Quantum Computing Threat Urges Immediate Shift to Post-Quantum Encryption

Urgent Shift Needed to Post-Quantum Encryption as Quantum Computing Threatens Current Cryptographic Security

  • Quantum computing poses an immediate risk to encryption through “harvest now, decrypt later” attacks.
  • Migration to post-quantum encryption standards is advised to protect sensitive data over long periods.
  • Post-quantum zero-knowledge proof (ZK-proof) standards are still experimental and lack widespread adoption.
  • Development in post-quantum cryptography faces slow progress due to complexity and limited investment.

Gianluca Di Bella, a researcher in smart contracts and zero-knowledge proofs, highlighted the present danger of quantum computing to current encryption methods. Speaking from UN City in Copenhagen, he urged immediate transition to post-quantum encryption standards to prevent “harvest now, decrypt later” attacks, where encrypted data is stored now for future decryption once quantum technology matures.

- Advertisement -

Di Bella emphasized scenarios like protecting dissidents in authoritarian regimes, where encrypted information must remain secure for 10 to 20 years or more. Although practical quantum computers may be 10 to 15 years away, he cautioned that major tech companies like Microsoft and Google might develop powerful solutions sooner. He also criticized “quantum washing,” a practice where firms exaggerate quantum capabilities, and expressed concerns that countries like China could secretly develop advanced quantum cryptographic-breaking capabilities without alerting others.

Quantum computers threaten current encryption and zero-knowledge proofs (ZK-proofs), a cryptographic method allowing one party to prove knowledge of information without revealing it. Such computing power could decrypt information and forge traditional ZK-proofs, compromising verification processes.

Several post-quantum encryption standards have been approved by the National Institute of Standards and Technology (NIST), including ML-KEM, ML-DSA, and SLH-DSA. However, there is no mature post-quantum ZK-proof standard yet. Di Bella works on this challenge through his company, Mood Global Services. He pointed to a post-quantum ZK-proof approach called PLONK (Permutations over Lagrange bases for Oecumenical Noninteractive arguments of Knowledge), yet described it as unproven and still in research phases.

The path toward usable post-quantum ZK-proof systems is complex and slow. Di Bella noted the field demands specialized mathematical knowledge and advanced low-level programming, mainly in Rust, lacking high-level language abstractions. Investment remains limited since corporations often avoid funding projects they do not fully understand.

- Advertisement -

This ongoing work is crucial to preparing cryptographic tools for a future with practical quantum threats.

✅ Follow BITNEWSBOT on Telegram, Facebook, LinkedIn, X.com, and Google News for instant updates.

Previous Articles:

- Advertisement -

Latest News

Human Brain Cells Trained to Play Doom in Lab

Cortical Labs has successfully trained 200,000 living human neurons to play the 1993 video...

US Seizes $327K in USDT in Romance Scam Crackdown

The U.S. Justice Department seeks to forfeit nearly $328,000 in USDt linked to an...

Aave DAO Passes Contentious Proposal, But Changes Ahead

Aave Labs' controversial governance proposal passed an initial snapshot vote on Saturday with a...

Tether’s USAT Gets First Deloitte Attestation Report

Deloitte has issued the first attestation report for Tether USAT's reserves, revealing they slightly...

U.S. May Cap Critical AI Chip Sales to Chinese Firms

The Trump administration is reportedly discussing new export controls on advanced AI chips to...

Must Read

9 Best Books On Ethereum And Blockchain Technology

QUICK LINKSHow to Choose Your First Blockchain Book: A Simple Framework1. Define Your Goal: Are you looking to Build, Invest, or Understand?2. Assess Your...
🔥 #AD Get 20% OFF any new 12 month hosting plan from Hostinger. Click here!