Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

The Security Implications of Quantum Technology

Quantum technology has begun and will continue to result in the introduction of new products and services into the global marketplace - all of which have security implications.

By Kevin Coleman
SEC0620-Quantum-Feat-slide1_900px
SEC0620-Quantum-slide2_900px
SEC0620-Quantum-Feat-slide1_900px
SEC0620-Quantum-slide2_900px
June 10, 2020

It is likely that you have heard the word quantum circulating around the security environment, especially in the media. An Internet search on “quantum technology” will return more than 300 million results.

There are a substantial number of estimates, forecasts and projections about the quantum technology market. For this article I took a number of those figures and averaged them for some projections. Currently, overall financial market estimates of the four main quantum technologies covered here (computing, networking, security and sensors) are all in the billion dollar range. They are all projected to grow at a double-digit compound annual growth rate. As with most emerging technologies, there are few, if any, widely accepted standards, and that is the case when discussing quantum technology.

To ensure we are all have the same understanding of this subject matter, here is some context on the four main areas of quantum technology. First, quantum technology is an umbrella term with multiple sub-categories used to describe a field of science, physics and engineering. As this field continues to evolve, it has begun and will continue to result in the introduction of new products and services into the global marketplace, all of which will have security implications. The sub-categories with high-level, general descriptions are:

  • Quantum Computing – an evolving technology that is focused on the use of principles of quantum theory. Quantum Computers uses particles (qubits) rather than bits (with values of 0 or 1). Qubits can be either of those, or a superposition of both 0 and 1 at the same time.
  • Quantum Networking – (also called the Quantum Internet) leverages quantum computing that facilitates the transmission or communication of information represented in qubits. Currently, an increasing amount of quantum network development is leveraging quantum encryption.
  • Quantum Security – is the umbrella term that leverages the unique capabilities of quantum computing to facilitate offensive and defensive security functionalities.
  • Quantum Threats – the term that refers to the ability of quantum computing to break standard and current encryption. Some believe it can also model cyberattack processes that would identify unique insights into the capability.
  • Quantum Encryption – (also called
  • quantum cryptography) applies quantum mechanics principles to encrypt data and information in a way that cannot be read by anyone other than the intended recipient. If someone accesses the data/communication (even though they can’t read it), their access results in changes that clearly indicate that an unauthorized access has taken place.
  • Quantum Sensors (Quantum IoT) – a device that leverages quantum computing and capabilities in electronic/electro-mechanical devices that uses quantum coherence to measure physical quantities or qualities, as well as leveraging quantum entanglement to advance measurements beyond what can currently be done by traditional sensors.

When you examine the current estimates of the global quantum technology market, it is clear that this has already begun to be implemented and used. The majority of current projections of quantum technology growth through 2025 has a double-digit compound annual growth rate (CAGR). There are quantum technology implications that have already begun to impact security. Physical security impact by quantum sensors and digital security impact by quantum computing, encryption and networking must be evaluated by security professionals and here is one reason why.

 

Quantum Insight

A number of countries, including the United States, Russia, Europe, Columbia, China Canada and more, have national quantum information science programs/initiatives. Recently, IBM issued a warning about the implications of quantum computer’s abilities to break current encryption capabilities. In May 2018, ZDNet published one of their statements titled, “IBM warns of instant breaking of encryption by quantum computers: ‘Move your data today.’” In April 2019, the Carnegie Endowment for International Peace published a paper titled, ‘Implications of Quantum Computing for Encryption Policy.’ In that paper they stated, “Its (quantum computing’s) future development could reshape many aspects of computing, including encryption.”

Although the impact of quantum computing on encryption has been widely discussed, there has been less attention to how quantum computing would affect proposals for exceptional access to encrypted data, including key escrow. And that is a rapidly growing concern.

Here’s why. A short time ago, the Defense Information Systems Agency (DISA) estimated the quantum computing power that would be required to break low, medium and high levels of current encryption. In addition, IBM discussed their development and advancement of their quantum computing power through the next few years. Using the information from those two organizations, I calculated quantum computing will likely be able to break current encryption. The projected quantum computing power (in qubits) needed to break current high-end encryption will likely be reached in the 2025-2026 timeframe with the lower-level of encryption likely to be reached in the 2023-2024 timeframe. Based on additional information published by Kryptera researchers about AES-128 encryption, using the same data and method as I did here, I calculated quantum computing will likely reach enough power to break AES-128 by 2026 and break AES-256 by 2027. These two calculations are examples that clearly explains why a growing number of security professionals are increasingly concerned about the implications of the evolution of quantum computing.

 

Cyberattacks

Some organizations and professionals believe that a number of cyberattacks are currently taking place to collect encrypted data and communications, so that when quantum computers have enough power, they can decrypt valuable and sensitive data and communications.

Quantum key encryption is currently available. There are a few vendors that offer quantum encryption applications for stored data and for communications. Using quantum encryption substantially reduces the projected risks of quantum computers and much more, both now and in the next few years. Currently, some analysts and researchers estimate that by 2025, the global market for quantum encryption will experience double-digit compound annual growth rate as well and the 2025 global market will grow to between $1 and $6 billion from about $300 to 500 million in 2017.

Quantum technology is a tool that is advancing solutions that will have significant consequences and challenges to a number of industries, including aerospace, energy, finance, healthcare, information technology and more.

In 2016, China launched the world’s first quantum communications enabled satellite and has demonstrated its capabilities. An increasing number of thought-leaders and organizations believe the evolution of quantum computing poses substantial security threats. Given the potential time it will take for organizations to address these rapidly evolving threats, security professionals need to move forward now.

Enterprise security professionals should develop a case for action that justifies the need to begin assessing the risks, implications and potential funding needed and time required to address the rapid evolution of quantum technology.

Taking place in parallel, enterprise security should take a continuing education program that explains, at a high-level, the use and application of quantum technology as it relates to security within their organization.

Last, enterprise security should begin to evaluate the accuracy of their enterprise’s data asset and communications inventories and determine what they need to defend against quantum computing capabilities. They should prioritize these inventories and begin to implement quantum encryption now and over the next few years.

KEYWORDS: cyber security encryption information security security threats technology

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Kevin Coleman is Chief Strategist at Independent Software and is an internationally recognized thought leader addressing the issues and opportunities of emerging technologies and their economic and global security implications. In the past year, he has trained more than 20,000 professionals on emerging technologies, including quantum computing and encryption.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Top Cybersecurity Leaders
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Cybersecurity
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity Education & Training
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Keyboard

Marks & Spencer Hackers Tricked IT Workers Into Resetting Passwords

Person working on laptop

Governance in the Age of Citizen Developers and AI

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

September 29, 2025

Global Security Exchange (GSX)

 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Man with suitcase walking toward sunrise

    Network security implications of the Great Resignation

    See More
  • SEC0821-cyber-Feat-slide1_900px

    Emerging technology, evolving threats — Part I: Quantum computing

    See More
  • drone-enews

    Before You Pull the Trigger: The Legal Implications of Shooting Down a Drone

    See More
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!