Page 244 - Cyber Defense eMagazine RSAC Special Edition 2025
P. 244
around the world. Now imagine the current level of risk — but with the capabilities of quantum computers
layered on top.
Quantum Won’t Just Break Encryption — It Will Break Global Trust
Quantum computing poses a threat to more than just encryption. In a world where trust in software,
hardware, data & communications lies in digital signatures and cryptographic certificates, quantum
computing stands to disrupt decades worth of security & infrastructure. Algorithms like RSA and ECC are
used to create digital signatures and manage public-key cryptography. This allows systems to verify the
authenticity and integrity of code, updates, and different digital identities. It’s the reason why your laptop
knows firmware updates are coming from Apple and not a bad actor, or how servers know to trust
packages from AWS. Quantum computing threatens to break the most secure encryption algorithms,
keys & forge these proofs of authenticity rapidly. Once quantum computers can mimic these
cryptographic fingerprints, authenticity, identity & security has the potential to collapse. In a post-quantum
world, trust may become the weakest link in the chain, threatening the security of global supply chains.
The Real Target is Trade Infrastructure
Whether its API’s, middleware, firmware embedded devices or operational technology, they’re all built on
the same outdated encryption and systems of trust. One of the biggest threats from quantum computing
will be on all this unseen machinery that powers global digital trade. These systems handle the backend
of everything from routing to cargo to scheduling deliveries and clearing large shipments, but they were
never designed to withstand the threat of quantum. Attackers will be able to break in quietly — injecting
malicious code into control software, ERP systems or impersonating suppliers to communicate malicious
information and hijack digital workflows. Quantum computing won’t necessarily affect the industries on
its own, but it will corrupt the systems that power the global economy.
Quantum Espionage Will Be a Silent Killer — Harvest Now, Detonate Later
Some of the most dangerous attacks are being staged today, with many nation-states and bad actors
storing encrypted data, from procurement orders to shipping records. When quantum computers are
finally able to break those encryption schemes, attackers will be able to decrypt them in what’s coined a
Harvest Now Decrypt Later (HNDL) attack. These attacks, although retroactive in nature, represent one
of the biggest threats to the integrity of cross-border commerce. Global trade depends on digital
provenance or handling goods and proving where they came from. Once attackers can forge, backdate
or supplement data, it will destroy transparency, traceability and regulatory compliance that so many
importers and exporters rely on. This is called temporal warfare, and it’s a silent, patient attack, waiting
to corrupt supply chains over time and destroy trust in global systems.
244