Quantum computing provides the processing hardware necessary to run Shor’s Algorithm at scale and perform even the most difficult underlying math problems very efficiently. Quantum also offers the power to identify secret cryptographic keys in an extremely efficient way. This could potentially expose businesses to threat actors globally—and all at once.
This disruption eclipses the diligent planning and deep investment that went into Y2K preparations. It is an immense, high-impact event that will override existing cryptography methods and make current infrastructure and application protections irrelevant.
Timing is critical as companies will not have the full eight years until 2025 to de-risk. This huge change management effort will take at least two to four years to implement once there is a viable proven algorithm announced somewhere between 2022-2024.