Künstliche Intelligenz 

Produktivitätsbeschleuniger. Innovationskatalysator. Kreativer Mitarbeiter. Unabhängig von Ihrer Vision für KI bietet Unisys die Lösungen, das Fachwissen und die Tools, um das volle Geschäftspotenzial Ihres Unternehmens zu realisieren.
Entdecken

Logistics Optimization

Ladung in Bewegung halten – trotz Störungen. Erfahren Sie, wie zum Patent angemeldete KI-Modelle mit Echtzeitdaten Zeit sparen und den Umsatz steigern können, indem sie die Kapazitätsauslastung, Routenplanung und das Bestandsmanagement verbessern.
Entdecken

Beratung

Die Art der Arbeit verändert sich. Lassen Sie uns Ihr Geschäft gemeinsam weiterentwickeln. Machen Sie Ihr Unternehmen mit Consulting-Dienstleistungen von Unisys zukunftssicher und rücken Sie als Digital-First-Unternehmen voran.
Entdecken

Branchen

Ihre Branche hebt Sie von anderen ab. Sie sehen die Straße deutlich. Lassen Sie uns unsere Kräfte bündeln und diese Vision Wirklichkeit werden lassen. Unisys bringt das technische Know-how mit, um Ihr fundiertes Fachwissen zu ergänzen.
Entdecken

Kundenreferenzen

Entdecken Sie Videos und Geschichten, in denen Unisys Unternehmen und Regierungen hilft, das Leben ihrer Kunden und der Bürger zu erleichtern.
Entdecken

Forschung

Begeben Sie sich auf eine Reise in eine widerstandsfähige Zukunft und erhalten Sie Zugang zu den umfassenden Forschungsergebnissen von Unisys, die in Zusammenarbeit mit führenden Branchenanalysten und Forschungsunternehmen entwickelt wurden.
Entdecken

Ressourcen-Center

Finden, teilen und erkunden Sie Assets zur Unterstützung Ihrer wichtigsten betrieblichen Ziele.
Entdecken

Karriere

Curiosity, creativity, and a constant desire to improve. Our associates shape tomorrow by going beyond expertise to bring solutions to life.
Entdecken

Investor Relations

Wir sind ein globales Unternehmen für Technologielösungen, das sich dafür einsetzt, den Fortschritt für die weltweit führenden Unternehmen voranzutreiben.
Entdecken

Partner

Wir arbeiten mit einem Ökosystem von Partnern zusammen, um unseren Kunden hochmoderne Produkte und Dienstleistungen in vielen der größten Branchen der Welt zu bieten.
Entdecken

Sprachauswahl

Ihre aktuelle Sprachauswahl ist:

Deutsch
5 Min Read

10 seconds to break: Preparing for quantum security threats

Januar 7, 2025 / Stijn Van Impe

Short on time? Read the key takeaways

  • Quantum computers could break current encryption in seconds, presenting an unprecedented risk to the digital infrastructure where cryptography is used. 
  • Organizations should embrace a hybrid approach to post-quantum cryptography (PQC), starting with a comprehensive cryptographic posture assessment.
  • With commercial quantum computers potentially hitting the market by 2029, enterprises need to act swiftly to protect their most sensitive data from "harvest now, decrypt later" threats. 
  • Achieving crypto agility is crucial, allowing organizations to adapt their security measures while maintaining seamless operations as the quantum threat evolves. 

A perfect quantum computer could break RSA-2048, our strongest current encryption, in just 10 seconds.

Quantum computing uses the principle of quantum mechanics to process information using quantum bits (qubits) instead of traditional computer bits. While classical computers use bits that are either 0 or 1, qubits can represent both states simultaneously. This capability makes quantum computers exceptionally powerful for solving complex problems, particularly in cryptography, artificial intelligence and materials science.  

While this computational leap opens remarkable possibilities across industries, it also introduces significant security challenges. When quantum computers reach their full potential, they'll be able to break through traditional encryption methods that protect our most sensitive data.

While the timeline for the commercial availability of fully functional quantum computers remains speculative, predictions vary widely. The Boston Consulting Group forecasts a broad quantum advantage between 2030 and 2040, whereas Gartner suggests that advances in quantum computing could begin compromising current encryption methods as early as 2029, with complete vulnerability by 2034. Regardless of the exact timeline, the consensus is clear: the era of quantum computing is rapidly approaching. 

The looming quantum threat 

The imminent arrival of quantum computing brings with it the risk of "harvest now, decrypt later" attacks. In such scenarios, malicious actors could steal and store encrypted data today, intending to decrypt it once quantum computing capabilities become available. This threat is particularly alarming for data with long-term sensitivity, such as financial information, intellectual property and government secrets. 

Building quantum resilience 

To counter this looming threat, organizations must:

  • Adopt new cryptographic algorithms that are secure against impending quantum attacks, known as post-quantum cryptography (PQC). The National Institute of Standards and Technology (NIST) recently released its first set of PQC algorithm standards (FIPS 203, FIPS 204, and FIPS 205) to help organizations secure their data against quantum attacks. This will require upgrades across the infrastructure.
  • Build crypto agility to adapt to new cryptographic methods without major system overhauls as threats evolve.

This requires four essential steps: 

  • Discover and assess: Map where your organization uses cryptography and evaluate quantum risks to those assets. Identify crown jewels and potential business impacts. 
  • Strategize: Discover your current cryptographic inventory, asset lifetimes versus quantum threat timeline, quantum risk levels to critical business assets, and create a comprehensive PQC migration roadmap. 
  • Modernize: Implement quantum-resilient algorithms while aligning with broader business strategies.
  • Enhance: Maintain crypto agility through regular updates, asset assessment, modular practices, ongoing education, and compliance monitoring. 

The urgency to act 

Past cryptographic migrations often took over a decade to complete. Early adopters of quantum-resistant encryption have reported far-reaching impacts, including interoperability issues, infrastructure rewrites and other upgrade challenges, leading to multi-year modernization program timelines. While the transition to PQC could be a practical problem due to its vast and fragmented spread across the digital infrastructure, the extended implementation period makes starting now essential. Organizations must prioritize crypto agility to protect critical data before quantum threats become tangible risks. 

To learn how Unisys can help your organization prepare for the coming quantum security challenges, speak with an expert today.

Contact us