Erin J. Illman and Samuel Adams: A Practical Guide to Understanding Quantum Computing’s Potential Threat to Encryption

Extract from Erin J. Illman and Samuel Adams’s article “A Practical Guide to Understanding Quantum Computing’s Potential Threat to Encryption”

Encryption is one of several cornerstones of a robust information security program. Articles on quantum computing often include the compelling narrative that encryption is at risk, but as with any revolutionary technology, separating hype from reality requires nuance.

This article seeks to provide a practical understanding of the risks posed by quantum computing on modern day encryption standards. In assessing those risks, companies and individuals should consider the following nine reflections on the current state of quantum computing and potential business adjustments that may be required in light of this evolving technology.

First, quantum computing is a fundamentally different technology than regular computing. Consider how normal computers and quantum computers find the correct path out of a complex maze. On the one hand, a normal computer will attempt each possible path, remember dead ends, and eventually will find the correct solution. The more complicated the maze, the longer the computer will take to find the solution. On the other hand, a quantum computer will render a bird’s eye view of the maze and will simultaneously assess the probability of each potential path before identifying the correct solution. Unlike the normal computer, the quantum computer will solve the problem exponentially faster regardless of the size and complexity of the maze.

Read more here

ACEDS