Banner header_ad
News

How investment firms can navigate the quantum computing landscape

Prepare your investment firm for the challenges of quantum computing with our comprehensive guide.

5 min di lettura

As the field of quantum computing continues to evolve, it presents both opportunities and challenges, particularly for investment firms that manage sensitive data. The rapid advancements in quantum technology are not merely theoretical; they are on the verge of becoming a practical reality, prompting firms to reassess their security protocols. With investments in quantum technologies surpassing $1.25 billion in the first quarter of 2025, the financial sector must take proactive measures to safeguard its operations.

Tag 1 (native)

The looming threat of quantum computing

Experts within the cybersecurity realm are raising alarms about the vulnerabilities of current encryption standards. The term Q-Day refers to the moment when quantum computers will possess the capability to break existing encryption methods, rendering them ineffective. While this day may not have arrived yet, an immediate risk looms as malicious entities can engage in the tactic of harvesting now, decrypting later. This approach allows them to capture encrypted data today, with the intention of exploiting it once quantum technologies become more advanced.

Understanding modern encryption

To appreciate the full scope of this threat, we must first examine the foundations of contemporary cryptographic systems. Digital information, whether it be text, images, or numerical data, is encoded in a binary format consisting of zeros and ones. This binary representation enables data to be shared seamlessly across various computing networks worldwide.

Tag 2 (300x250)

Encryption serves as a protective mechanism, converting original binary sequences into unintelligible formats through complex mathematical processes. This is essential for safeguarding sensitive client information, trading activities, internal communications, and proprietary data. It is also fundamental to the security and privacy features found in blockchain technology.

The vulnerability of current systems

Encryption techniques can be categorized primarily into two types: public-key and private-key systems. The RSA algorithm, a staple in financial transactions, exemplifies public-key encryption. Its security relies not on the secrecy of the algorithm but rather on the challenges associated with factoring large prime numbers using classical computing methods. However, this security model is under threat due to the emergence of quantum computing.

In the 1990s, computer scientist Peter Shor introduced a groundbreaking quantum algorithm capable of efficiently factoring large integers, directly jeopardizing the security of RSA and similar encryption standards. Although this concept was initially theoretical, the continuous advancements in quantum technology have rendered it increasingly pertinent.

The diminishing barrier to breaking RSA

Recent estimates indicate a dramatic decrease in the computing power required to compromise RSA encryption, dropping from about 20 million qubits in 2019 to under 1 million qubits in 2025. To illustrate the power of quantum computing, Google’s 105-qubit quantum processor could achieve in five minutes what the fastest classical supercomputers would take approximately 10 septillion years to compute.

The implications are staggering; once quantum computers reach the necessary capabilities, many current cryptographic systems may become obsolete, which would have serious repercussions for financial transactions, government data management, and private communications. A breach of this magnitude could occur without detection, posing an unprecedented systemic risk.

Strategies for quantum resilience

The urgency of addressing these threats cannot be overstated. The harvest now, decrypt later strategy underscores the need for investment firms to adopt a proactive stance on security measures. Reactive responses will be inadequate once Q-Day arrives; data compromised in the past will become vulnerable.

To combat potential future breaches, two primary approaches are gaining traction: Post-Quantum Cryptography (PQC) and Quantum Key Distribution (QKD). PQC aims to fortify existing systems by developing new mathematical algorithms that are resistant to quantum attacks, while QKD employs the principles of quantum physics to create secure communication channels.

Implementing quantum-resistant measures

PQC represents an interim safeguard, enhancing resilience against near-term quantum advancements. However, it is essential to recognize that as quantum technology evolves, previously secure algorithms may eventually be compromised. Therefore, it should be viewed as a transitional solution rather than a final one.

Conversely, QKD takes advantage of quantum mechanics to enable secure information transmission. For instance, if entangled photons are used in key distribution, any interception attempts will create detectable disturbances, alerting legitimate users to potential breaches. Although pilot programs are currently in place, limitations in infrastructure and scalability remain challenges for widespread adoption.

Preparing for the quantum future

The imminent disruption caused by quantum computing requires coordinated efforts across the financial sector. However, many investment firms are hesitant to take action, often waiting for regulatory guidance before addressing quantum risks. This delay can have serious consequences.

Transitioning to quantum-resistant systems presents significant hurdles, including costs, technical complexities, and the need for extensive system upgrades. Furthermore, as technological advancements continue, newly adopted algorithms may themselves become vulnerable within a short timeframe, potentially jeopardizing past investments.

One notable initiative in this space is led by the National Institute of Standards and Technology (NIST), which has been working on identifying cryptographic algorithms that can withstand quantum attacks. In December 2024, NIST announced four selected algorithms, marking a significant step towards establishing global post-quantum cryptographic standards.

As firms navigate this complex landscape, a layered strategy is essential, focusing on agility and adaptability. Engaging stakeholders, assessing risks, conducting vendor due diligence, and piloting new algorithms will be crucial for success in the quantum era.