IBM says quantum computing could be a big risk to the future of encryption

A graphic of a key on a circuit board-style background
(Image credit: Shutterstock)

A report from IBM has claimed quantum computing poses an “existential risk” to the current encryption protocols that secure our most sensitive data, like digital transactions.

Protocols like public key cryptography (PKC) are said to be vulnerable “once quantum decryption solutions are viable”, which IBM calls the “harvest now, decrypt later” tactic.

“Even if some data is irrelevant or quickly loses its value to hackers, data related to national security, infrastructure, medical records, intellectual capital, and more could well retain or increase in value over time," the company noted.

TechRadar Pro needs you!
We want to build a better website for our readers, and we need your help! You can do your bit by filling out our survey and telling us your opinions and views about the tech industry in 2023. It will only take a few minutes and all your answers will be anonymous and confidential. Thank you again for helping us make TechRadar Pro even better.

D. Athow, Managing Editor

Quantum computing risks

The report highlights that it’s not just our data that could be at risk, but potentially our lives. An increasingly smart world, with cars and planes that talk to each other, also uses PKC to protect communication networks, which may be at risk by brute force enabled by quantum computing. 

IBM expects quantum computing to “impact computing strategies across industries” by the end of the decade, however while it may still be somewhat under the radar for now, reports about its threat to cryptography date many years.

In 2016, the US National Institute of Standards and Technology started work on public-key quantum-safe cryptographic algorithms, which saw 82 propositions narrowed down to four.

IBM is keen to advertise its involvement in the development of two of the primary algorithms: CRYSTALS-Kyber (for public-key encryption and key-establishment) and CRYSTALS-Dilithium (for digital signatures). Also selected for digital signature algorithms were FALCON and SPHINCS+.

Moving forward, IBM argues that collaboration on setting new standards is vital in the protection of our online activity as the quantum computing movement continues to grow.

Craig Hale

With several years’ experience freelancing in tech and automotive circles, Craig’s specific interests lie in technology that is designed to better our lives, including AI and ML, productivity aids, and smart fitness. He is also passionate about cars and the decarbonisation of personal transportation. As an avid bargain-hunter, you can be sure that any deal Craig finds is top value!

Read more
Optical system for data encryption
Is it quantum-resistant? Researchers create 'uncrackable' encryption system by pairing AI and holograms produced by laser
The logo of Google Cloud
Google Cloud introduces quantum-safe digital signatures
ExpressVPN Lightway Protocol
ExpressVPN upgrades to post-quantum encryption NIST standards
AdGuard VPN during TechRadar tests
AdGuard becomes the latest VPN to add post-quantum encryption
Security padlock in circuit board, digital encryption concept
5 cybersecurity predictions to look out for in 2025
VPN
7 VPN predictions to look out for in 2025
Latest in Security
An American flag flying outside the US Capitol building against a blue sky
The FCC is creating a security council to bolster US defenses against cyberattacks
Image depicting hands typing on a keyboard, with phishing hooks holding files, passwords and credit cards.
Microsoft warns about a new phishing campaign impersonating Booking.com
Ransomware
Microsoft uncovers sleuthy new XCSSET MacOS malware campaign
Computer Hacked, System Error, Virus, Cyber attack, Malware Concept. Danger Symbol
Meta warns of worrying security flaw hitting open source type software
Hand holding smartphone and scan fingerprint biometric identity for unlock her mobile phone
Biometrics add another layer of security to passwordless authentication
Data leak
Hacked Tata Technologies data leaked by ransomware gang
Latest in News
An image of the Samsung Galaxy S25 Ultra from a hands-on event
Samsung Galaxy S26 Ultra could resurrect an intriguing camera feature
Cristin Milioti in Black Mirror season 7
Netflix launches trailer for Black Mirror season 7, giving us a look at its first-ever sequel episode and an unexpected returning character
A graphic of the PC Gaming Show
Get ready for a bounty of PC games on June 8, as the PC Gaming show is back
A close up of The Daily podcast from Pocket Casts' web page
‘Podcasting shouldn’t be locked behind walled gardens’: Pocket Casts slams Spotify and makes its web player free to all
A smartphone on a sofa showing the WhatsApp, Telegram and Signal apps
Forget AI – WhatsApp is planning a simple messages feature that could be its most useful upgrade in years
NordicTrack Ultra 1
The new NordicTrack Ultra 1 treadmill looks like it was designed by an architect and costs $15,000