/10.17226/25196](https://doi.org/10.17226/25196). [](https://www.belfercenter.org/publication/quantum-computing-and-cybersecurity#footnote-ref-12)Elsa B. [](https://www.belfercenter.org/publication/quantum-computing-and-cybersecurity#footnote-ref-14)Maria Korolov and Doug Drinkwater, “What Is Quantum Cryptography? [](https://www.belfercenter.org/publication/quantum-computing-and-cybersecurity#footnote-ref-17)National Academies of Sciences, Engineering, and Medicine, “Quantum Computing.”. [](https://www.belfercenter.org/publication/quantum-computing-and-cybersecurity#footnote-ref-19)National Academies of Sciences, Engineering, and Medicine, “Quantum Computing.”. [](https://www.belfercenter.org/publication/quantum-computing-and-cybersecurity#footnote-ref-23)T. [](https://www.belfercenter.org/publication/quantum-computing-and-cybersecurity#footnote-ref-31)U. [](https://www.belfercenter.org/publication/quantum-computing-and-cybersecurity#footnote-ref-33)Kania and Costello, “Quantum Hegemony? [](https://www.belfercenter.org/publication/quantum-computing-and-cybersecurity#footnote-ref-36)Homomorphic encryption is a technique that allows for computations to be done on encrypted data, without requiring access to a secret key. [](https://www.belfercenter.org/publication/quantum-computing-and-cybersecurity#footnote-ref-37)Jonas Zeuner et al., “Experimental Quantum Homomorphic Encryption,” _Npj Quantum Information_ 7, no.