WEF Transitioning To A Quantum Secure Economy 2022
WEF Transitioning To A Quantum Secure Economy 2022
with Deloitte
Transitioning to a
Quantum-Secure Economy
WHITE PAPER
SEPTEMBER 2022
Images: Getty, Unsplash
Contents
Foreword 3
Executive summary 4
Introduction 5
6.2 Pathways and focus areas for future attention and innovation 28
Conclusion 30
Contributors 31
Glossary 33
Endnotes 34
Disclaimer
This document is published by the World Economic Forum © 2022 World Economic Forum.
as a contribution to a project, insight area or interaction. The All rights reserved. No part of this
findings, interpretations and conclusions expressed herein are publication may be reproduced or
a result of a collaborative process facilitated and endorsed transmitted in any form or by any
by the World Economic Forum but whose results do not means, including photocopying and
necessarily represent the views of the World Economic Forum, recording, or by any information
nor the entirety of its Members, Partners or other stakeholders. storage and retrieval system.
Foreword
Quantum technologies continue to fascinate and Building an understanding among senior leaders of
their applications have the potential to transform the risks and immediate steps required to ensure a
our lives. The quantum computing age is growing secure quantum transition is therefore a critical priority
ever closer and it could render obsolete some identified by both the World Economic Forum’s Global
of the encryption on which most enterprises, Future Council on Cybersecurity and the community
digital infrastructures and economies currently engaged in the Future Series: Cyber 2025 initiative.
rely. Addressing this issue requires prompt action at
the national and global levels. Over the past year the Forum, in collaboration with
Deloitte, has worked with a community of senior
Unlike Y2K, the impact of a corresponding “Y2Q” executives and experts from business, academia,
(year to quantum) is fairly well known, but the government and non-profit organizations to develop
timeline is unpredictable. Further, there is a belief a deeper understanding of the emerging risks and
that data is being harvested now for decryption to provide insights and guidance to ensure a secure
later once quantum computers are available. The transition to the quantum economy. We hope this
uncertainty surrounding when quantum will be report will help drive individual and collective action
mainstream makes it hard to discern the right time globally to address the key security challenges
to take action and tends to lead to de-prioritization while realizing the transformative potential of
in favour of more immediate issues. quantum technologies.
Quantum computing promises transformative – Build awareness around the quantum threat,
simulation and modelling capabilities across by educating senior leaders on the systemic
a diverse range of industries. However, these impact. The quantum threat feels far away and
advances in computational power will also introduce largely abstract for many organizations. To combat
significant risks via the potential threat of disruption this, organizations will need to face what is known,
to some widely used encryption standards. While but also accept there are implications that are still
definitive timelines for both quantum computing unknown. Conducting initial quantum readiness
applications and the associated quantum assessments will help leaders determine the
cybersecurity threats have not yet fully materialized, specific threats their organizations face. Executive
organizations must act now to evaluate their buy-in is key to ensure the quantum transition
readiness to adapt to the quantum threat. attracts appropriate investment and prioritization.
The quantum threat is expected to have a large and – Plan and prepare by adopting a quantum-safe
disruptive impact on the current digitally dependent strategy and transition roadmap. Addressing
economy. An orderly response is highly desirable the quantum threat requires organizations to plan
over a reactive one. It is a business imperative that and create a timeline that sequences immediate,
organizations start to think about what a secure near-term (3-5 years) and longer-term actions.
quantum transition could look like and understand Organizations should consider adopting a
their cryptographic and data exposure to avoid “crypto-agile” posture, enabling them to readily
disruption of business operations. The unknown transition cryptographic capability. This will help
timeline of this quantum risk – which could lead to a them prioritize a transition to quantum security as
“not me, not now” response – may impose a more technology advancements and threat knowledge
significant impact than is necessary. continue to evolve.
This white paper arises from in-depth discussions – Initiate the transition, leveraging hybrid
between senior leaders and quantum experts solutions. Organizations adopting quantum-
from the quantum security working group, part resistant security will more than likely leverage
of the quantum computing network of the World hybrid solutions that integrate both classical
Economic Forum. The paper provides guidance for and quantum-ready approaches. This will give
a secure quantum transition, which organizations organizations some assurance that existing
need to embrace now to avoid playing catch-up security remains intact, while overlaying that
with the technology. To achieve this transition, security with relatively new post-quantum
organizations need to: cryptography algorithms.
Quantum computing has the potential to drive Some of the applications being considered include
transformational changes across industry and quantum machine learning, simulation of complex
society. The growing interest and investment systems and modelling of material science.
in developing quantum computing by major However, the arrival of quantum computing and its
technology corporations, national governments ability to speed up certain complex mathematical
and venture capitalists highlight its importance. computations could render obsolete the current
In 2021, the quantum computing market earned encryption on which most enterprises, digital
$490 million, with estimates of public funding infrastructures and economies rely. Quantum
surpassing $24 billion.1 Private investments in technologies therefore represent a significant and
quantum start-ups have skyrocketed to more tangible risk to digital economies, with potential
than $1 billion.2 The race to unlock the potential global impact. If this risk materializes, it could
of quantum computing has the potential to drive overshadow the great benefits that quantum
trillions of dollars of value across the global economy technologies could offer mankind. It has even
during the coming years, with cybersecurity market recently been referred to as the “Encryptogeddon”.4
spending forecast to grow $3 billion per year to
reach $30 billion by 2030.3 These investments The timeline associated with the maturity of
will likely drive further developments around quantum computing is still uncertain, but recent
diverse quantum security solutions, such as advancements in the field have amplified the need
post-quantum cryptography, quantum random to take near-term actions to prepare a secure
number generation, quantum key distribution transition to the quantum era. For example, the
The significant
and quantum communication technologies. Canadian company Xanadu Quantum Technologies
risk to digital reported in June 2022 that Borealis, their quantum
economies posed The quantum computing age unlocks multiple computer in the cloud, can perform a single task
by quantum optimization and simulation opportunities across 50 million times faster than a classical computer,
computing has led industries, through its ability to solve specific improving on the early results demonstrated by
it to be dubbed mathematical problems in a significantly faster and China’s quantum computer in June 2021 and
“Encryptogeddon”. more efficient manner than was previously possible. Google in 2019.5 6 7
Sustainability Transformative
capabilities
ntability Acc
ccou es
A sib Access to
d il hardware
Standardization
ity
o
infrastructure
go
Tra
on
Core
Comm
nspar
ency
values
In clu s
Open
nce
Privacy
iv e
innovation
ce
ne
s
al
efi
s
Eq n- m
u it a b il
it y No
Creating
Cybersecurity awareness
Workforce development
and capability-building
– Present steps and a consensus-based framework – Focus on systemic risks that are not created or
to help guide organizations throughout the amplified by the quantum threat and quantum
transition towards a quantum-safe environment security solutions
– Develop guidance for senior business leaders, – Provide detailed sectoral or geographical
cyber leaders and policy-makers to manage the perspectives in relation to the exploration or
risks and secure the quantum transition mitigation of identified systemic risks
This report comprises six chapters that discuss the Chapter 4: What is required from different
potential impact of quantum on security, as well stakeholders? Offers guidance for various
as actions to take to ensure a secure transition audiences to initiate the post-quantum transition.
towards a quantum economy:
Chapter 5: What technologies are available to
Chapter 1: Why prioritize quantum security? address the quantum threat? Defines the current
Introduces quantum computing, the threats, technology landscape and differentiates
opportunities and timeline. key technology approaches.
Chapter 2: How to begin the quantum-safe Chapter 6: What are the focus areas for future
transition? Discusses some of the independent attention? Identifies future research, investment
timelines for key drivers and identifies actions that and governance needs and opportunities.
can be taken now.
Emerging technologies such as artificial intelligence most notably, it enabled the invention of the
(AI) and cloud computing consistently promise semiconductor transistor, which is the cornerstone of
to address our most pressing problems, giving the computer industry and is considered the highlight
many a sense of both inspiration and scepticism. of the first quantum revolution.
Quantum technologies are no exception. For
many, the word “quantum” is more likely to More recently, a second quantum revolution has
conjure thoughts of science-fiction than one of been underway, garnering attention for advanced
today’s news headlines. Yet, what are quantum applications such as quantum computing,
computers? When will the quantum threat become quantum sensing and quantum communications.
mainstream? And most importantly, what is the As opposed to the first quantum revolution where
potential impact of the quantum threat? quantum properties were used to manufacture
superior devices (lasers, transistors, etc.), the
Quantum
Quantum mechanics, first conceived at the beginning second quantum revolution refers to the storage
mechanics enabled of the 20th century, explains foundational concepts and processing of information in quantum devices.
the invention of of how basic matter exists, changes and interacts This emerging field of quantum information science
the semiconductor over time. Those initial discoveries fascinated will have the capacity to drive high-impact use
transistor, the scientists for the next several decades and inspired cases in the future. However, its transformative
cornerstone of the ground-breaking innovations such as lasers and power is still limited due to the infancy of today’s
computing industry. magnetic resonance imaging systems. Perhaps quantum hardware.
1 0
z
or
x y
0 1
Can be only in one state Can be in a superposition state,
at the same time, 0 or 1 by being in one of multiple states
of 0 and 1 at the same time
Experts forecast The field of quantum computing is still in its infancy Regardless of this timeline, organizations need to
the quantum threat and the machines we have today are still far from take a risk management approach and understand
will materialize in being mainstream and threatening cybersecurity. that the timeline is accelerating towards the
Leading experts in the field forecast the quantum “shelf-life” and “danger zone” (see Figure 3).
10 years – but it
threat will materialize in about 10 years.12 This With migrations of previous algorithms taking
could be sooner,
timeline, although uncertain, could arguably be approximately 10 years, it is vital for organizations
given the secrecy even shorter – especially given the asymmetry of to pioneer the shift to quantum-safe cryptography
of certain nations information and secrecy across the globe regarding to thrive and stay protected from cyberattacks.
looking for strategic the advancements in quantum computing by
advantage. certain nations looking for strategic advantage.
When quantum computing gains traction, it will used to break the factorization problem in a matter
break some of the current cryptographic algorithms. of hours or even minutes,14 rendering public-key
A great deal of the security of our digital society cryptographic algorithms useless.15 Grover’s algorithm
relies on these cryptographic algorithms to can be used to speed up the search for the secret
guarantee the confidentiality (data privacy) and key used by symmetric cryptography to guarantee
integrity (data accuracy) of our message exchanges, the confidentiality of most of our data exchanges and
online banking operations and stored data in the storages, as well as the search for the passwords we
cloud. Most of these algorithms’ security builds use to secure our personal accounts.16
on mathematical problems that are considered
intractable on classical computers but that become The impact of the quantum threat does not stop
solvable with quantum computers. This threatens with cryptographic algorithms, as its cascading
the security of the cryptographic algorithms that are effects can be potentially large. With infrastructure
a fundamental part of our digital lives. breakdowns being one of the main concerns for
cyber leaders, this places it among the highest
There are currently two algorithms – Shor and challenges business organizations face in the
Grover – that quantum computers can use to break future.17 The examples below illustrate some of
the hard mathematical problems that underpin some the systemic risks around how the quantum threat
of our existing cryptography. Shor’s algorithm can be could affect our daily lives:
20 billion digital The World Economic Forum’s Global Future Council machines, TV set-top boxes, point-of-sale systems,
devices will need on Quantum Computing estimates that 20 billion smartphones and a host of other devices and
to be upgraded digital devices will need to be upgraded or replaced systems. As a result, algorithm replacement can be
or replaced with with post-quantum cryptography in the next 20 extremely disruptive and take years to complete;
post-quantum years.19 This upgrade is not a simple switch-out or typically, it requires upgrading or replacing
patch, because cryptography is entrenched across components of the cryptographic infrastructure.
cryptography in
enterprises, often in physically remote systems. For This is one of the reasons organizations must start
the next 20 years.
example, migrating to post-quantum cryptography now to consider what their migration plan should be
will affect the performance requirements of and assume a posture of crypto-agility that would
microprocessors that are embedded in ATM allow them to quickly update.
Not all data Build awareness of the quantum threat, by Take a fresh look at cryptographic governance.
generated today understanding the risk that quantum computing Preparing cryptographic systems for the quantum
will still be relevant poses to existing cryptographic and encryption computing era is a major technological challenge.
when the quantum systems, as well as the macro impact to the In the same way that agile software delivery
threat materializes. organization’s business model. This awareness practices helped create more adaptable technology
will help to educate senior leaders from the public organizations, so a more agile approach to
and private sectors, including boards, C-suites, cryptographic governance can create more flexible
government heads, policy-makers and operational- businesses and infrastructure that will quickly pivot
level executives, to gain broad support for investments and reprioritize in response to evolving security
in a quantum-safe cryptography infrastructure. challenges and requirements.
Plan and prepare for the quantum threat, by Assess readiness for and work towards greater
assessing the different areas of the digital and crypto-agility. A more crypto-agile organization
infrastructure environment to devise a prioritized is one that can efficiently update cryptographic
action plan. algorithms, parameters, processes and technologies
to better respond to new protocols, standards and
Understand the lifetime of data. As it is expected security threats, including those leveraging quantum
to take some years before quantum computers computing methods. To assess organizational
can break cryptography, not all data generated readiness for crypto-agility, consider the following:
today will still be relevant when the quantum threat
materializes. It is therefore important to classify – Data and cryptographic assets. To help respond
the longevity of data in order to assess whether to systemic changes, such as new algorithms,
protection against the quantum threat is needed in organizations should provide an account of their
the short term. For example, state secrets must be data assets to understand how they are currently
kept secret for a long time (even indefinitely), while cryptographically protected. This means
the digital signature for a one-year contract is not inventorying and prioritizing cryptographically
likely to be relevant after the contract expires. protected data, transactions and other assets
– Cryptographic keys. To identify and prioritize Initiate the transition, leveraging hybrid solutions.
future vulnerabilities, business leaders should Organizations adopting quantum-resistant security
review the types of cryptographic keys being technologies will more than likely leverage hybrid
used, their characteristics and their locations approaches that integrate both classical and
in existing computer and communications quantum-ready solutions. This will give organizations
hardware, operating systems, application reassurance that existing security remains intact,
programs, communications protocols, key while overlaying that security with relatively
infrastructures and access control mechanisms. new post-quantum cryptography algorithms.
Organizations should set their short-, mid- and
– Infrastructure limitations. Quantum-safe long-term goals, review the different deployment
cryptography may use substantially more scenarios, opportunities and challenges they may
processing power than current cryptographic face, and fashion strategies that are fit for purpose.
Like several organizations, Salesforce is currently NIST and collaborating with potential partners to
making the quantum-secure transition. To build internal tools to address and mitigate the
understand the potential impact and to define an quantum threat. These steps allow Salesforce
action plan, the first step involves a comprehensive to experiment with different potential public-key
audit of all cryptographic assets. At the same time, standards and determine their impact on the
Salesforce is tracking public-key standards from environment, while implementing new tools.
Organizations can start assessing the impacts that quantum risk might have on their operations
before the quantum threat actually reaches them. They can set short-, medium- and long-term
goals today to manage the risk and ensure a smooth quantum transition (see Figure 4).
– Get familiar with the impact of – Conduct larger-scale experiments – Transition to quantum-secure
quantum computing with quantum applications ecosystem
– Conduct quantum readiness and – Invest in proofs of concept (e.g. – Adopt fully agile cryptography
quantum risk assessments risk prediction) management
– Create a quantum roadmap – Implement quantum solutions
– Trial small-scale proofs of concept where they provide added value
(e.g. crypto-agility)
– Inventory cryptography assets
(very time-intensive)
– Assess quantum opportunities
and their value to the organization
As part of their vision to be ready for quantum encrypt network traffic. Over time, this integration
risks to network security, Fujitsu partnered with will incorporate post-quantum algorithms, as these
Quantinuum on a software-defined wide area become approved by NIST and standardized.
network (SD-WAN) proof of concept (PoC) which
incorporated cryptographic keys that would remain The combination of new, approved algorithms
secure and unpredictable, even as powerful and the PoC approach for their configuration,
quantum computers are developed in the future. integration and security benefits on cloud
will provide enhanced SD-WAN security and
The project focused on integrating Quantinuum’s
benefits for cloud-hosted application solutions.
key generation platform into Fujitsu’s SD-WAN
PoC infrastructure. The key generation platform The technical goal of deploying the solution is
uses quantum computers to generate probably a reduction in the potential for data breaches,
near-perfect cryptographic keys using a verified should the quantum risks to cryptography be
and patented quantum process. Keys are delivered realized, thanks to the strong guarantee of
securely to the SD-WAN nodes and used to cryptographic key strength.
There is often a debate on when is the right time National cybersecurity institutions – such as the
to deploy emerging technologies – is it best to be US’s National Security Agency (NSA), the US’s
an early adopter of proprietary technology, to wait Cybersecurity and Infrastructure Security Agency
for consensus standards to evolve, to rely upon the (CISA), the Agence nationale de la sécurité
use of frameworks that provide guidance on how des systèmes d’information (ANSSI – France’s
to leverage standards, or to wait until regulators computer security service), the Bundesamt
force change? für Sicherheit in der Informationstechnik (BSI
– Germany’s Federal Office for Information
In the case of quantum, underlying standards Security), Canada’s Communications Security
Hybrid and/ have been under development by NIST since Establishment (CSE), and the UK’s National Cyber
or phased 2017. NIST announced the initial “winners” in July Security Centre (NCSC) – have started to issue
approaches to 2022,16 which will now be developed into Federal implementation guidance and help organizations
Information Processing Standards (FIPS). Some make decisions on relevant activities.
the quantum
organizations will rely upon this directly, much as
transition offer the they do with FIPS 140-2 and related examples of Nevertheless, some organizations may wait (either
best balance for this type of document. Other organizations may deliberately or inadvertently) until they are obliged
most companies seek to wait until NIST has offered up the material to act, either by regulation or in response to an
between potential for an international standard under the International actual reported attack on encryption by a quantum
impacts and Organization for Standardization (ISO) or the computer. Figure 5 presents four potential
opportunities. Internet Engineering Task Force (IETF). scenarios for adoption.
Do nothing Organizations that believe – No protection from quantum; – No upfront financial outlay
quantum computing is still at full impact on the digital
an early stage and the benefits infrastructure
of investing and embarking on
– Disruption of business
the quantum transition are yet
operations and processes
to be defined.
– High risk of requiring a
reactive, direct changeover
when the threat materializes
Adopt a hybrid As standards are created, it – Vulnerability of classical – Provides legacy support
approach is possible to have classical, solutions to old solutions
quantum and post-quantum
– Low to medium financial – Allows agility and flexibility
cryptography solutions in a
impact to adapt quickly to new
hybrid mode. The security of
solutions
the complete solution is as
good as the strongest element. – Provides classical
protection while PQC
algorithms being further
stress tested
Direct changeover Make a replacement of all – High financial impact – large – Direct enhancement of
impacted solutions, replacing migrations can have higher security against quantum
them with quantum and post- costs risks for smaller, novel
quantum cryptography. and less complicated
– Large disruption of business
environments
operations and processes
Each organization will have to assess its own cost versus impact of
quantum risk activities, relative to other priority strategic cyber initiatives,
determine which scenario is best and budget accordingly.
Healthcare data remains relevant for years – and 1) overlay legacy network infrastructure, 2) support
often decades. This puts the healthcare industry at expected network performance and 3) maintain
risk of “harvest now, decrypt later” attacks. After communication with non-upgraded equipment.
learning about the quantum threat, the leadership
at a large healthcare provider sought help to start To begin the phased approach, a combination
a phased approach to adopting post-quantum of quantum random number generator, post-
cryptographic standards. quantum cryptosystems, protocols and traffic
monitoring software was deployed in a single
A network of clinics within the company has pilot clinic to demonstrate quantum-resilient
transmitted patient records between physical data transmission. After successful testing, the
locations continuously for the past two decades. healthcare provider is now rolling out the solution
Given the mix of legacy and modern equipment, to a broader number of clinics to ensure a phased
any proposed solution should: and complete transition.
The World Economic Forum’s Quantum-Secure The framework consists of four layers – Define,
Transition Framework provides guidance for Identify, Plan and Execute – that help organizations
organizations in defining their quantum security structure their goals and objectives for a secure
transition, by identifying the quantum risks and quantum transition (see Figure 6).
their timelines against each organization’s unique
technology environment and digital ecosystem. It is
a consensus-based framework developed by the
Forum’s quantum security community.
Define Enable organizations to transition to quantum-secure ecosystems and mitigate quantum threats
2 Quantum threat
Drivers for change (see Fig. 8)
Cryptography
Identify 1 materialization 2 Regulatory pressures 3 Market dynamics 4 management needs
Plan Talent & education (see Fig. 9) Governance & processes (see Fig. 10) Technology & infrastructure (see Fig. 11)
3 Driver: Market dynamics, driven by early adopters who influence others to become quantum-secure
After early adopters implement quantum-safe solutions, the rest of the market is likely to follow
4 Cyber risk management initiatives that are not driven by quantum but by other current or
emerging threats and operational challenges
Knowledge pool
While the materialization of the quantum threat is still several years away, organizations can start equipping their
talent with the right knowledge on quantum security. This includes addressing the talent gap.
– Create a realistic timeline now that showcases the time and – Lack of understanding around the quantum timeline
effort it will take to transition, in order to educate leaders can be mitigated by demystifying quantum and framing
who may believe the threat is too far away to act now it in relation to the corporate business model
Executive support
Projects and transitions revolve around getting proper support from senior leadership to
enable appropriate sponsorship, resources and mandate for change.
Cryptographic champions
Cryptographic champions can look beyond separate functions and amplify the quantum
security message at the team level and coordinate adaptation across the organization.
– Integrate the risk of quantum into your general risk management framework
to understand the level and likelihood of impact across your ecosystem
Product security
Relates to the security of software development or other product design. When conducting product security assessments,
teams must take into account the security of the cryptographic protocols in use for their organization’s products.
Enterprise security
Helps organizations understand whether they are secure and implementing sufficient measures to safeguard
their business and people. Within enterprise security, organizations need to prioritize quantum risk.
Third-party security
Protects an organization against cybersecurity threats that originate from the supply chain, vendors or customers.
Assessments may be needed to gain insights into how the quantum threat changes the threat landscape.
– To overcome a heavy dependency on vendors and their – To tackle budgetary restrictions, piloting use cases
solutions, organizations can begin to have conversations with can demonstrate the opportunities that quantum
vendors about the quantum threat to gain realistic expectations can bring to your business
Financial institutions deal with very sensitive data, 2. Identify and assess use cases for random
including customer data and information regarding number generation within the bank’s services
transactions and contracts. Regulators often and the benefits of having a quantum-based
require sensitive data to be stored for long periods, random number generator solution, such as
making security a key requirement. The advent of verifiability and improved performance. These
quantum threats could therefore have implications use cases aim to explore novel approaches
on the security of financial institutions. To prepare to improve the overall quality of the bank’s
its enterprise against quantum threats, Banco random number generation in key areas,
Santander has been experimenting with a number including cryptography, financial simulations
of strategic research projects, outlined below. and machine learning.
1. Understand the current risks of critical 3. Initiate implementation of cryptographic
functions handling sensitive information, by agility by developing “cryptography-as-a-
mapping the potential threats, and develop service” to provide the bank with the ability
a quantum readiness framework for a to move services over to post-quantum
prioritized transition. This framework helps build cryptography, as well as the opportunity to
a roadmap to developing an understanding of make modern cryptographic automation
the organization’s confidential cloud and digital more widely and easily available within the
signature resilience. organization.
Ecosystem cooperation
Cooperation between ecosystem parties will help resolve or mitigate systemic risks
The financial services industry is one of the most be harvested today and decrypted tomorrow by
heavily regulated and relies on trust relationships malicious actors using quantum computers.
between customers and financial companies for
its survival. The quantum threat puts at risk the We then looked at the benefits of implementing
backbone of today’s financial infrastructure and a quantum key distribution (QKD) solution by
worldwide economy in the coming years. developing a multi-phase playbook to define
requirements for the potential roll-out. This allowed
To educate multinational investment management us to establish a two-phase approach that defines
and financial services companies on the risk profile a QKD simulator enabling the bank to assess the
and how to ensure a quantum-safe transition, security and performance potential, followed by the
we have conducted detailed analysis on how project definition that will replace the simulator with
the risk profile is changing. Risks are increasing actual QKD hardware.
with larger and more complex infrastructure, and
these risks will only grow with the massive rise The solution increases the bank’s layered
in cloud platforms, sophisticated mobile stacks cybersecurity defences by providing the “vault” to
and the advent of edge computing. With that in lock down the bank’s most important assets and
mind, we have reviewed the key data that could prevent the potential risks arising from code-breaking.
Like many other emerging and disruptive This chapter offers some recommendations
technologies, the quantum threat will affect for priority activities to the following actors:
almost everyone. Developing and implementing
– Corporate leaders and boards
a successful quantum readiness plan requires
coordination across many different industry – Cyber leaders
sectors, governments and global stakeholders. All – Policy-makers
organizations will feel the impact of the quantum – Leaders navigating the extended enterprise
threat, regardless of their size, type and revenue – ecosystem
including quantum technology vendors themselves.
The quantum-secure transition must begin with Smaller organizations or those without a dedicated
leadership to set the appropriate level of support cyber security office or function could still appoint
an officer responsible for quantum reporting to
and direction required to carry out such an effort.
management to ensure the quantum threat receives
the right focus and prioritization.
Corporate leaders and boards represent the CEO and legal responsibilities and that various drivers
other C-suite leaders who establish the overall direction (regulatory, financial, security etc.) can influence
and priorities of organizations, including initiatives the need for and speed of adoption.
pertaining to quantum computing technologies.
– Invest in updating IT systems and technical
What you should know infrastructure, and prioritize crypto-agility
to avoid lock-in and costly future changes.
– Understand the capabilities and challenges of Consider conducting thorough risk and impact
adopting quantum technology and the business assessments on which solutions (PQC, QKD,
impact of quantum computing advances. QRNG etc.) might suit your organization best.
– Grasp the individual and industry-wide legal and – Invest in the hiring and training of
regulatory implications. knowledgeable and skilled staff that
understand the technology and the threats.
– Learn how to navigate the hype and complexity During our interviews and working sessions,
of quantum risk solutions – and properly most organizations noted that this is the key
evaluate the impact on your organization. challenge for the coming years.
The Quantum-Secure Transition Framework
presented in Chapter 3 of this white paper can – Coordinate quantum security efforts internally,
help organizations define their vision, objectives in cooperation with other C-suite stakeholders
and key steps in line with their risk appetite and and risk management functions, to build
business drivers. awareness and integration with supporting
The key
and affected corporate functions. Externally,
challenge in the What you should do today establish third-party risk management functions
coming years will to include quantum risk preparedness. These
be hiring staff – Adopt a holistic approach that balances the third-party stakeholders include key vendors
skilled enough to potential opportunities of quantum computing and service providers, channel partners,
understand the against the risks. Understand that taking risks infrastructure providers, product vendors and
quantum threat. may be necessary to fulfil various regulatory and other ecosystem partners.
Imagine Policy-makers represent national and international What you should do today
the future of leadership, along with standards organizations
quantum – it is that are ultimately responsible for guiding the – Support the development of international
an ever-evolving governance of quantum technologies and efforts quantum cybersecurity and risk management
technology with to mitigate their potential risk. standards for quantum computing. A starting
point for this can be our Quantum-Secure
some exciting
What you should know Transition Framework presented in Chapter 3
opportunities.
of this report.
– Understand the commercial and national
security implications of quantum computing. – Promote enhanced quantum awareness among
both public and private sector leaders. Many
– Discern the relationships between different organizations stress the need for education,
standards to make a timely start in transitioning especially at a senior level.
to quantum-safe standards. We are starting to
see guidance from NSA, ANSSI, BSI and others, – Accelerate development of a cyber-secure
so keeping track of regulatory movements could global ecosystem by including quantum
be useful in determining what is needed for cybersecurity technology as an area of focus.
organizations in your jurisdictions.
– Consider incorporating advances in quantum
– Manage the balance between regulating the cybersecurity into existing standards originally
technology too early (stifling innovation) and written during the classical era.
regulating the technology too late. The debate
on the right moment to deploy quantum-safe – Imagine the future of quantum – it is an
solutions is still ongoing and organizations are ever-evolving technology with some exciting
looking towards policy-makers and regulators to opportunities.
see when they need to act.
Our modern digital economy is becoming more – Clarify which enterprise technologies and
granular and dispersed, while at the same time services are the responsibility of the organization
increasingly systemic and interdependent. itself to make quantum-safe as opposed to those
Organizations rely heavily on connected that are the obligation of third parties to address.
technologies – both custom-developed and off-the-
shelf – to execute and maintain their extended and – Establish vendor relationships to understand the
connected supply chains. While organizations may timelines and expectations around addressing
be responsible for legacy, home-grown applications quantum threats in the products and services
and databases, and their own IoT, mobile devices those vendors provide.
and internal networks, third-party vendors will most
likely manage support technologies, such as public Third-party vendors should be continuously aware
telecommunications, cloud services and common of how quantum threats will impact their products
business applications. and take action to develop enhancements to those
products and services. Third-parties should therefore:
When it comes to the quantum transition,
organizations should: – Understand the risk and impact of the quantum
threat to their products and services
– Understand their exposure to potential quantum
threats through the lens of their digital supply – Develop a plan to address quantum risks in their
chain and full partner ecosystem. This includes product and/or service roadmap
knowing about core technology solutions and
the status of the encryption capabilities within – Communicate their action plan to customers
those products. and stakeholders to build awareness and
promote action
To better understand the potential impacts of Council (EPSRC), the National Cyber Security Centre
quantum information technologies (QIT) on (NCSC), the National Quantum Computing Centre
financial services, the FCA has carried out several (NQCC) and internal stakeholders. The aim of the
activities in collaboration with the UK Quantum workshop was to raise awareness of QIT, educate
Computing & Simulation Hub. This is a valuable relevant stakeholders in its key potential impacts and
example of how regulators can collaborate more identify areas of focus for financial regulators.
closely with academia to understand complex
technological topics. The findings from the FCA workshop provided
valuable insights around future policy implications
In addition to an expert talk and a joint internal and potential regulatory challenges in the areas of
report, the FCA co-organized a virtual workshop security and competition. Similarly, it supported
with more than 25 different stakeholders, including conversations with other international regulators
the Bank of England, six leading UK universities, and prompted the sharing of insights across
the UK Quantum Communications Hub (QCH), jurisdictions, while gathering novel information
the Engineering and Physical Sciences Research about relevant developments.
In today’s nascent quantum cybersecurity market, – Quantum key distribution (QKD) develops
several efforts are ongoing to develop technologies physics-based quantum techniques to generate
to mitigate the quantum threat. These technologies secure communication channels which can
do not represent a silver bullet, but they can be used be used to distribute encryption keys. QKD
individually or in combination for certain applications. can complement the use of PQC and other
There are three technologies to mitigate the risk cryptographic algorithms by providing a secure
posed by quantum to public-key cryptography that key distribution method.
have been garnering the majority of attention:
– Quantum random number generation (QRNG)
– Post-quantum cryptography (PQC) uses new leverages fundamental quantum properties to
mathematics-based public-key cryptography generate random numbers with high entropy.
algorithms that are designed to be impervious Randomness is a key part of cryptography.
to attacks by Shor’s algorithm. PQC will QRNG produces better validated entropic
fundamentally update what will become sources than conventional processes, which
insecure cryptographic algorithms. may enhance security under certain conditions.
Quantum phenomena are inherently random in nature and so can be used to generate pure random
numbers. The generation of random numbers plays a crucial role in cryptography, for both the
generation of cryptographic keys as well as within some algorithms.
BOX 7 Developing a quantum entropy service for a major global bank: QuintessenceLabs
A major global bank, with an extensive virtual automatically replenished entropy pools before
machine deployment hosting a range of starvation with quantum random numbers retrieved
banking services, was experiencing delays and from the appliances.
the potential for duplicate keys used by the
cryptographic processes for securing data and Previously, during busy periods, login and
communication. A quantum random number cryptographically intensive operations had
generation (QRNG) solution was explored response delays of several tens of seconds. After
to ensure the timely delivery of high-quality the deployment of the QRNG solution, response
randomness consumed by the cryptographic times improved by up to one hundred times. And
processes running in the virtual machines. while prior to deployment of QRNG, 2.5% of virtual
machine instances experienced duplicate keys
The QRNG network appliances were deployed after start-up, after deployment, no duplicate keys
in all of the bank’s data centres around the were generated. The solution gave the client clear
world, delivering entropy-as-a-service. The visibility of demand for randomness across the
appliance monitored entropy levels and whole organization.
Quantum computing – still in its early stages with happen in the future and explores the challenges
near-term gains in some niche industry use cases – that organizations committed to mitigating the
offers great potential to help solve a range of critical quantum threat might face around technology,
problems. This chapter looks ahead to what might partnerships and other themes.
The current state of quantum technology is still nascent, but short- and long-term predictions suggest great
potential for a technology that could open new opportunities in the cybersecurity area (see Figure 13).
Short-term Long-term
Current state prediction prediction
– Quantum supremacy – proof that a – Noisy, intermediate-scale quantum – Quantum computing hardware
quantum computer can solve some (NISQ) hardware begins to advances to the point where
problems better than a classical demonstrate instances of genuine decoherence (a process that causes
computer – was demonstrated in quantum advantage in certain quantum information to be lost,
2019 by a team at Google21 areas of financial services (e.g. a significant barrier to today’s
– In 2021, the largest publicly capital markets) quantum computers) can be
available quantum computer had – The public and private sectors controlled via quantum error
127 qubits, but hardware firms are begin formally rallying behind correction and meaningful quantum
actively working to increase this quantum cryptography, to align on advantage is solidified
number and enable additional uses standards and improve encryption – Modern encryption techniques (e.g.
of the technology22 techniques RSA) become easily decrypted by
– Initial proofs of concept are being – The use of quantum computing quantum computers; however, most
conducted with success in financial (e.g. quantum machine learning) governments, businesses and other
services, largely using hybrid begins to become a unique large organizations (e.g. those that
systems of quantum and classical differentiator for large institutions; govern the encryption of the internet)
computers that split different parts most large cloud providers have a have moved on to quantum-secure
of an algorithm across the two market-ready“quantum-as-a- forms of encryption (e.g.lattice-
architectures to optimize performance service” tool based methods)
Quantum computing brings great potential for businesses and governments to harness, whether
to enhance their cyber capabilities or to explore new opportunities. There are four focus areas
that require the attention of public and private sector actors:
– Kick-start your post-quantum transition today – Understand the emerging risks from the
by starting to evaluate your infrastructure and interdependencies across organizations’ value
systems using a quantum readiness framework and supply chains, such as telecommunications,
or index that consists of benchmarks across cloud environments, etc. There may be
industries, plus guardrails and guidance challenges, for example, with the transition from
for exploring the current encryption and smart technologies (e.g. IoT, OT) to quantum-
algorithm ecosystem. This approach can help safe algorithms and unclear timelines around
organizations identify challenges and bottlenecks when the quantum threat to those technologies
associated with specific quantum security risks might become tangible.
and risks with post-quantum adoption.
– Develop a secure supply chain strategy inclusive
– Create an overarching framework to establish of software and hardware, so that you can
a common language for calibrating risks across prepare to substitute tech due to any crypto
business, governments, policy-makers and breakthrough, quantum or classical. Plan and
standard-setters. start talking to your vendors to ask what their
responses are to quantum and begin hardware
– Establish a platform to foster collaboration and software transitions as needed.
across industries to partner and align on
quantum-secure capabilities and solutions. – Develop guidelines to create awareness and to
provide clear action points to decision-makers
for managing a secure quantum transition.
– The quantum threat provides an opportunity – There is a clear desire among participants in the
to proactively review and solve generic and Forum’s quantum security community to start
legacy challenges encountered in cryptography experimenting with quantum security solutions.
management (e.g. certificate management, bad
seeds etc.). – Given that the quantum transition might include
hybrid solutions (systems with both classical
– Many organizations see quantum random cryptographic and quantum-based encryption
number generators as key to ensuring sufficient components), organizations should enhance
entropy in a post-quantum era. their crypto-agility to build ongoing capabilities
to evolve cryptographic standards and
– At the same time, opinion is divided on whether solutions. This crypto-agile approach requires
quantum key distribution would be a requirement taking a fresh look at cryptographic governance
for secure communications in future. and exploring novel ways to deploy crypto-agile
software frameworks and architectures.
– Organizations are not sure whether post-
quantum cryptography will mitigate the quantum
threat on its own.
Blockchain technology is disrupting many aspects transactions depends heavily on the performance
of our lives, including the use of cryptocurrencies. of the underlying cryptography. Replacing the
This technology is enabled by using sophisticated current algorithms with ones of lower performance
cryptography protocols to replace a central could have a detrimental effect on the adoption
authority with a decentralized governance system. of blockchain applications. Furthermore, the
The use of cryptography within blockchain decentralized nature of blockchain technology
technology makes it very powerful, but also requires a broad consensus before change can be
exposes it to a threat from quantum computers. adopted. This could result in a very long transition
Recent research23 shows that a significant period to post-quantum cryptography – time that
portion of cryptocurrencies could be stolen by a we may not have.
malicious actor with a cryptographically relevant It is therefore imperative to start preparing the
quantum computer. transition as soon as possible. Not just the
The quantum risk to blockchain presents a number selection of new cryptographic algorithms, but
of unique challenges that need to be addressed. also creating the consensus process needed to
For example, the performance of blockchain successfully undergo this transition.
It is difficult to As the quantum era continues to evolve and The field of quantum computing is still in its infancy
accurately predict timelines for technological advancements become and the quantum machines we have today are still
how long it will clearer, it is important to understand how quantum far from being able to threaten cybersecurity. It is
take before this computers will impact cybersecurity, how they may therefore difficult to accurately predict how long it
threat materializes. affect your organization specifically and when the will take before this threat materializes. However, this
threat could potentially materialize based on your does not mean that organizations should wait before
However, this
individual enterprise risk profile. taking action. Established businesses, start-ups
does not mean
and researchers are all working on solutions, the
that organizations The quantum transition process will be lengthy. most common being post-quantum cryptography
should wait before Regardless of when we think the threat will (PQC), quantum key distribution (QKD) and quantum
taking action. materialize, you need to consider what steps need random number generation (QRNG).
to be taken now and what your organization can do
to prepare. Consider creating a transition roadmap Each of these solutions helps mitigate different
to help you define your quantum security vision. aspects of the quantum threat and each has its
To get ready for a secure transition to a quantum- own benefits and limitations. Innovation will bring
safe economy, organizations should identify key new opportunities and advances in quantum,
stakeholders, including corporate leaders, board which can in turn open doors to new partnerships,
members, cyber leaders, policy-makers and technologies and research opportunities that can
vendors, and assign responsibility accordingly. be used to expand current operations.
Michele Mosca
Professor, University of Waterloo, Canada
Vikram Sharma
Founder and Chief Executive Officer,
QuintessenceLabs, Australia
Colin Soutar
Managing Director, Deloitte, USA
Acknowledgements
This white paper was co-created by many experts George Miao
and diverse stakeholders in the World Economic Credit Suisse, Switzerland
Forum’s project community on quantum security,
as part of the quantum computing network that Jason Lau, Jacques Francoeur
shared insights and lessons learned, through Crypto.com, Hong Kong SAR
interviews, design workshops and consultation
sessions. The World Economic Forum would like Soon Chia Lim, Jong Chin, Roddy Kok
to thank the following individuals for their insightful Cyber Security Agency of Singapore, Singapore
reviews and feedback.
Michael Daniel
Andrew Fursman Cyber Threat Alliance, USA
1QB Information Technologies, Canada
Ken Durazzo
Dimitri van Esch Dell Technologies, USA
ABN Amro, Netherlands
Christian Cruces Mujica
Sigmund Kristiansen Deloitte, USA
Aker BP, Norway
Marc Verdonk
Antia Lamas-Linares Deloitte, Netherlands
Amazon Web Services, USA
Bushra AlBlooshi
Daniel Cuthbert, Mark Carney Dubai Electronic Security Center, United Arab
Banco Santander SA, Spain Emirates
The Advanced Encryption Standard (AES) specifies a FIPS-approved cryptographic algorithm that can
be used to protect electronic data. The AES algorithm is a symmetric block cipher that can encrypt
AES
(encipher) and decrypt (decipher) information. AES256 represents the 256-bit version, while AES128
the 128-bit version.
Agence nationale de la sécurité des systèmes d’information – the government agency responsible
ANSSI
for cybersecurity issues in France.
Bundesamt für Sicherheit in der Informationstechnik (BSI) – the German Federal Office
BSI
for Information Security
The ability of a system to be able to rapidly switch between cryptographic algorithms, cryptographic
Crypto-agile primitives and other encryption mechanisms without the rest of the system’s infrastructure being
significantly affected by these changes.
Cryptographically
Quantum computers that are capable of actually attacking real-world cryptographic systems that
relevant quantum
would be unfeasible to attack with a normal computer.
computer
ENISA The European Union Agency for Cybersecurity – an agency of the EU.
A quantum mechanical phenomenon in which the quantum states of two or more objects have to be
Entanglement
described with reference to each other, even though the individual objects may be spatially separated.
Federal Information Processing Standard (FIPS) documents define rules, regulations and standards for
FIPS many aspects of the handling of information by computers and people. They apply to all United States
government employees and personnel, including members of the armed forces.
Information theoretic A cryptosystem is considered to have information-theoretic security if the system is secure
security against adversaries with unlimited computing resources and time.
The National Security Agency is a national-level intelligence agency of the United States Department
NSA
of Defense, under the authority of the Director of National Intelligence.
The demonstration of a quantum computer that can carry out tasks that are not possible or practical
Quantum supremacy
with a traditional (classical) computer.
A public-key algorithm that is used for key establishment and the generation and verification of
RSA
digital signatures.
Superposition The ability of a quantum system to be in multiple states at the same time until it is measured.
Y2Q Year to Quantum, the moment when quantum computers can mount attacks on current cryptography.