Quantum Computing Risks for Federal Agencies

Explore top LinkedIn content from expert professionals.

Summary

Quantum computing risks for federal agencies refer to the potential threats posed by powerful quantum computers, which could break widely used encryption methods and compromise sensitive government data. As quantum technology advances, data that is secure today may be vulnerable in the future, making it critical for agencies to plan for these emerging cybersecurity challenges.

  • Assess data sensitivity: Start by identifying which government data and systems require long-term confidentiality to prioritize protection against future quantum threats.
  • Plan for migration: Develop a roadmap to transition from current cryptographic methods to post-quantum cryptography, ensuring compliance with upcoming federal standards and timelines.
  • Build crypto-agility: Update systems and processes so that encryption methods can be switched out quickly as new quantum-safe algorithms and standards become available.
Summarized by AI based on LinkedIn member posts
  • View profile for Usman Asif

    Access 2000+ software engineers in your time zone | Founder & CEO at Devsinc

    229,292 followers

    Three weeks ago, our Devsinc security architect, walked into my office with a chilling demonstration. Using quantum simulation software, she showed how RSA-2048 encryption – the same standard protecting billions of transactions daily – could theoretically be cracked in just 24 hours by a sufficiently powerful quantum computer. What took her classical computer billions of years to attempt, quantum algorithms could solve before tomorrow's sunrise. That moment crystallized a truth I've been grappling with: we're not just approaching a technological evolution; we're racing toward a cryptographic apocalypse. The quantum computing market tells a story of inevitable disruption, surging from $1.44 billion in 2025 to an expected $16.22 billion by 2034 – a staggering 30.88% CAGR that signals more than market enthusiasm. Research shows a 17-34% probability that cryptographically relevant quantum computers will exist by 2034, climbing to 79% by 2044. But here's what keeps me awake at night: adversaries are already employing "harvest now, decrypt later" strategies, collecting our encrypted data today to unlock tomorrow. For my fellow CTOs and CIOs: the U.S. National Security Memorandum 10 mandates full migration to post-quantum cryptography by 2035, with some agencies required to transition by 2030. This isn't optional. Ninety-five percent of cybersecurity experts rate quantum's threat to current systems as "very high," yet only 25% of organizations are actively addressing this in their risk management strategies. To the brilliant minds entering our industry: this represents the greatest cybersecurity challenge and opportunity of our generation. While quantum computing promises revolutionary advances in drug discovery, optimization, and AI, it simultaneously threatens the cryptographic foundation of our digital world. The demand for quantum-safe solutions will create entirely new career paths and industries. What moves me most is the democratizing potential of this challenge. Whether you're building solutions in Silicon Valley or Lahore, the quantum threat affects us all equally – and so does the opportunity to solve it. Post-quantum cryptography isn't just about surviving disruption; it's about architecting the secure digital infrastructure that will power humanity's next chapter. The countdown has begun. The question isn't whether quantum will break our current security – it's whether we'll be ready when it does.

  • View profile for Prof Dr Ingrid Vasiliu-Feltes

    Quantum-AI Governance Expert I Deep Tech Diplomate I Investor & Tech Sovereignty Architect I Innovation Ecosystem Founder I Strategist I Cyber-Ethicist I Futurist I Board Chair & Advisor I Editor I Vice-Rector I Speaker

    51,801 followers

    EY’s perspective on securing against #quantum #risks emphasizes that quantum #computing is rapidly evolving from a theoretical concern into a material cybersecurity threat that requires immediate strategic action. The core issue lies in the vulnerability of widely used cryptographic algorithms, such as RSA and elliptic curve cryptography, which could be broken by sufficiently advanced quantum computers. This creates a systemic risk to sensitive data, including financial information, intellectual property, and personal records. A central concept highlighted is the “harvest now, decrypt later” threat model, in which adversaries collect encrypted data today with the intention of decrypting it in the future as quantum capabilities mature. This makes quantum risk a present-day problem, particularly for data requiring long-term confidentiality. EY stresses that organizations must adopt a proactive and structured approach to quantum readiness. A foundational step is to conduct a comprehensive cryptographic inventory, identify sensitive #data, and map existing #encryption methods. This enables organizations to assess which systems are most exposed and prioritize remediation efforts. Transitioning to post-quantum cryptography (PQC) is a complex, multi-year transformation that requires careful planning, integration into existing #technology roadmaps, and alignment with emerging standards. Organizations are encouraged to build crypto-agility, allowing them to adapt encryption methods as technologies and standards evolve. EY also highlights the importance of #governance, #compliance, and #workforce readiness. Quantum resilience requires enterprise-wide coordination, including policy development, regulatory alignment, continuous monitoring, and personnel training. EY frames quantum cybersecurity not just as a technical upgrade but as a strategic #transformation initiative. Organizations that act early can strengthen resilience, improve cyber maturity, and gain a competitive advantage, while those that delay risk long-term exposure to data breaches, regulatory challenges, and erosion of #digital #trust.

  • ⏳ 𝗤𝘂𝗮𝗻𝘁𝘂𝗺 𝗖𝗼𝗺𝗽𝘂𝘁𝗶𝗻𝗴 𝗮𝗻𝗱 𝗖𝗿𝘆𝗽𝘁𝗼𝗴𝗿𝗮𝗽𝗵𝘆: 𝗧𝗵𝗲 𝗧𝗶𝗺𝗲𝗹𝗶𝗻𝗲 𝗜𝘀 𝗦𝗵𝗿𝗶𝗻𝗸𝗶𝗻𝗴 𝗖𝗹𝗲𝗮𝗿 𝗣𝗮𝘁𝗵 𝘁𝗼 𝗖𝗿𝘆𝗽𝘁𝗮𝗻𝗮𝗹𝘆𝘁𝗶𝗰 𝗥𝗲𝗹𝗲𝘃𝗮𝗻𝗰𝗲 The Bundesamt für Sicherheit in der Informationstechnik (BSI) analysis is clear: Quantum computing is progressing steadily toward cryptanalytic relevance. The technical path is established: fault-tolerant Shor algorithms on superconducting systems with surface codes or ion-based systems with color codes. In 2024, key obstacles were removed. Quantum error correction works. Fault-tolerant computation is real. What remains is large-scale engineering. 𝗪𝗵𝘆 𝘁𝗵𝗲 “𝟮𝟬-𝗬𝗲𝗮𝗿” 𝗡𝗮𝗿𝗿𝗮𝘁𝗶𝘃𝗲 𝗜𝘀 𝗪𝗿𝗼𝗻𝗴 Error-correction break-even across several platforms in 2024–2025 invalidates the claim that relevant quantum computers are always decades away. A conservative estimate now points to around 15 years. This matches observed qubit growth and implies that systems with roughly one million qubits could be available in that timeframe, which is sufficient for cryptographic attacks. 𝗔 𝗦𝘁𝗿𝗮𝗶𝗴𝗵𝘁𝗳𝗼𝗿𝘄𝗮𝗿𝗱 𝗦𝗰𝗮𝗹𝗶𝗻𝗴 𝗧𝗶𝗺𝗲𝗹𝗶𝗻𝗲 The same result emerges from a modular view. Five years to design a scalable platform. Five years to produce and integrate modules. Five years to operate at full scale and quality. This is a scaling problem, not a scientific unknown. 𝗪𝗵𝗮𝘁 𝗖𝗼𝘂𝗹𝗱 𝗦𝗵𝗼𝗿𝘁𝗲𝗻 𝘁𝗵𝗲 𝗧𝗶𝗺𝗲𝗹𝗶𝗻𝗲 Advances in qLDPC codes, error mitigation, and neutral-atom platforms could reduce the horizon further. Ten years is no longer unrealistic. 𝗨𝗻𝗰𝗲𝗿𝘁𝗮𝗶𝗻𝘁𝘆 𝗜𝘀 𝗦𝘁𝗿𝘂𝗰𝘁𝘂𝗿𝗮𝗹 Multiple hardware platforms progress in parallel. Companies protect core technology. Some work happens in stealth mode. National security plays a role. A hidden qualitative leap seems unlikely today, but cannot be excluded. 𝗤-𝗗𝗮𝘆 𝗮𝗻𝗱 𝘁𝗵𝗲 𝗛𝗡𝗗𝗟 𝗥𝗶𝘀𝗸 To stay on the safe side, Q-Day planning should assume a horizon of no more than 10 years, especially for nation-state actors and cyber agencies. AI will accelerate engineering, scaling, and cryptanalysis. This increases the risk that Q-Day arrives earlier than expected. The HNDL threat—harvest now, decrypt later—is already active. Sensitive data intercepted today can be decrypted in the future. This affects critical infrastructure, government systems, and industrial communication with long confidentiality lifetimes. Protection must start now. This requires crypto-agile architectures and the early deployment of hybrid schemes combining classical and post-quantum cryptography. 𝗜𝗺𝗽𝗹𝗶𝗰𝗮𝘁𝗶𝗼𝗻𝘀 𝗳𝗼𝗿 𝗖𝗿𝘆𝗽𝘁𝗼𝗴𝗿𝗮𝗽𝗵𝗶𝗰 𝗜𝗻𝗳𝗿𝗮𝘀𝘁𝗿𝘂𝗰𝘁𝘂𝗿𝗲 Post-quantum migration is no longer optional. Waiting increases risk. 𝗢𝘂𝗿 𝗔𝗻𝗮𝗹𝘆𝘀𝗶𝘀 𝗳𝗼𝗿 𝘁𝗵𝗲 𝗗-𝗦𝘁𝗮𝗰𝗸 We at Spherity assessed these risks and transition paths for the German D-Stack, with a focus on crypto agility and long-term resilience: https://lnkd.in/eTJT4erD

  • View profile for Davide Maniscalco

    Head of Legal, Regulatory & Data Privacy Officer | Special Adv DFIR | Auditor ISO/IEC 27001| 27701 | 42001 | CBCP | Italian Army (S.M.O.M.) Reserve Officer ~ OF-2 |

    19,803 followers

    A recent comprehensive study, issued by Federal Office for Information Security (BSI) on the Status of #Quantum #Computer #Development provides a sober, evidence-based assessment of progress, risks, and timelines, particularly relevant for #cryptography, #cybersecurity, and strategic planning, with a focus on applications in #cryptanalysis. Key takeaways: • Quantum advantage is real, but still narrow Quantum computers have demonstrated advantage only on highly specialized benchmark problems. Broad, application-relevant superiority remains out of reach. • Cryptography is the primary strategic risk driver Shor’s algorithm continues to pose a credible long-term threat to RSA and elliptic-curve cryptography, while symmetric cryptography (e.g. AES) remains comparatively resilient with appropriate key lengths. • Fault tolerance is the true bottleneck Error rates not qubit counts are the dominant constraint. Scalable, fault-tolerant quantum computing requires massive overheads in error correction and infrastructure. • Leading hardware platforms are converging Superconducting qubits, trapped ions, and neutral atoms (Rydberg) currently lead the field, with rapid progress but no clear single winner. • #NISQ systems are not a near-term cryptographic threat Noisy Intermediate-Scale Quantum (NISQ) devices lack the depth and reliability needed for meaningful cryptanalysis, despite frequent hype. • A realistic timeline is emerging Based on verified advances in error correction, a cryptographically relevant quantum computer may be achievable in ~10–15 years—not decades, but not imminent either. • “Harvest now, decrypt later” remains a credible risk Sensitive data encrypted today may be vulnerable in the future, reinforcing the urgency of post-quantum cryptography migration. • Security preparedness must start now Transition planning, crypto-agility, standards development, and quantum-readiness assessments are no longer optional for governments and critical sectors. 👉 Bottom line: quantum computing is progressing steadily, not explosively, but its long-term implications for cybersecurity and digital trust demand early, structured, and risk-based action today. https://lnkd.in/eMui-D_W

  • View profile for Razi R.

    ↳ Driving AI Innovation Across Security, Cloud & Trust | Senior PM @ Microsoft | O’Reilly Author | Industry Advisor

    13,633 followers

    Reading A Practitioner’s Guide to Post-Quantum Cryptography from the Cloud Security Alliance made me pause. It highlights something many organizations still underestimate very often: modern cryptography was not designed for a future with cryptographically relevant quantum computers (CRQCs). This threat is also not theoretical. The risk comes from Store Now, Decrypt Later attacks, where encrypted data can be harvested today and broken once quantum capabilities mature. Time, not just technology, becomes the critical risk factor. Key highlights from the guide • Shor’s and Grover’s quantum algorithms threaten most public-key cryptography in use today, including RSA, Diffie-Hellman, and elliptic-curve algorithms • CRQCs may emerge by the early 2030s, putting long-term-value data at risk even if systems are secure today • Data confidentiality and integrity are both impacted by Store Now, Decrypt Later attacks • NIST published post-quantum cryptography standards in 2024 (FIPS-203, FIPS-204, FIPS-205), but enterprise adoption will take time and investment • Risk assessment must begin by identifying which data assets still hold value at “Q-Day,” not by blanket cryptographic replacement Who should take note • Security leaders responsible for long-term data protection strategies • Architects managing encryption for data at rest, data in transit, and non-repudiation • Compliance and governance teams evaluating regulatory and sector-specific quantum readiness requirements • Engineering teams responsible for cryptographic libraries, TLS, VPNs, KMS, and certificate management Why this matters Unlike most cyber threats, quantum risk is driven by time. Data intercepted today may be compromised years later. If enterprises wait until CRQCs arrive, it will already be too late for data with long-term value. At the same time, mitigation is costly, complex, and not yet fully supported by mainstream products. The path forward The guide emphasizes starting with disciplined risk assessment, identifying vulnerable cryptographic functions, and mapping technology components before committing to mitigation. Enterprises should periodically reassess risk, track technology maturity, and align mitigation efforts with CSA Cloud Controls Matrix guidance rather than rushing into premature or unnecessary changes.

  • View profile for Shellie Delaney

    Chief Information Officer (CIO) | Enterprise Transformation, Cybersecurity, Data Governance | $1.5B+ enterprise value delivered across 20+ countries

    3,650 followers

    Quantum risk will not break the network first. It will break trust first. The OSI model still explains how data moves. In a post-quantum world, it also becomes a useful lens for understanding where trust dependencies are embedded across protocols, identities, endpoints, applications, firmware, and management planes. Most leaders still look at the OSI stack as a classroom model. I look at it as an exposure map. Quantum computing does not pressure every layer equally. The most immediate pressure falls on quantum-vulnerable public-key mechanisms used for key establishment and digital signatures, including PKI, certificates, TLS handshakes, VPN key exchange, software signing, and related trust services. NIST finalized its first three post-quantum cryptography standards in 2024 and is encouraging organizations to begin transitioning now. That matters because long-lived sensitive data is already exposed to a harvest now, decrypt later risk models. NIST’s migration work specifically calls out TLS as one of the most widely deployed security protocols and a prime target for that threat. When you map that back to the OSI model, the message is clear: The problem is not Layer 1 cabling. It is the cryptographic trust fabric spanning protocols, identities, endpoints, applications, firmware, and management planes that still depends on quantum-vulnerable public-key cryptography. That is why this is not just a cryptography discussion. It is an enterprise architecture discussion. A PKI discussion. A certificate lifecycle discussion. A software signing discussion. A vendor governance discussion. An OT and IoT lifecycle discussion. NIST guidance and CISA’s OT-focused post-quantum materials both point organizations toward first identifying where quantum-vulnerable cryptography exists across hardware, software, services, firmware, PKI, IT, OT, and vendor dependencies before trying to migrate. For boards and executive teams, the real questions are straightforward: Do we know where we use quantum-vulnerable public-key cryptography? Do we know which data must remain confidential longer than our migration window? Do we know which OT, IoT, and embedded assets are not crypto-agile enough to adapt? Do our vendors have a credible roadmap for PQC in certificates, TLS, VPNs, browsers, firmware, and signing? The OSI model still explains how data moves. In 2026, it can also help explain where trust dependencies may fail first if cryptographic migration is delayed. Quantum readiness is not about hype. It is about rebuilding the trust layer before the threat catches up. #Cybersecurity #PostQuantumCryptography #EnterpriseArchitecture

  • View profile for Keith King

    Former White House Lead Communications Engineer, U.S. Dept of State, and Joint Chiefs of Staff in the Pentagon. Veteran U.S. Navy, Top Secret/SCI Security Clearance. Over 16,000+ direct connections & 44,000+ followers.

    43,862 followers

    Quantum Threat Accelerates: Encryption May Be Breakable with Far Fewer Qubits New research suggests that the timeline for quantum computers to break widely used encryption methods may be much shorter than previously believed. A recent study indicates that elliptic-curve cryptography, a cornerstone of modern digital security, could potentially be cracked with around 10,000 qubits, a dramatic reduction from earlier estimates of 20 million. This shift is driven by advances in quantum error correction and system architecture. Researchers have demonstrated that non-local communication between qubits can significantly improve fault tolerance, allowing smaller quantum systems to perform complex calculations more reliably. This means that the barrier to executing powerful quantum algorithms, such as those capable of breaking encryption, may be far lower than assumed. The implications are profound for global cybersecurity. Elliptic-curve cryptography underpins everything from secure communications and financial transactions to government and military systems. If quantum machines reach the revised threshold, many of today’s encryption standards could become vulnerable far sooner than anticipated. While current quantum computers remain below this capability, progress in the field is accelerating. The combination of improved qubit quality, scaling efforts, and enhanced error correction suggests that the gap between theory and practical application is narrowing. This creates urgency for organizations to transition toward quantum-resistant cryptographic frameworks. The broader impact is strategic and immediate. Governments, enterprises, and infrastructure operators must begin preparing for a post-quantum security landscape now, rather than reacting after a breakthrough occurs. The emerging reality is clear: quantum computing is not only a technological revolution but also a potential disruption to the very foundations of digital trust. I share daily insights with tens of thousands followers across defense, tech, and policy. If this topic resonates, I invite you to connect and continue the conversation. Keith King https://lnkd.in/gHPvUttw

  • View profile for Rich Campagna

    SVP Products, Palo Alto Networks

    17,778 followers

    Quantum computing is moving from "science fiction" to "business reality" faster than most predicted. Two recent papers have fundamentally shifted the timeline for when we need to care about Quantum-Safe security: 1️⃣ The "10,000 Qubits" Milestone: New research shows that we can execute Shor’s algorithm—the math that breaks today’s encryption—with far fewer resources than previously thought. By using reconfigurable atomic qubits, the hardware requirements for cracking RSA-2048 have dropped by nearly 20x. 2️⃣ The "9-Minute" Crypto Warning: Google’s latest whitepaper highlights a terrifying reality for digital assets. Under advanced quantum scenarios, the encryption protecting a cryptocurrency wallet could be cracked in under 10 minutes. This puts billions in "dormant" assets at immediate risk of "at-rest" attacks. The Bottom Line: The "Q-Day" window is shrinking. It’s no longer about if a quantum computer can break your encryption, but when your current migration timeline will run out. How do we respond? We can't just flip a switch on "Q-Day." For many organizations, becoming quantum safe is a multi-year journey. This is where Palo Alto Networks Quantum-Safe Security comes in. Instead of a manual, multi-year overhaul, we provide a path to Agentic Resilience: - Continuous Discovery: It automatically maps your "cryptographic bill of materials" (CBOM), identifying exactly where vulnerable RSA and ECC algorithms are hiding in your network. - Risk Prioritization: It correlates your encryption strength with business criticality, telling you exactly which high-value assets need to move to Post-Quantum Cryptography (PQC) first. - Real-Time Remediation: For legacy systems that can’t be easily upgraded, a "Quantum-Safe Proxy" re-encrypts vulnerable traffic into post-quantum algorithms (like ML-KEM) at the network edge. The transition to a quantum-safe future is a marathon, but the starting gun has already fired. Learn how to take your first steps at the link in the comments.

  • View profile for Sean Connelly🦉
    Sean Connelly🦉 Sean Connelly🦉 is an Influencer

    Architect of U.S. Federal Zero Trust | Co-author NIST SP 800-207 & CISA Zero Trust Maturity Model | Former CISA Zero Trust Initiative Director | Advising Governments & Enterprises

    22,655 followers

    🚨 New OMB Report on Post-Quantum Cryptography (PQC)🚨 The Office of Management and Budget (OMB) has released a critical report detailing the strategy for migrating federal information systems to Post-Quantum Cryptography. This report is in response to the growing threat posed by the potential future capabilities of quantum computers to break existing cryptographic systems. **Key Points from the Report:** 🔑 **Start Migration Early**: The report emphasizes the need to begin migration to PQC before quantum computers capable of breaking current encryption become operational. This proactive approach is essential to mitigate risks associated with "record-now-decrypt-later" attacks. 🔑 **Focus on High-Impact Systems**: Priority should be given to high-impact systems and high-value assets. Ensuring these critical components are secure is paramount. 🔑 **Identify Early**: It's crucial to identify systems that cannot support PQC early in the process. This allows for timely planning and avoids migration delays. 🔑 **Cost Estimates**: The estimated cost for this transition is approximately $7.1 billion over the period from 2025 to 2035. This significant investment underscores the scale and importance of the task. 🔑 **Cryptographic Module Validation Program (CMVP)**: To ensure the proper implementation of PQC, the CMVP will play a vital role. This program will validate that the new cryptographic modules meet the necessary standards. The full report outlines a comprehensive strategy and underscores the federal government’s commitment to maintaining robust cybersecurity in the quantum computing era. This is a critical step in safeguarding our digital infrastructure against future threats. #Cybersecurity #PQC #QuantumComputing #FederalGovernment #Cryptography #DigitalSecurity #OMB #NIST

  • View profile for Jaime Gómez García

    Global Head of Santander Quantum Threat Program | Chair of Europol Quantum Safe Financial Forum | Quantum Security 25 | Quantum Leap Award 2025 | Representative at EU QuIC, AMETIC

    17,298 followers

    📢 Securing Tomorrow, Today: Transitioning to Post-Quantum Cryptography Preparing for the quantum threat should be considered an integral aspect of cyber security risk management. A joint statement from partners from 18 EU member states, mostly national security agencies from EU countries including Federal Office for Information Security (BSI), CCN-CERT Centro Criptológico Nacional, Ministerie van Binnenlandse Zaken en Koninkrijksrelaties, and more. Highlights: 👉 Preparing for the quantum threat should be considered an integral aspect of cyber security risk management 👉 Two main threat scenarios are currently of concern: 🧨 the 'store-now, decrypt-later' scenario 🧨 long migration periods 👉 The organizations urge public administration, critical infrastructure providers, IT providers, as well as all of industry, to make the transition to post-quantum cryptography a top priority and start the transition now. 👉 Steps to take: ✔ perform a quantum threat analysis consisting of an inventory of the assets they need to protect as well as the applications that use cryptography ✔ develop a risk-oriented roadmap for executing the transition ✔ plan the migration ✔ promote the continuation of the extensive research on post-quantum cryptography and standardization efforts The position paper concludes encouraging active engagement from all EU member states in this work stream throughout the process of preparing a roadmap for the transition to Post-Quantum Cryptography to ensure the quantum resilience of the European Union’s digital infrastructures. https://lnkd.in/digw4kcb #cybersecurity #postquantum #cryptography #risk

Explore categories