The rate of progress marks a steep acceleration. Since the revelation of Peter Shor 1994 that quantum computer can theoretically break the RSA, resource estimates have fallen from one billion Qabled to only one million today in 2012.
Gartner VP analyst Bart Wilmsen warned that “quantum computing would weaken the asymmetric cryptography by 2029.” Given that the cryptographic upgrade often occurred for many years, they now urged organizations to launch a strategic plan, especially for infrastructure with hard-coded crypto dependence. Many developers, he noted, lacks deep familiarity with cryptographic library and hash function, which makes inventory, performance tests and system mapping required for any realistic PQC roadmap.
Enterprise security implication
For security leaders, research highlights two immediate preferences. First of all, encrypted communication by using RSA or similar algorithms “stores now, later decrypt” risks “, where once the quantum computer obtained a sufficient scale, intercepted data can be decryed. Google has implemented Nist-approved ML-KEM in chrome and internal systems, set up a benchmark to get web traffic, VPN and messaging platforms.