David Firnhaber holds a PhD in Technology Innovation Management for his publication in the field of Post-Quantum Cryptography (PQC) regarding the future of quantum decryption. He is currently a professor at Ivy Tech Community College and is pursuing a second PhD in Cybersecurity GRC while focusing his research on human trafficking in cyberspace.

As we step deeper into the 21st century, the confluence of two extraordinary fields, cryptography and quantum computing, heralds a revolution that could reshape our digital landscape. In my previous article, "The Looming Threat of Post-Quantum Cryptography," we explored how quantum computing is poised to challenge the secure communications we rely on today. This time, let's delve even further, examining the specifics of Shor's algorithm, semi-prime factorization, and the profound implications for various industries.

Shor's algorithm: Unraveling the security fabric
In our earlier discussion, we touched upon Shor's algorithm, a quantum algorithm developed by Peter Shor in 1994. To recap, this algorithm is a game-changer because it can factor large integers exponentially faster than classical methods. Traditional encryption methods, such as RSA-2048, depend on the difficulty of factoring large semi-prime numbers. However, Shor's algorithm exploits quantum mechanics to perform this task with unprecedented efficiency, posing a real threat to the foundations of classical encryption.
Related:
Semi-prime factorization: The vulnerable core
Building on RSA-2048 and NIST standards, let's focus on semi-prime factorization. RSA-2048, a cornerstone of public-key cryptography, derives its security from the challenge of factoring a large number that is the product of two primes. Classical computers find this task nearly impossible within a reasonable timeframe. However, a quantum computer running Shor's algorithm could reduce this problem from an infeasible task to a manageable one, effectively cracking the encryption.
Related:
The quantum race: Beyond phoenix and osprey
My previous article highlighted the breakneck pace of advancements in quantum processors, such as IBM's 433-qubit Osprey and Atom Computing's 1,225-qubit Phoenix processor. By 2025, projections indicate systems surpassing 4,000 qubits, as noted in the article "Post-Quantum Cryptography: Implications of Google's Willow." This rapid progress underscores the urgency of addressing the quantum threat. The transition from theoretical concepts to practical applications is accelerating, bringing us closer to a reality where quantum computers could disrupt our current cryptographic safeguards.
Related:
Real-world implications for various industries
Expanding on the real-world implications outlined previously, let's delve deeper into how different sectors could be affected:
1. Finance: As previously mentioned, the finance sector is highly dependent on encryption to secure transactions and data. Quantum computing could expose financial systems to fraud and data breaches, shaking the very foundation of trust in digital banking.
Related:
2. Healthcare: Patient privacy and data integrity are at risk. The ability to decrypt medical records could lead to significant breaches, compromising patient trust and regulatory compliance.
Related:
3. Government and National security: The exposure of classified information and secure communications remains a paramount concern. Quantum computing could undermine national security, exposing sensitive information to adversaries.
Related:
4. Technology and Communications: Communication services, vital for personal and business interactions, rely on encryption. The quantum threat could lead to unauthorized access and data breaches.
Related:
5. E-commerce: Online retailers face the risk of compromised customer data and transactions. The quantum threat could result in identity theft and financial loss, undermining consumer confidence in online shopping.
Related:
The DNDL conundrum: An imminent risk
The quantum threat is not a distant concern but an imminent challenge that requires immediate attention. One technique that epitomizes this urgency is the Download Now Decrypt Later (DNDL) strategy. This involves the accumulation of encrypted data today with the anticipation that it can be decrypted once quantum computers become sufficiently powerful. The DNDL approach highlights the critical need for swift adaptation to quantum-resistant encryption, ensuring that sensitive data remains secure both now and in the future.
Related:
Navigating the quantum frontier with David K. Firnhaber, PhD
As we advance further into the quantum age, the development and implementation of post-quantum cryptography (PQC) are paramount. PQC algorithms are designed to withstand quantum attacks, providing robust protection for digital communications. The National Institute of Standards and Technology (NIST) has been pivotal in setting the groundwork for this transition, but the journey requires expertise and strategic planning.
Related:
David K. Firnhaber, PhD specializes in navigating the complexities of PQC. Our cybersecurity consulting firm is dedicated to helping organizations transition seamlessly to quantum-safe encryption methods. We provide tailored solutions to ensure your data remains secure against the evolving quantum threat. As your trusted partner, we are committed to fortifying your digital defenses and preparing you for the future of cryptographic security.
Visit David K. Firnhaber, PhD to learn more about our services and how we can help your organization stay ahead in the quantum era.
Read more from David K Firnhaber
David K Firnhaber, Doctor of Philosophy in Cybersecurity
David Firnhaber is a proven expert in post-quantum cryptography with a rich background in cybersecurity. Leveraging his leadership and scholastic excellence, he consistently delivers his continued doctoral-level research and is positioned to share his knowledge with many students. Outside of work, David Firnhaber enjoys songwriting, outdoors, painting, and documentaries, adding a unique perspective to his writing.