(SecurityBoulevard) Quantum computing attacks may have already begun. Confidential data is being exchanged using algorithms that will eventually be broken by quantum computers. Even though attackers cannot break the communications today (for we lack sufficiently powerful quantum computers), they can patiently record them for future analysis.
Quantum-resistant algorithms are an active area of research. Although NIST is helping to coordinate these efforts with its Post-Quantum Cryptography project, the current algorithms should be regarded with some suspicion at this stage.
One approach to mitigate the risk is through a hybrid approach. On our Horizons research portal, we provide a TLS example that would involve generating half the secret material using classic algorithms and half through quantum-resistant algorithms.

Subscribe to Our Email Newsletter

Stay up-to-date on all the latest news from the Quantum Technology industry and receive information and offers from third party vendors.