Addressing the Quantum Computing Threat to Cryptography (ITSE.00.017)

Addressing the Quantum Computing Threat to Cryptography (ITSE.00.017) Cryptography is an effective way to protect the confidentiality and integrity of information and to protect IT systems from cyber threat actors. Quantum computing threatens to break much of the cryptography we currently use. Quantum computers will use quantum physics to efficiently process information and solve problems that are impractical to solve using current computing capabilities. Quantum computers that are available now are not sufficiently powerful enough to break cryptography, but the technology is advancing quickly and could be available by the 2030s. However, threat actors can steal encrypted information now and hold on to it until a sufficiently powerful quantum computer is available to decrypt, read, or access the information, even well after the information was created. 2020-12-23 Communications Security Establishment Canada open-ouvert@tbs-sct.gc.ca Information and CommunicationsScience and TechnologyCryptographyRisk Management URL ENGHTML https://cyber.gc.ca/en/guidance/addressing-quantum-computing-threat-cryptography-itse00017 URL FRHTML https://cyber.gc.ca/fr/orientation/faire-face-la-menace-que-linformatique-quantique-fait-peser-sur-la-cryptographie PDF ENGPDF https://cyber.gc.ca/sites/default/files/publications/ITSE.00.017.pdf PDF FRPDF https://cyber.gc.ca/sites/default/files/publications/ITSE.00.017-fr.pdf

Cryptography is an effective way to protect the confidentiality and integrity of information and to protect IT systems from cyber threat actors. Quantum computing threatens to break much of the cryptography we currently use. Quantum computers will use quantum physics to efficiently process information and solve problems that are impractical to solve using current computing capabilities. Quantum computers that are available now are not sufficiently powerful enough to break cryptography, but the technology is advancing quickly and could be available by the 2030s. However, threat actors can steal encrypted information now and hold on to it until a sufficiently powerful quantum computer is available to decrypt, read, or access the information, even well after the information was created.

  • Publisher - Current Organization Name: Communications Security Establishment Canada
  • Publisher - Organization Section Name: Canadian Centre for Cyber Security (CCCS)
  • Licence: Open Government Licence - Canada

Data and Resources

Similar records