Our Chief Market Strategist Stephen Dover explores how quantum computers will soon unlock and slice through infrastructure and financial systems’ public key cryptography. Many cyberattacks are “Store Now, Decrypt Later” (SNDL) crimes, however, quantum computers will advance decrypting old data, now.
Imagine you’re trying to solve a maze with a quantum computer1 and need to decide: Should you go right or left? Unlike classical computers, the quantum computer can choose both directions at once, exploring all possible paths through this maze simultaneously, and immediately find the most optimal path out. Conversely, quantum computers will likely soon unlock and slice through current cybersecurity and public key cryptography protecting most of our world’s financial systems and infrastructure.2
- Quantum computers will break public key cryptography, some experts say between five- and 20-years’ time. A single quantum attack against a larger US financial institution that disrupts a national service payment system could create a cascading financial failure, costing between US$730 billion and US$1.95 trillion.3
- Quantum computers allow us to examine many variables at once that cannot be solved on classical computers. Current quantum computers are special purposed computers, similar to other supercomputers from the mid-20th century, with speeds 100 million times faster than classical computers.4
- Quantum computing market projections enormously multiplied from US$507.1 million in 2019 to US$65 billion by 2030.5
- Privacy should be a human right, and our data should only go to those individuals have chosen to give that data to. We need to incorporate data privacy rights while developing quantum, artificial intelligence (AI), and future technologies in a positive direction.
- Any data on a server can be stolen, stored on a server, sit idle for years, and then decrypted later. Many cyberattacks are “Store Now, Decrypt Later” (SNDL) crimes. Sensitive data should be protected on servers now with new cybersecurity protocols to prevent against future classical and quantum cyberattacks.
Defense, energy, financial, healthcare, satellite systems and more are all active cyberattack targets. New cybersecurity and cryptography with quantum computing protocols and mathematically different algorithms will mitigate coming quantum cyberattacks. For more, watch “<https://players.brightcove.net/627971142001/experience_60f04d0918b4a400253cfa46/share.html”>Quick Talks: Quantum Cyberattacks and Data Privacy with QuSecure, Part 2,” my conversation with Dave Krauthamer, QuSecure’s Chief Executive Officer, and Rebecca Krauthamer, QuSecure’s Chief Product Officer who also serves on The World Economic Forum’s Global Future Council on Quantum Applications.
What Are the Risks?
All investments involve risk, including possible loss of principal.
The value of investments and the income from them can go down as well as up and investors may not get back the amounts originally invested, and can be affected by changes in interest rates, in exchange rates, general market conditions, political, social and economic developments and other variable factors. Investment involves risks including but not limited to, possible delays in payments and loss of income or capital. Neither Franklin Templeton, Legg Mason, nor any of its affiliates guarantees any rate of return or the return of capital invested.
Past performance is no guarantee of future results.
Important Legal Information
This material is intended to be of general interest only and should not be construed as individual investment advice or a recommendation or solicitation to buy, sell or hold any security or to adopt any investment strategy. It does not constitute legal or tax advice.
The views expressed are those of the investment manager and the comments, opinions and analyses are rendered as of publication date (or specific date in some cases) and may change without notice. The information provided in this material is not intended as a complete analysis of every material fact regarding any country, region or market.
Data from third party sources may have been used in the preparation of this material and Franklin Templeton (“FT”) has not independently verified, validated or audited such data. FT accepts no liability whatsoever for any loss arising from use of this information and reliance upon the comments, opinions and analyses in the material is at the sole discretion of the user.
Products, services and information may not be available in all jurisdictions and are offered outside the U.S. by other FT affiliates and/or their distributors as local laws and regulation permits. Please consult your own financial professional or Franklin Templeton Institutional contact for further information on availability of products and services in your jurisdiction.
Issued in the U.S. by Franklin Distributors, LLC. Member FINRA/SIPC, One Franklin Parkway, San Mateo, California 94403-1906, (800) DIAL BEN/342-5236, franklintempleton.com—Franklin Distributors, LLC. Member FINRA/SIPC is the principal distributor of Franklin Templeton Investments’ U.S. registered products, which are not FDIC insured; may lose value; and are not bank guaranteed and are available only in jurisdictions where an offer or solicitation of such products is permitted under applicable laws and regulation.
CFA® and Chartered Financial Analyst® are trademarks owned by CFA Institute.
_____________________________
1. Quantum computers allow subatomic particles to exist in more than one state simultaneously so that they can exist as either a zero, a one, or both at the same time. Quantum bits, called “qubits,” can thus handle a much vaster amount of information much faster than a normal computer. Regular computers use bits to store information that only has two states: zero or one. Source: “Here’s how quantum computing could transform the future,” by Business Insider, March 2, 2021.
2. Source: Developed in the 1990s, the most famous quantum computing algorithm shows that with a quantum computer and its algorithm, it can breakthrough public key cryptography, such as RSA and elliptic-curve cryptography.
3. Source: “Getting The Big Banks To Confront The Quantum Challenge,” Forbes, May 26, 2021.
4. Source: “Here’s how quantum computing could transform the future,” by Business Insider, March 2, 2021.
5. Ibid.
Posted in Education, PerspectivesTagged cyberattacks, cybersecurity, data science, infrastructure, privacy, quantum computing, quantum technology, World Economic Forum