Headline: China Cracks RSA Encryption Using Quantum Annealing—Global Data Security Now Under Pressure ⸻ Introduction: A Chinese research team has achieved a milestone with profound cybersecurity implications: successfully cracking a small RSA-encrypted integer using a quantum computer. Though modest in scale, this experiment signals that quantum systems are starting to undermine the very cryptographic foundations that secure today’s banking, commerce, and communication systems. The race to build quantum-resistant encryption is no longer theoretical—it’s urgent. ⸻ Key Details 🔓 Cracking RSA with Quantum Annealing • Researchers: Wang Chao and team from Shanghai University. • Hardware Used: A D-Wave Advantage quantum annealer, built by D-Wave Systems. • Achievement: The team factored a 22-bit RSA semiprime integer, a task previously unsolved on this class of hardware. 🔐 What Makes RSA Strong—and Vulnerable • RSA Encryption: Based on the difficulty of factoring large semiprime numbers (products of two primes). • Classical Challenge: Conventional computers require subexponential time to factor 2048-bit keys—considered secure for now. • Largest Cracked Classically: RSA250 (829-bit key) using supercomputers over weeks. • Quantum Approach: The Chinese team translated factorization into a QUBO (Quadratic Unconstrained Binary Optimization) problem, solvable by quantum annealing. 🧠 Why This is a Warning Shot • Early Stage, But Symbolic: While a 22-bit number is trivial by today’s standards, the methodology proves scalability potential. • First Step Toward Quantum Decryption: Demonstrates quantum annealers can be adapted for cryptographic tasks—not just optimization. • Signals Future Risk: Today’s encryption might withstand current tech, but scalable quantum systems could break RSA entirely in years, not decades. ⸻ Why It Matters • Global Cybersecurity Threatened: Banking, defense, healthcare, and internet infrastructure all rely on RSA and similar public-key systems. This experiment shows those systems may soon be obsolete. • Quantum Arms Race Accelerates: The demonstration by Chinese researchers will likely intensify global investment in both quantum computing and post-quantum cryptography. • Urgent Need for Migration: Governments and corporations must begin transitioning to quantum-resistant encryption standards, or risk catastrophic breaches in the near future. • Tactical and Strategic Implications: Countries that master quantum decryption first may gain unparalleled capabilities in espionage, warfare, and economic control. ⸻ Keith King https://lnkd.in/gHPvUttw Arzan Alghanmi
Quantum Cybersecurity Applications
Explore top LinkedIn content from expert professionals.
Summary
Quantum cybersecurity applications focus on protecting digital information against the emerging threat posed by quantum computers, which can break traditional encryption methods much faster than classical computers. As quantum technology advances, organizations must adopt new quantum-resistant solutions to secure sensitive data and maintain trust in digital transactions.
- Start migration planning: Begin assessing your current encryption assets and develop a roadmap for transitioning to quantum-safe algorithms before quantum computers become a practical risk.
- Integrate new standards: Follow guidance from leading bodies like NIST to implement post-quantum cryptography and ensure your security protocols align with evolving regulatory expectations.
- Raise team awareness: Educate cybersecurity staff and stakeholders about quantum threats and the importance of adopting quantum-resistant practices to protect your organization’s future data.
-
-
EY’s perspective on securing against #quantum #risks emphasizes that quantum #computing is rapidly evolving from a theoretical concern into a material cybersecurity threat that requires immediate strategic action. The core issue lies in the vulnerability of widely used cryptographic algorithms, such as RSA and elliptic curve cryptography, which could be broken by sufficiently advanced quantum computers. This creates a systemic risk to sensitive data, including financial information, intellectual property, and personal records. A central concept highlighted is the “harvest now, decrypt later” threat model, in which adversaries collect encrypted data today with the intention of decrypting it in the future as quantum capabilities mature. This makes quantum risk a present-day problem, particularly for data requiring long-term confidentiality. EY stresses that organizations must adopt a proactive and structured approach to quantum readiness. A foundational step is to conduct a comprehensive cryptographic inventory, identify sensitive #data, and map existing #encryption methods. This enables organizations to assess which systems are most exposed and prioritize remediation efforts. Transitioning to post-quantum cryptography (PQC) is a complex, multi-year transformation that requires careful planning, integration into existing #technology roadmaps, and alignment with emerging standards. Organizations are encouraged to build crypto-agility, allowing them to adapt encryption methods as technologies and standards evolve. EY also highlights the importance of #governance, #compliance, and #workforce readiness. Quantum resilience requires enterprise-wide coordination, including policy development, regulatory alignment, continuous monitoring, and personnel training. EY frames quantum cybersecurity not just as a technical upgrade but as a strategic #transformation initiative. Organizations that act early can strengthen resilience, improve cyber maturity, and gain a competitive advantage, while those that delay risk long-term exposure to data breaches, regulatory challenges, and erosion of #digital #trust.
-
Interesting approach alert! QUBO-based SVM tested on QPU (Neutral Atoms). A recent study, "QUBO-based SVM for credit card fraud detection on a real QPU," explores the application of a novel quantum approach to a critical cybersecurity challenge: credit card fraud detection. Here are some of the key findings: * QUBO-based SVM model: The study successfully implemented a Support Vector Machine (SVM) model whose training is reformulated as a Quadratic Unconstrained Binary Optimization (QUBO) problem. This approach could leverage the capabilities of quantum processors. * Performance: The results demonstrate that a version of the QUBO SVM model, particularly when used in a stacked ensemble configuration, achieves high performance with low error rates. The stacked configuration uses the QUBO SVM as a meta-model, trained on the outputs of other models. * Noise robustness: Surprisingly, the study observed that a certain amount of noise can lead to enhanced results. This is a new phenomenon in quantum machine learning, but it has been seen in other contexts. The models were robust to noise both in simulations and on the real QPU. * Scalability: Experiments were extended up to 24 atoms on the real QPU, and the study showed that performance increases as the size of the training set increases. This suggests that even better results are possible with larger QPUs. Practical implications: This research highlights the potential of quantum machine learning for real-world applications, using a hybrid approach where the training is performed on a QPU and the testing on classical hardware. This approach makes the model applicable on current NISQ devices. The model is also advantageous because it uses the QPU only for training, reducing costs and allowing the trained model to be reused. * Ideal for cybersecurity and regulatory issues: The study also observed that the model preserves data privacy because only the atomic coordinates and laser parameters reach the QPU, and the model test is done locally. Here the article: https://lnkd.in/d5Vfhq2G #quantumcomputing #machinelearning #cybersecurity #frauddetection #neutralatoms #QPU #NISQ #quantumml #fintech #datascience
-
Is quantum computing the next big cybersecurity threat? For decades, encryption has been our digital fortress. But quantum computing is challenging that foundation—and the stakes couldn’t be higher. Let me explain. Quantum computers, powered by qubits and quantum mechanics, have the potential to break today’s most secure encryption methods in record time. Algorithms like RSA, which protect everything from online transactions to national secrets, may soon become obsolete. Here’s the reality: → "Harvest Now, Decrypt Later": Cybercriminals are already storing encrypted data, waiting for the day quantum computers can crack it. → Encryption at Risk: Shor’s Algorithm and similar quantum innovations could dismantle current security protocols, leaving sensitive information vulnerable. → The Clock is Ticking: While quantum computers aren’t powerful enough yet, experts predict it’s only a matter of time. So, how do we prepare? → Post-Quantum Cryptography: Organizations like NIST are working on quantum-resistant algorithms to protect future data. → Quantum-Safe Protocols: Hybrid models combining classical and quantum encryption are emerging to secure transitions. → Risk Assessments and Training: Companies must identify vulnerabilities and educate cybersecurity teams on the implications of quantum advancements. The future of cybersecurity isn’t just about defending against traditional threats—it’s about staying ahead of quantum possibilities. Are we ready to face the next wave of cyber threats? Let’s discuss. 👇
-
What Google’s latest quantum experiment means for digital security right now Google’s new Quantum Echoes experiment confirms progress in verifying quantum behaviour using the 65-qubit Willow processor. This development has sparked many discussions about whether Q-day is now closer. Q-day refers to the moment when a quantum computer can break widely used encryption standards like RSA-2048 and ECC. The foundation for this concern comes from Shor’s algorithm, which shows that a sufficiently capable quantum system could factor large numbers faster than classical methods, undermining the mathematics behind public key encryption. Today’s quantum devices operate with only 100s of noisy qubits, far below the millions of logical qubits needed to threaten encryption. The concept of “harvest now, decrypt later” is central to security planning. This means that encrypted data gathered today could be decrypted once quantum capability reaches the threshold. Organisations must move toward quantum safe cryptography such as CRYSTALS-Kyber for encryption and Dilithium for digital signatures. These algorithms are now standardised and recommended. For banks, cloud services, government agencies, and critical infrastructure providers, this clarity is an urgent reminder to review security roadmaps. Taking early steps in post-quantum readiness will strengthen long-term data protection and maintain trust in digital systems. If your security strategy does not yet include post-quantum planning, now is the time to start defining that roadmap.
-
NIST has just released the initial public draft of CSWP 48, part of its Migration to Post-Quantum Cryptography project: "Mappings of Migration to PQC Project Capabilities to NIST Cybersecurity Framework 2.0 and to Security and Privacy Controls for Information Systems and Organizations." The project is here: https://lnkd.in/gRFVYh_N and the actual document [PDF]: https://lnkd.in/g4k47mP7 This is the first in a series of implementation-focused white papers under the Migration to PQC initiative. It follows the excellent second public draft of CSWP 39 (Considerations for Achieving Crypto Agility), which was released in August. Together, these documents form a growing body of practical guidance from NIST helping organizations prepare for the transition to post-quantum cryptography. CSWP 48 maps the real-world capabilities demonstrated in NIST NCCoE’s PQC migration lab environment - like cryptographic asset discovery, algorithm interoperability, and inventory management - to familiar risk frameworks: NIST Cybersecurity Framework 2.0 and SP 800-53. If you’re planning your PQC migration (and you should be), you need a way to integrate cryptographic modernization into your existing cybersecurity, risk management, and compliance processes. This document can help you with that. It shows: - How core functions like crypto discovery and inventory align with CSF outcomes and SP 800-53 controls - Which foundational governance and control practices should be in place before implementing PQC tools - Where new PQC-focused activities support broader cybersecurity goals, not just crypto modernization The public comment period is open through October 20, 2025. Consider contributing if you are in the industry. Our team at Applied Quantum has already completed our review and drafted our comments submission. In short: it’s a strong initial draft. We did suggest a few areas for future expansion such as tighter integration with supply chain management and enterprise risk strategy, but overall, this paper is already useful if you’re getting started with crypto inventory, discovery, or roadmap planning. This is exactly the kind of structured, implementation-ready guidance the community needs as we move closer to a post-quantum future. Well done to NIST and the NCCoE team. I’m looking forward to what comes next in this series. #PQC #PostQuantum #QuantumReadiness #QuantumSecurity #QuantumResilience #QuantumResistance
-
One of the global leaders in quantum computing is urging governments, companies, and critical infrastructure operators to expedite preparations for the quantum computing era. The warning highlights that today’s encryption systems could be compromised sooner than anticipated, alongside outlining the company's commitments to post-quantum security. This call to action is detailed in a new blog post by Kent Walker, president of global affairs at Google and Alphabet, and Hartmut Neven, founder and lead of Google Quantum AI. They emphasize that quantum computing serves as both a transformative scientific tool and a potential cybersecurity threat. The same machines that are expected to enhance drug discovery, materials science, and energy could also jeopardize the public-key cryptography that safeguards financial transactions, private communications, and classified data. “To put that plainly: The encryption currently used to keep your information confidential and secure could easily be broken by a large-scale quantum computer in coming years,” they state. Google is advocating for the swift adoption of post-quantum cryptography, warning that advancements in quantum computing could soon undermine the encryption securing today’s digital systems. The company has been preparing for a post-quantum world since 2016, implementing quantum-resistant protections across its infrastructure and aligning its migration plans with NIST standards set to be finalized in 2024. Google calls on policymakers to foster society-wide momentum through cloud modernization, global alignment on standards, and closer collaboration with quantum experts to prevent security surprises.
-
Canadian researchers have officially linked multiple cities through a quantum-entangled communication network — creating one of the world’s first large-scale quantum internet systems. Instead of relying on traditional encryption, this network uses entangled photons to distribute quantum keys. If anyone tries to intercept the signal, the quantum state collapses instantly, alerting both parties and rendering the stolen data useless. This gives the network a level of security that even supercomputers or future AI systems cannot break. The project uses a combination of fiber-optic links and satellite-supported quantum channels, allowing secure communication over long distances — from government agencies and financial institutions to scientific laboratories. This achievement signals the beginning of a new era in cybersecurity, one where hacks, leaks, and breaches become nearly impossible. Quantum internet isn’t about speed — it’s about rewriting the rules of trust and digital protection on a national scale. #QuantumInternet #CanadaTech #CyberSecurity #QuantumPhysics #FutureTechnology
-
Quantum Computing Isn’t a Future Threat—It’s Already Breaking Your Encryption “Google’s 2023 quantum experiment cracked RSA encryption in 15 seconds—a task that would take classical computers 300 trillion years. Your ‘unhackable’ data? It’s on borrowed time.” A Fortune 500 client discovered their “military-grade” VPNs were rendered obsolete overnight after quantum researchers leaked a blueprint to reverse-engineer RSA keys. Their fix? Post-quantum lattice-based cryptography—math so complex, even quantum machines choke. Quantum computing will rewrite security rules by: 1️⃣ Rendering RSA/ECC Encryption Obsolete (The algorithms securing 95% of today’s web) 2️⃣ Supercharging Brute-Force Attacks (Hackers could decrypt decades of stolen data retroactively) 2025 Reality Check: -> NIST’s Post-Quantum Standardization is racing to finalize quantum-resistant algorithms (CRYSTALS-Kyber is the frontrunner). -> China’s Micius Satellite already uses quantum encryption to send “unhackable” diplomatic messages. Inventory “Crypto-Debt”: Use tools like OpenQuantumSafe to flag systems reliant on RSA/ECC. Test Hybrid Systems: AWS KMS now supports quantum-safe keys paired with traditional AES-256. Is your org prepping for quantum threats—or still using SSL certs like it’s 2010? 👇 #QuantumComputing #Cybersecurity #Encryption #TechTrends #Innovation
-
Basics: Quantum Technologies for Cyber Defence Quantum computing challenges long-standing assumptions about secure communications and critical infrastructure, as current encryption methods may become vulnerable once quantum computers reach advanced capabilities Realizing this potential requires deeper exploration and collaboration across military, academic, and industrial domains This book invites readers to explore the emerging opportunities and strategic significance of quantum technologies in the context of cybersecurity It brings together the latest trends and insights into the evolution of quantum computing and quantum communication, offering valuable guidance While the path forward remains uncertain, this moment is pivotal By expanding our understanding of quantum technologies, we can position ourselves to lead with foresight rather than react in this transformative era of digital defense 🔵 Military Cybersecurity Threats 🔷 Decryption of Sensitive Data: Quantum algorithms could break current asymmetric encryption protocols, exposing classified intelligence, communications, and logistical data 🔷 "Store Now, Decrypt Later" Attacks: Adversaries are likely harvesting encrypted data today, waiting for mature quantum computers to unlock it 🔷 Critical Infrastructure Risk: Quantum-enabled attacks could disrupt military communication networks, navigation systems (GPS), and weapon control systems ⚪ Future Outlook and Key Areas of Impact ◻️ Cryptographic Threats and Security: Quantum computers will eventually break current public key cryptography. This drives an urgent shift toward "post-quantum" encryption to protect secure communications and sensitive data ◻️ Next-Generation Sensing: Quantum sensors will enable navigation in GPS-denied environments and detect hidden threats, including submarine detection through quantum gravitational sensors ◻️ Logistics and Optimization: Quantum systems will optimize complex military supply chains, personnel deployment, and logistical support, enhancing overall operational efficiency ◻️ Artificial Intelligence and Information Warfare: Quantum-enhanced AI will analyze vast data sets to identify adversarial disinformation and influence operations, helping to secure the cognitive domain of warfare ◻️ Battlefield Imaging and Detection: Quantum imaging and radar will allow detection of objects through camouflage or atmospheric obscurants e.g "Fighting in the Light" As quantum sensors detect stealth aircraft and submarines, militaries will need to adapt to being visible in previously secure areas ◻️ Investment Surge: The quantum warfare market is projected to grow significantly by 2035, with major efforts focused on quantum processors and secure networks ◻️ National Security Focus: Top powers (US, China, UK) are investing heavily to avoid a "quantum divide," aiming for superiority in AI-driven target identification and autonomous weapon systems ...
Explore categories
- Hospitality & Tourism
- Productivity
- Finance
- Soft Skills & Emotional Intelligence
- Project Management
- Education
- Technology
- Leadership
- Ecommerce
- User Experience
- Recruitment & HR
- Customer Experience
- Real Estate
- Marketing
- Sales
- Retail & Merchandising
- Science
- Supply Chain Management
- Future Of Work
- Consulting
- Writing
- Economics
- Artificial Intelligence
- Employee Experience
- Healthcare
- Workplace Trends
- Fundraising
- Networking
- Corporate Social Responsibility
- Negotiation
- Communication
- Engineering
- Career
- Business Strategy
- Change Management
- Organizational Culture
- Design
- Event Planning
- Training & Development