Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

The Security Implications of Quantum Technology

Quantum technology has begun and will continue to result in the introduction of new products and services into the global marketplace - all of which have security implications.

By Kevin Coleman
SEC0620-Quantum-Feat-slide1_900px
SEC0620-Quantum-slide2_900px
SEC0620-Quantum-Feat-slide1_900px
SEC0620-Quantum-slide2_900px
June 10, 2020

It is likely that you have heard the word quantum circulating around the security environment, especially in the media. An Internet search on “quantum technology” will return more than 300 million results.

There are a substantial number of estimates, forecasts and projections about the quantum technology market. For this article I took a number of those figures and averaged them for some projections. Currently, overall financial market estimates of the four main quantum technologies covered here (computing, networking, security and sensors) are all in the billion dollar range. They are all projected to grow at a double-digit compound annual growth rate. As with most emerging technologies, there are few, if any, widely accepted standards, and that is the case when discussing quantum technology.

To ensure we are all have the same understanding of this subject matter, here is some context on the four main areas of quantum technology. First, quantum technology is an umbrella term with multiple sub-categories used to describe a field of science, physics and engineering. As this field continues to evolve, it has begun and will continue to result in the introduction of new products and services into the global marketplace, all of which will have security implications. The sub-categories with high-level, general descriptions are:

  • Quantum Computing – an evolving technology that is focused on the use of principles of quantum theory. Quantum Computers uses particles (qubits) rather than bits (with values of 0 or 1). Qubits can be either of those, or a superposition of both 0 and 1 at the same time.
  • Quantum Networking – (also called the Quantum Internet) leverages quantum computing that facilitates the transmission or communication of information represented in qubits. Currently, an increasing amount of quantum network development is leveraging quantum encryption.
  • Quantum Security – is the umbrella term that leverages the unique capabilities of quantum computing to facilitate offensive and defensive security functionalities.
  • Quantum Threats – the term that refers to the ability of quantum computing to break standard and current encryption. Some believe it can also model cyberattack processes that would identify unique insights into the capability.
  • Quantum Encryption – (also called
  • quantum cryptography) applies quantum mechanics principles to encrypt data and information in a way that cannot be read by anyone other than the intended recipient. If someone accesses the data/communication (even though they can’t read it), their access results in changes that clearly indicate that an unauthorized access has taken place.
  • Quantum Sensors (Quantum IoT) – a device that leverages quantum computing and capabilities in electronic/electro-mechanical devices that uses quantum coherence to measure physical quantities or qualities, as well as leveraging quantum entanglement to advance measurements beyond what can currently be done by traditional sensors.

When you examine the current estimates of the global quantum technology market, it is clear that this has already begun to be implemented and used. The majority of current projections of quantum technology growth through 2025 has a double-digit compound annual growth rate (CAGR). There are quantum technology implications that have already begun to impact security. Physical security impact by quantum sensors and digital security impact by quantum computing, encryption and networking must be evaluated by security professionals and here is one reason why.

 

Quantum Insight

A number of countries, including the United States, Russia, Europe, Columbia, China Canada and more, have national quantum information science programs/initiatives. Recently, IBM issued a warning about the implications of quantum computer’s abilities to break current encryption capabilities. In May 2018, ZDNet published one of their statements titled, “IBM warns of instant breaking of encryption by quantum computers: ‘Move your data today.’” In April 2019, the Carnegie Endowment for International Peace published a paper titled, ‘Implications of Quantum Computing for Encryption Policy.’ In that paper they stated, “Its (quantum computing’s) future development could reshape many aspects of computing, including encryption.”

Although the impact of quantum computing on encryption has been widely discussed, there has been less attention to how quantum computing would affect proposals for exceptional access to encrypted data, including key escrow. And that is a rapidly growing concern.

Here’s why. A short time ago, the Defense Information Systems Agency (DISA) estimated the quantum computing power that would be required to break low, medium and high levels of current encryption. In addition, IBM discussed their development and advancement of their quantum computing power through the next few years. Using the information from those two organizations, I calculated quantum computing will likely be able to break current encryption. The projected quantum computing power (in qubits) needed to break current high-end encryption will likely be reached in the 2025-2026 timeframe with the lower-level of encryption likely to be reached in the 2023-2024 timeframe. Based on additional information published by Kryptera researchers about AES-128 encryption, using the same data and method as I did here, I calculated quantum computing will likely reach enough power to break AES-128 by 2026 and break AES-256 by 2027. These two calculations are examples that clearly explains why a growing number of security professionals are increasingly concerned about the implications of the evolution of quantum computing.

 

Cyberattacks

Some organizations and professionals believe that a number of cyberattacks are currently taking place to collect encrypted data and communications, so that when quantum computers have enough power, they can decrypt valuable and sensitive data and communications.

Quantum key encryption is currently available. There are a few vendors that offer quantum encryption applications for stored data and for communications. Using quantum encryption substantially reduces the projected risks of quantum computers and much more, both now and in the next few years. Currently, some analysts and researchers estimate that by 2025, the global market for quantum encryption will experience double-digit compound annual growth rate as well and the 2025 global market will grow to between $1 and $6 billion from about $300 to 500 million in 2017.

Quantum technology is a tool that is advancing solutions that will have significant consequences and challenges to a number of industries, including aerospace, energy, finance, healthcare, information technology and more.

In 2016, China launched the world’s first quantum communications enabled satellite and has demonstrated its capabilities. An increasing number of thought-leaders and organizations believe the evolution of quantum computing poses substantial security threats. Given the potential time it will take for organizations to address these rapidly evolving threats, security professionals need to move forward now.

Enterprise security professionals should develop a case for action that justifies the need to begin assessing the risks, implications and potential funding needed and time required to address the rapid evolution of quantum technology.

Taking place in parallel, enterprise security should take a continuing education program that explains, at a high-level, the use and application of quantum technology as it relates to security within their organization.

Last, enterprise security should begin to evaluate the accuracy of their enterprise’s data asset and communications inventories and determine what they need to defend against quantum computing capabilities. They should prioritize these inventories and begin to implement quantum encryption now and over the next few years.

KEYWORDS: cyber security encryption information security security threats technology

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Kevin Coleman is Chief Strategist at Independent Software and is an internationally recognized thought leader addressing the issues and opportunities of emerging technologies and their economic and global security implications. In the past year, he has trained more than 20,000 professionals on emerging technologies, including quantum computing and encryption.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Education & Training
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • partially open laptop with blue light

    The security implications of using ChatGPT in the workplace

    See More
  • Man with suitcase walking toward sunrise

    Network security implications of the Great Resignation

    See More
  • Security Implications of the Electric Smart Grid

    See More

Related Products

See More Products
  • 9780367221942.jpg

    From Visual Surveillance to Internet of Things: Technology and Applications

  • 9780367259044.jpg

    Understanding Homeland Security: Foundations of Security Policy

  • Physical Security and Safety: A Field Guide for the Practitioner

See More Products

Events

View AllSubmit An Event
  • August 7, 2025

    Threats to the Energy Sector: Implications for Corporate and National Security

    ON DEMAND: The energy sector has found itself in the crosshairs of virtually every bad actor on the global stage.
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing