Page 244 - Cyber Defense eMagazine RSAC Special Edition 2025
P. 244

around the world. Now imagine the current level of risk — but with the capabilities of quantum computers
            layered on top.



            Quantum Won’t Just Break Encryption — It Will Break Global Trust

            Quantum computing poses a threat to more than just encryption. In a world where trust in software,
            hardware,  data  &  communications  lies  in  digital  signatures  and  cryptographic  certificates,  quantum
            computing stands to disrupt decades worth of security & infrastructure. Algorithms like RSA and ECC are
            used to create digital signatures and manage public-key cryptography. This allows systems to verify the
            authenticity and integrity of code, updates, and different digital identities. It’s the reason why your laptop
            knows  firmware  updates  are  coming  from  Apple and not  a  bad  actor,  or  how servers know  to  trust
            packages from AWS. Quantum computing threatens to break the most secure encryption algorithms,
            keys  &  forge  these  proofs  of  authenticity  rapidly.  Once  quantum  computers  can  mimic  these
            cryptographic fingerprints, authenticity, identity & security has the potential to collapse. In a post-quantum
            world, trust may become the weakest link in the chain, threatening the security of global supply chains.




            The Real Target is Trade Infrastructure

            Whether its API’s, middleware, firmware embedded devices or operational technology, they’re all built on
            the same outdated encryption and systems of trust. One of the biggest threats from quantum computing
            will be on all this unseen machinery that powers global digital trade. These systems handle the backend
            of everything from routing to cargo to scheduling deliveries and clearing large shipments, but they were
            never designed to withstand the threat of quantum. Attackers will be able to break in quietly — injecting
            malicious code into control software, ERP systems or impersonating suppliers to communicate malicious
            information and hijack digital workflows. Quantum computing won’t necessarily affect the industries on
            its own, but it will corrupt the systems that power the global economy.



            Quantum Espionage Will Be a Silent Killer — Harvest Now, Detonate Later


            Some of the most dangerous attacks are being staged today, with many nation-states and bad actors
            storing encrypted data, from procurement orders to shipping records. When quantum computers are
            finally able to break those encryption schemes, attackers will be able to decrypt them in what’s coined a
            Harvest Now Decrypt Later (HNDL) attack. These attacks, although retroactive in nature, represent one
            of  the  biggest  threats  to  the  integrity  of  cross-border  commerce.  Global  trade  depends  on  digital
            provenance or handling goods and proving where they came from. Once attackers can forge, backdate
            or supplement data, it will destroy transparency, traceability and regulatory compliance that so many
            importers and exporters rely on. This is called temporal warfare, and it’s a silent, patient attack, waiting
            to corrupt supply chains over time and destroy trust in global systems.









                                                                                                            244
   239   240   241   242   243   244   245   246   247   248   249