Quantum Computers and Their Impact on Cybersecurity
Quantum computers are one of the greatest achievements of modern science, with the potential to revolutionize many areas of life, including cybersecurity. How does a quantum computer differ from a regular computer and what impact will it have on current hardware and digital security? Will traditional security systems stand a chance against quantum computers? And does a quantum computer even exist ? Let's take a closer look at this topic and see how quantum computers work .
Quantum computer – what is this hardware and how does it work?
A quantum computer is something completely different from the traditional computer you use every day. So let's check what a quantum computer is all about . In ordinary devices, data is processed in the form of bits, which can only take one of two states: 0 or 1. On the other hand, a quantum computer uses so-called qubits (quantum bits), which work on completely different principles. A qubit can be in a state of quantum superposition, which means that its state is described by a combination of the basic states (0 and 1) with different quantum probabilities. This does not mean that a qubit is literally zero and one at the same time - it is a more subtle physical phenomenon that has no counterpart in the classical world. When we measure a qubit, we always get either 0 or 1, but before the measurement, the qubit can be in a state that is any combination of these values, which gives quantum computers unique computational capabilities. Its design is also unique - the device must be cooled to extremely low temperatures for the qubits to work stably. You're probably wondering what a quantum computer looks like? Much more like a futuristic lab than a traditional computer sitting on a desk. It takes up a lot of space.
Does a quantum computer already exist?
Yes, quantum computers already exist, and quantum computing has been a hot topic lately. The first quantum computer , although very simple compared to today's designs, was developed in 1998 by a team of scientists from the University of Oxford, MIT, and Stanford University. It was an experimental model using a technique called nuclear magnetic resonance (NMR) to manipulate the quantum states of molecules in a liquid. In practice, it could process only a few qubits. Although science and technology have since taken off, quantum computers are still mostly in the experimental phase today, used for research and testing.
Companies such as Google, IBM, Microsoft, and countries such as China are investing heavily in the development of these devices. For example, in 2019, Google announced that the Sycamore quantum computer had performed calculations that were impossible to perform on classical computers in a reasonable amount of time. China is also investing heavily in the development of its own quantum computers . IBM, on the other hand, is developing the Q System One , available as part of a cloud platform. Although we no longer have any doubts about whether a quantum computer exists , it is worth mentioning that it is not yet available to the average user. The capabilities of quantum computers are currently limited to very specific tasks, and their construction as a quantum computer requires extreme conditions, such as cooling to temperatures close to absolute zero. However, the development of this technology is progressing rapidly and in a few decades they may become more common. However, how does the competition between quantum and ordinary computers look today ? While our laptops are used for everyday tasks and complex calculations in science and industry, a quantum computer is currently only useful for very specialized tasks, such as optimization, analysis of large data sets, development of new drugs or prediction of chemical reactions.
Quantum computer – when will it appear in Europe?
The media also reported that a quantum computer will soon appear in Poland. In 2025, the first such device in Europe will be built in Poznań , which will support science, industry and the public sector. The Polish quantum computer will be used, among other things, to conduct advanced scientific research in the field of quantum chemistry, physics and biotechnology. Thanks to it, it will be possible to conduct simulations and analyses that are beyond the reach of traditional supercomputers.
How much does a quantum computer cost?
The price of a quantum computer depends on its power, application and manufacturer, but currently it is an extremely expensive technology, available mainly to governments, scientific institutions and large technology companies . Where to buy a quantum computer? They are currently available only to large companies and research institutions. Examples of how much a quantum computer costs can be based on the IBM Quantum System One , one of the more famous quantum computers, which is provided in a service model (quantum as a service), and access costs start from several tens of millions of dollars per year of use. The Canadian company D-Wave , which produces specialized quantum computers, offers models that cost from 10 to 15 million dollars per unit.
Where does IBM's quantum computer price come from , for example ? There's no denying that these costs result from the need to build a complex infrastructure and how quantum computers work . Not only do they require special cooling systems for temperatures close to absolute zero, but their maintenance also requires a team of experts and specialist support equipment. So it's quite a complicated business. As you can see, it must be sadly admitted that a quantum computer for games is currently unfortunately beyond our reach ;-) Although the price is falling with the development of technology, quantum computers will remain far from the realm of dreams of ordinary people in the near future and will be used mainly in scientific research and advanced industrial projects.
Quantum Computer and Cybersecurity
Now that we know what a quantum computer is, it's time to move on to its impact on current hardware and digital security. Given how a quantum computer works, can we delude ourselves that any devices that will protect us from hackers will exist in the future ? Will traditional security systems stand a chance against quantum computers, since the fastest quantum computer performs calculations that would take even supercomputers 10,000 years in just over 2 minutes? The answer is obvious. Current systems are not designed to cope with the computing power of a quantum computer. After all, the principle of operation is based on, among other things, the unique ability of quantum computers to process multidimensional data ( Shor's algorithm factors numbers into prime factors exponentially faster than traditional methods). This means that traditional security systems, such as RSA or ECC (Elliptic Curve Cryptography) encryption algorithms , which are based on the difficulty of factoring large numbers or solving mathematical problems, simply have no chance. Quantum computers , thanks to Shor's factoring algorithm, among other things, can solve these problems in an unimaginably faster way than classical computers, which certainly means breaking data encryption (most modern protocols, such as HTTPS or VPN, could be broken in minutes or hours, instead of years). It also means the end of public key security (technologies based on asymmetric keys would become obsolete).
Also check out the popular article on the SAPSAN blog about the rules of safe online shopping .
Quantum computers – what does this mean for current security systems?
Many experts suggest, however, that traditional encryption methods will be replaced by so-called post-quantum algorithms , which will be resistant to quantum attacks. Symmetric encryption is also expected (algorithms such as AES-256 are harder for quantum computers to crack and may remain safe, although they will require longer keys). In addition to threats, quantum computers can also strengthen cybersecurity. Quantum cryptography, or technology such as Quantum Key Distribution (QKD) , which offers theoretically unbreakable encryption systems that use the fundamental laws of quantum physics, has already been mentioned . In addition, it will be possible to use advanced threat analysis. Quantum computers will be able to analyze huge amounts of data faster, identify threats, and respond to cyberattacks.
The solution is to implement post-quantum strategies as soon as possible. Organizations such as NIST (National Institute of Standards and Technology) are already working on certifying encryption algorithms resistant to what a quantum computer can do . Is there any prognosis for the future of all the security we have become accustomed to? We can assume that over time, the traditional systems we know will be replaced by modern, more resistant to quantum attacks. Or maybe the introduction of quantum security systems, such as QKD, will become a standard in data protection? Time will tell.
Quantum computer - interesting facts from around the world
On October 15, 2024, under the patronage of the Minister of National Defense, the CyberEXPERT conference was held, which focused on the issue of quantum computing and AI , i.e. on two breakthrough technologies, which are today quantum computing and artificial intelligence (AI). Among other things, the future of digital identity management was discussed, suggesting moving away from traditional logins and passwords in favor of solutions based on blockchain or self-sovereign identity. Although it sounds like science fiction, quantum computers are capable of simulating chemical processes that have not yet happened in reality. Thanks to this, they can be used to design new drugs or advanced materials.
There is no denying that what a quantum computer can do and does completely changes the rules of the game in cybersecurity, undermining the effectiveness of existing systems. Traditional methods will not cope in the long term, but it is clear that progress in post-quantum technology gives hope for creating even safer solutions. Of course, the development of quantum technologies is currently encountering numerous obstacles, such as the high cost of implementation and technological challenges.