PaymentsJournal
No Result
View All Result
SIGN UP
  • Commercial
  • Credit
  • Debit
  • Digital Assets & Crypto
  • Digital Banking
  • Emerging Payments
  • Fraud & Security
  • Merchant
  • Prepaid
PaymentsJournal
  • Commercial
  • Credit
  • Debit
  • Digital Assets & Crypto
  • Digital Banking
  • Emerging Payments
  • Fraud & Security
  • Merchant
  • Prepaid
No Result
View All Result
PaymentsJournal
No Result
View All Result

How To Protect Your Company in the Age of Quantum Computing

By Nils Gerhardt
March 9, 2022
in Fraud & Security, Industry Opinions, Security
0
0
SHARES
0
VIEWS
Share on FacebookShare on TwitterShare on LinkedIn
How To Protect Your Company in the Age of Quantum Computing

Concept for electronic signature, distance business, mobile phone and contract hologram image for signature. remote collaboration, copy space. Mixed media

In a pre-digital world, documents would be secured and authenticated with a handwritten signature, however this was often prone to forgery and fraud. Modern digital signatures should, hypothetically, make this impossible as they are secured by mathematical operations that could take trillions of years for even the fastest computers to crack. How is quantum computing changing things?

They are so secure that most major countries consider a digital signature to be just as valid as a written signature. Or they have until now – new generations of quantum computers are being built, and they make it possible to crack the powerful encryption that forms the ‘root of trust’ in digital life.

How do we currently create trust?

Whether you are sending an email or signing a digital contract, you will likely be using a public key infrastructure (PKI). Here, one party signs a piece of information, such as an email, with a mathematically complex ‘private key’ that only they have access to, before the recipient then verifies the signature with a public key that can be shared with anyone. Only information secured with a valid private key can be unlocked with the corresponding public key.

Private keys are composed of long strings of zeros and ones (each one a bit), or symmetrical cryptography. If a key is only two bits long then guessing the correct value is easy, but the bigger the number of bits, the harder it is to crack.

What is the threat posed by quantum computing?

Quantum computers are not constrained by the common-sense laws that govern the computers that we have all been using to up until this point. Because of quantum superpositioning, a quantum bit (qubit) can be in more states than one and by that verify different combinations. With greater numbers of qubits, symmetric and asymmetric cryptography becomes much easier to break. This means that instead of taking trillions of years, a bad actor with access to a quantum computer could break the asymmetric encryption or digital signatures securing important information at speed.

It might seem perfectly reasonable to receive an email from your employee now, but once quantum computing becomes widespread there will be no way of ensuring the integrity, authenticity, and non-repudiation of any piece of information that is secured with quantum-unsafe cryptography. The possibility that any document that anyone has signed digitally could be brought into dispute could affect billions of people.

How to prepare for a post-quantum future

Forms of security and encryption that can withstand quantum computers have been developed and are already being implemented, and fortunately there is a long way to go until today’s cryptography will be considered insecure. Before then, regulatory, and legal changes will have to be made, including possible changes to the law that would require documents to be quantum-secure before considered as legally valid.

Companies should start to look at their own inventory of documents and data, assess how they are secured, and decide whether it is necessary to protect them. Many older and invalidated documents might have no value to cybercriminals and would therefore not need to be secured, whereas others may need protecting forever.

The time when organizations will need to introduce crypto agility is coming, so it is more necessary than ever to understand it and how to work with it, instead of against it.

0
SHARES
0
VIEWS
Share on FacebookShare on TwitterShare on LinkedIn
Tags: CybersecurityElectronic signatureEncryptioneSignatureIndustry OpinionsQuantum ComputingSecurityTrust

    Get the Latest News and Insights Delivered Daily

    Subscribe to the PaymentsJournal Newsletter for exclusive insight and data from Javelin Strategy & Research analysts and industry professionals.

    Must Reads

    conversational payments

    Conversational Payments: The Next Big Shift in Financial Services  

    December 4, 2025
    embedded finance

    Inside the Embedded Finance Shift Transforming SMB Software

    December 3, 2025
    metal cards

    Metal Card Magnitude: How a Premium Touch Can Enthrall High-Value Customers

    December 2, 2025
    digital gift cards

    How Nonprofits Can Leverage Digital Gift Cards to Help Those in Need

    December 1, 2025
    stored-value prepaid

    How Stored-Value Accounts Are the Next Iteration of Prepaid Payments

    November 26, 2025
    google crypto wallet, crypto regulation

    Crypto Heads Into 2026 Awaiting Its ‘Rocketship Point’

    November 25, 2025
    Merchants Real-Time Payments, swipe fees, BNPL

    The 3 Key Trends That Will Shape Merchant Payments in 2026

    November 24, 2025
    consumer credit

    The Young and the Restless: Marketing Credit Cards to 20-Somethings

    November 21, 2025

    Linkedin-in X-twitter
    • Commercial
    • Credit
    • Debit
    • Digital Assets & Crypto
    • Digital Banking
    • Commercial
    • Credit
    • Debit
    • Digital Assets & Crypto
    • Digital Banking
    • Emerging Payments
    • Fraud & Security
    • Merchant
    • Prepaid
    • Emerging Payments
    • Fraud & Security
    • Merchant
    • Prepaid
    • About Us
    • Advertise With Us
    • Sign Up for Our Newsletter
    • About Us
    • Advertise With Us
    • Sign Up for Our Newsletter

    ©2024 PaymentsJournal.com |  Terms of Use | Privacy Policy

    • Commercial Payments
    • Credit
    • Debit
    • Digital Assets & Crypto
    • Emerging Payments
    • Fraud & Security
    • Merchant
    • Prepaid
    No Result
    View All Result