(February 21, 2025)
However, the announcement has also underscored the urgency of organizations transitioning to post-quantum cryptography. This is because quantum computers of this scale will be able to rapidly solve mathematical equations that make up current encryption protocols, such as RSA and AES.
Such a scenario will leave data, connections and components used by all organizations exposed.
Malicious actors are also believed to be already stockpiling encrypted data in anticipation of quantum technology to mature, in what are known as ‘harvest now, decrypt later’ attacks.