The reality of quantum computing has been growing steadily closer over the last decade. Today, Google has claimed to have reached Quantum supremacy, the NIST has called for proposals to develop post-quantum cryptography, and 72% of professionals feel that their organizations will be affected by quantum computing in the next 5 years.

More specifically, the development and deployment of Shor's and Grover's algorithms, enabled by quantum computing's ability to reduce the total number of calculations required to calculate standard RSA, ECDSA, AES and SHA-2/SHA-3 encryption factors, stand to break both asymmetric and symmetric encryption. Blockchain, distributed ledger, and many other technologies depend on both cryptographic hashes (symmetric) and public-key design (asymmetric) to maintain security in technological processes. Quantum computing may very well break these "fail-proof" security methodologies.

When does this threat materialize? What will it mean for the enterprise? If you want to learn the answers to these questions and how your enterprise can future-proof your systems that rely on encryption and cryptography,  click here to join me for an upcoming webinar on Agile Crypto and The Quantum Threat hosted by the Data Protection World Forum where I will be a guest speaker alongside John Ray, Product Manager from Thales.