Are Enterprises Ready for Quantum-Safe Cybersecurity?
- URL: http://arxiv.org/abs/2509.01731v1
- Date: Mon, 01 Sep 2025 19:27:06 GMT
- Title: Are Enterprises Ready for Quantum-Safe Cybersecurity?
- Authors: Tran Duc Le, Phuc Hao Do, Truong Duy Dinh, Van Dai Pham,
- Abstract summary: Quantum computing threatens to undermine classical cryptography by breaking encryption and signature schemes.<n>This paper examines enterprise readiness for quantum-safe cybersecurity through three perspectives.
- Score: 0.0
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: Quantum computing threatens to undermine classical cryptography by breaking widely deployed encryption and signature schemes. This paper examines enterprise readiness for quantum-safe cybersecurity through three perspectives: (i) the technologist view, assessing the maturity of post-quantum cryptography (PQC) and quantum key distribution (QKD); (ii) the enterprise (CISO/CIO) view, analyzing organizational awareness, risk management, and operational barriers; and (iii) the threat actor view, evaluating the evolving quantum threat and the urgency of migration. Using recent standards (e.g., NIST's 2024 PQC algorithms), industry surveys, and threat intelligence, we synthesize findings via a SWOT analysis to map strengths, weaknesses, opportunities, and threats. Results indicate uneven and generally insufficient preparedness: while PQC standards and niche QKD deployments signal technical progress, fewer than 5\% of enterprises have formal quantum-transition plans, and many underestimate "harvest now, decrypt later" risks. Financial, telecom, and government sectors have begun migration, but most industries remain exploratory or stalled by costs, complexity, and skills gaps. Expert consensus places cryptanalytically relevant quantum computers in the 2030s, yet delayed preparation could leave today's data vulnerable for decades. We recommend immediate steps: establishing crypto-agility, creating quantum transition roadmaps, prioritizing PQC deployment in high-value systems, and upskilling cybersecurity teams. A coordinated, proactive approach is essential to secure current and future digital assets in the quantum era.
Related papers
- Quantum Attacks Targeting Nuclear Power Plants: Threat Analysis, Defense and Mitigation Strategies [1.2891210250935148]
This paper introduces a forensics-first framework for achieving quantum resilience in high-consequence environments.<n>We show how Harvest-Now, Decrypt-Later (HNDL) campaigns can retroactively compromise cryptographic foundations, undermine evidence admissibility, and facilitate sophisticated sabotage.<n>We propose and validate a phased, defense-in-depth migration path to Post-Quantum Cryptography (PQC)<n>The paper concludes that without urgent adoption of quantum-resilient controls, the integrity of both physical safety systems and digital forensic evidence remains at severe and irreversible risk.
arXiv Detail & Related papers (2026-02-25T03:26:09Z) - Performance and Storage Analysis of CRYSTALS Kyber as a Post Quantum Replacement for RSA and ECC [45.88028371034407]
CRYSTALS-Kyber is a post-quantum cryptographic solution standardized by NIST in 2022.<n>This study evaluates Kyber's practical viability through performance testing across various implementation schemes.
arXiv Detail & Related papers (2025-08-03T09:53:45Z) - Cyber Threats in Financial Transactions -- Addressing the Dual Challenge of AI and Quantum Computing [0.0]
Financial sector faces escalating cyber threats amplified by artificial intelligence (AI) and the advent of quantum computing.<n>Report analyzes these threats, relevant frameworks, and possible countermeasures like quantum cryptography.<n>Financial industry must adopt a proactive and adaptive approach to cybersecurity.
arXiv Detail & Related papers (2025-03-19T20:16:27Z) - Evaluating the Potential of Quantum Machine Learning in Cybersecurity: A Case-Study on PCA-based Intrusion Detection Systems [42.184783937646806]
We investigate the potential impact of quantum computing and machine learning (QML) on cybersecurity applications of traditional ML.<n>First, we explore the potential advantages of quantum computing in machine learning problems specifically related to cybersecurity.<n>Then, we describe a methodology to quantify the future impact of fault-tolerant QML algorithms on real-world problems.
arXiv Detail & Related papers (2025-02-16T15:49:25Z) - Strategic Roadmap for Quantum- Resistant Security: A Framework for Preparing Industries for the Quantum Threat [0.0]
This paper outlines a strategic roadmap for industries to anticipate and mitigate the risks posed by quantum attacks.
By presenting a structured timeline and actionable recommendations, this roadmap with proposed framework prepares industries with the essential strategy to safeguard their potential security threats in the quantum computing era.
arXiv Detail & Related papers (2024-11-15T06:59:41Z) - Practical hybrid PQC-QKD protocols with enhanced security and performance [44.8840598334124]
We develop hybrid protocols by which QKD and PQC inter-operate within a joint quantum-classical network.
In particular, we consider different hybrid designs that may offer enhanced speed and/or security over the individual performance of either approach.
arXiv Detail & Related papers (2024-11-02T00:02:01Z) - Evaluation Framework for Quantum Security Risk Assessment: A Comprehensive Strategy for Quantum-Safe Transition [0.03749861135832072]
The rise of large-scale quantum computing poses a significant threat to traditional cryptographic security measures.
Quantum attacks undermine current asymmetric cryptographic algorithms, rendering them ineffective.
This study explores the challenges of migrating to quantum-safe cryptographic states.
arXiv Detail & Related papers (2024-04-12T04:18:58Z) - Assessing the Benefits and Risks of Quantum Computers [0.7224497621488283]
We review what is currently known on the potential uses and risks of quantum computers.
We identify 2 large-scale trends -- new approximate methods and the commercial exploration of business-relevant quantum applications.
We conclude there is a credible expectation that quantum computers will be capable of performing computations which are economically-impactful.
arXiv Detail & Related papers (2024-01-29T17:21:31Z) - The Evolution of Quantum Secure Direct Communication: On the Road to the Qinternet [49.8449750761258]
Quantum secure direct communication (QSDC) is provably secure and overcomes the threat of quantum computing.<n>We will detail the associated point-to-point communication protocols and show how information is protected and transmitted.
arXiv Detail & Related papers (2023-11-23T12:40:47Z) - When Quantum Information Technologies Meet Blockchain in Web 3.0 [86.91054991998273]
We introduce a quantum blockchain-driven Web 3.0 framework that provides information-theoretic security for decentralized data transferring and payment transactions.
We discuss the potential applications and challenges of implementing quantum blockchain in Web 3.0.
arXiv Detail & Related papers (2022-11-29T05:38:42Z) - Chapter: Vulnerability of Quantum Information Systems to Collective Manipulation [41.94295877935867]
We present and discuss a new form of vulnerability in such systems.
Groups of adversaries can maximally disrupt these systems' global quantum state.
It will be almost impossible to detect these attacks since they do not change the Hamiltonian.
A countermeasure could be to embed future quantum technologies within redundant classical networks.
arXiv Detail & Related papers (2019-01-25T13:51:05Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.