Artificial Intelligence 

Productivity accelerator. Innovation catalyst. Creative collaborator. Whatever your vision for AI, Unisys provides the solutions, expertise and tools to realize the full business potential of your organization.
Explore

Logistics Optimization

Keep cargo moving — despite disruptions. Discover how patent-pending AI models using real-time data can save time and boost revenue by improving capacity utilization, route planning and inventory management.
Explore

Consulting

The nature of work is changing. Let's evolve your business together. Future-proof your organization with consulting services from Unisys and advance as a digital-first entity.
Explore

Industries

Your industry sets you apart. You see the road ahead clearly. Let's join forces and turn that vision into reality. Unisys brings the tech know-how to complement your deep expertise.
Explore

Client Stories

Explore videos and stories where Unisys has helped businesses and governments improve the lives of their customers and citizens.
Explore

Research

Embark on a journey toward a resilient future with access to Unisys' comprehensive research, developed in collaboration with top industry analysts and research firms.
Explore

Resource Center

Find, share and explore assets in support of your key operational objectives.
Explore

Careers

Curiosity, creativity, and a constant desire to improve. Our associates shape tomorrow by going beyond expertise to bring solutions to life.
Explore

Investor Relations

We're a global technology solutions company that's dedicated to driving progress for the world's leading organizations.
Explore

Partners

We collaborate with an ecosystem of partners to provide our clients with cutting-edge products and services in many of the largest industries in the world.
Explore

Language Selection

Your selected language is currently:

English
5 Min Read

10 seconds to break: Preparing for quantum security threats

January 7, 2025 / Stijn Van Impe

Short on time? Read the key takeaways

  • Quantum computers could break current encryption in seconds, presenting an unprecedented risk to the digital infrastructure where cryptography is used. 
  • Organizations should embrace a hybrid approach to post-quantum cryptography (PQC), starting with a comprehensive cryptographic posture assessment.
  • With commercial quantum computers potentially hitting the market by 2029, enterprises need to act swiftly to protect their most sensitive data from "harvest now, decrypt later" threats. 
  • Achieving crypto agility is crucial, allowing organizations to adapt their security measures while maintaining seamless operations as the quantum threat evolves. 

A perfect quantum computer could break RSA-2048, our strongest current encryption, in just 10 seconds.

Quantum computing uses the principle of quantum mechanics to process information using quantum bits (qubits) instead of traditional computer bits. While classical computers use bits that are either 0 or 1, qubits can represent both states simultaneously. This capability makes quantum computers exceptionally powerful for solving complex problems, particularly in cryptography, artificial intelligence and materials science.  

While this computational leap opens remarkable possibilities across industries, it also introduces significant security challenges. When quantum computers reach their full potential, they'll be able to break through traditional encryption methods that protect our most sensitive data.

While the timeline for the commercial availability of fully functional quantum computers remains speculative, predictions vary widely. The Boston Consulting Group forecasts a broad quantum advantage between 2030 and 2040, whereas Gartner suggests that advances in quantum computing could begin compromising current encryption methods as early as 2029, with complete vulnerability by 2034. Regardless of the exact timeline, the consensus is clear: the era of quantum computing is rapidly approaching. 

The looming quantum threat 

The imminent arrival of quantum computing brings with it the risk of "harvest now, decrypt later" attacks. In such scenarios, malicious actors could steal and store encrypted data today, intending to decrypt it once quantum computing capabilities become available. This threat is particularly alarming for data with long-term sensitivity, such as financial information, intellectual property and government secrets. 

Building quantum resilience 

To counter this looming threat, organizations must:

  • Adopt new cryptographic algorithms that are secure against impending quantum attacks, known as post-quantum cryptography (PQC). The National Institute of Standards and Technology (NIST) recently released its first set of PQC algorithm standards (FIPS 203, FIPS 204, and FIPS 205) to help organizations secure their data against quantum attacks. This will require upgrades across the infrastructure.
  • Build crypto agility to adapt to new cryptographic methods without major system overhauls as threats evolve.

This requires four essential steps: 

  • Discover and assess: Map where your organization uses cryptography and evaluate quantum risks to those assets. Identify crown jewels and potential business impacts. 
  • Strategize: Discover your current cryptographic inventory, asset lifetimes versus quantum threat timeline, quantum risk levels to critical business assets, and create a comprehensive PQC migration roadmap. 
  • Modernize: Implement quantum-resilient algorithms while aligning with broader business strategies.
  • Enhance: Maintain crypto agility through regular updates, asset assessment, modular practices, ongoing education, and compliance monitoring. 

The urgency to act 

Past cryptographic migrations often took over a decade to complete. Early adopters of quantum-resistant encryption have reported far-reaching impacts, including interoperability issues, infrastructure rewrites and other upgrade challenges, leading to multi-year modernization program timelines. While the transition to PQC could be a practical problem due to its vast and fragmented spread across the digital infrastructure, the extended implementation period makes starting now essential. Organizations must prioritize crypto agility to protect critical data before quantum threats become tangible risks. 

To learn how Unisys can help your organization prepare for the coming quantum security challenges, speak with an expert today.

Contact us