Explore the foundations of quantum computing, its impact on cryptography, and the emerging risks and controls organizations must consider in a post-quantum era.
Quantum computing is on the horizon as perhaps one of the most transformative technologies for information security and computational processes. Although large-scale, fault-tolerant quantum computers are not yet pervasive, the rapidly accelerating research and development initiatives worldwide signify that quantum computing will no longer remain a futuristic possibility. This section explores the fundamentals of quantum computing, highlights its potential to undermine current encryption systems, and provides recommendations on future-proofing organizational controls and governance to mitigate the associated threats.
Readers should maintain a clear connection to material covered in prior chapters—especially those discussing encryption and cybersecurity controls in Chapters 16, 17, and 19—to place quantum computing in the broader context of information security, enterprise governance, and compliance requirements.
Quantum computing uses the principles of quantum mechanics, such as superposition and entanglement, to process information in ways that classical computers cannot replicate. Traditional digital computers operate on bits—discrete 0s and 1s—while a quantum computer uses quantum bits (qubits), which can exist in a superposition state, effectively representing multiple states simultaneously. This exponential leap in parallel processing power gives quantum computing the potential to tackle certain computational problems far more rapidly than classical machines.
• Classical bits: Represent values of either 0 or 1 at any one time.
• Qubits: Can represent 0, 1, or any quantum superposition of these states. When multiple qubits become entangled, they can jointly represent and process exponentially more combinations than classical bits.
Quantum computing, while still in its developmental stages, promises a range of groundbreaking applications, including:
• Optimization problems in logistics, finance, and healthcare.
• Advanced modeling of molecules for pharmaceuticals and material science.
• Enhanced artificial intelligence, especially in machine learning tasks.
• Breaking—or significantly weakening—existing cryptographic algorithms.
One of the most urgent implications of quantum computing is its capacity to break widely used encryption algorithms, particularly those relying on factorization or discrete logarithms (e.g., RSA, Diffie-Hellman, and elliptic-curve cryptography). As covered in Chapters 19 (Data Confidentiality and Privacy Controls) and 16 (Foundations of Cybersecurity), many financial organizations and government agencies rely heavily on these algorithms to secure data in transit and at rest. The main quantum-relevant algorithms to note are:
• Shor’s Algorithm: Capable of factoring large numbers efficiently, threatening RSA and other factorization-based systems.
• Grover’s Algorithm: Speeds up brute-force attacks, weakening symmetric ciphers by effectively halving their key space.
Estimates vary on when quantum computers capable of large-scale cryptanalysis will be operational. Some conservative projections forecast major breakthroughs within 10 to 15 years, while more optimistic views put that figure closer to 5 years. Regardless of the exact timing, “harvest now, decrypt later” tactics are emerging, where adversaries collect encrypted data today with the intention of decrypting it in the future once quantum computers become practical.
This future quantum threat highlights a pressing need for “quantum-safe” or “post-quantum cryptography” (PQC). The National Institute of Standards and Technology (NIST) is already in the process of standardizing new cryptographic algorithms resilient to quantum attacks, signifying a global shift in how we approach information security.
Post-quantum cryptography (PQC) refers to cryptographic algorithms that can withstand attacks from both classical and quantum computers. The objective is to deploy encryption schemes and digital signatures that remain secure even when large-scale quantum computers become available. The NIST PQC standardization process involves extensive testing, competition, and vetting of various candidate algorithms such as lattice-based, hash-based, code-based, and multivariate polynomial-based cryptography.
A carefully orchestrated, phased approach to cryptographic migration helps mitigate the potential disruptions to daily operations.
Chapters 3 (Governance, Frameworks, and Regulatory Environment) and 8 (IT General Controls) outlined essential corporate frameworks such as COSO and COBIT for structure and compliance. As quantum computing evolves, organizations must incorporate quantum-specific risk considerations into these frameworks:
• COSO Internal Control—Integrated Framework: Expand the risk identification and assessment processes to include the potential for quantum-based threats.
• COBIT: Integrate quantum resilience into governance objectives and enablers, addressing data protection, cryptographic management, and third-party risk management.
Executives and boards of directors should conduct specialized risk assessments to ascertain potential exposure to quantum threats. Five years may sound distant, but cryptographic transitions require significant time and resources, especially in highly regulated industries like banking, insurance, and healthcare. Risk assessment parameters to consider:
Financial institutions, government agencies, and large multinational corporations must promptly update polices, procedures, and internal controls to reflect quantum-readiness. Examples include standard operating procedures (SOPs) for encryption key creation, secure key backup strategies, and new cryptographic key management solutions that incorporate quantum-resistant algorithms.
While quantum computers threaten certain types of classical cryptography, they also offer new pathways to secure data. Quantum cryptography, most notably Quantum Key Distribution (QKD), leverages the laws of quantum physics to provide unwavering protection against eavesdropping. In QKD:
Current solutions for QKD rely on specialized hardware and short-distance fiber or free-space optical links. For instance, financial institutions running high-security data centers or partner connections within limited geographic ranges have participated in pilot programs deploying QKD to ensure unbreachable key exchanges. Although QKD remains early in adoption and can be cost-prohibitive, its future potential to deploy at scale aligns with the long-term perspective of physically unbreakable key transfer.
As quantum attacks become feasible, regulatory bodies will likely require revision of existing cybersecurity standards, especially around encryption and data management. In Chapter 19, discussions center on privacy laws such as HIPAA and GDPR. Data privacy and data longevity requirements in such regulations can be severely compromised if quantum computing can easily decrypt stored data in a few years. Noncompliance could lead to significant legal and financial consequences.
Moreover, quantum-safe methods themselves might require new disclosures for regulators. For example, organizations might need to demonstrate the quantum resilience of their systems in SOC 2® or SOC for Cybersecurity reporting (see Chapters 24 and 27). Auditors and assurance professionals will need to verify not just the presence of encryption but also its longevity against foreseeable attacks.
A global banking conglomerate with a 15-year data retention policy realized that sensitive client information is vulnerable if harvested by malicious actors today. The bank’s audit committee initiated a quantum threat assessment, revealing that major cryptographic algorithms in use—particularly RSA 2048-bit—could be inadequate within a decade. The board approved:
The bank’s timeline also aligned with guidelines from standards-setting bodies, easing the adoption of new encryption protocols in system audits and compliance checks.
A stealth cybercriminal group intercepts corporate or government data and stores the raw, encrypted payload. Although the data is currently unreadable, quantum computers in the future may allow retroactive decryption. Financial statements, intellectual property, and personal health records could be compromised. The scenario underscores:
• The necessity for cryptographic agility.
• Future-proof compliance strategies that preserve confidentiality through the entire data retention lifecycle.
Below is a high-level Mermaid.js diagram depicting the progression from current-day challenges (collecting data) to the quantum threat readiness timeline:
flowchart LR A["Present Day <br/>Classical Encryption"] --> B["Data Collected <br/>(Potential Harvesting)"] B --> C["Near-Term <br/>Quantum-Ready Planning"] C --> D["5-10 Years <br/>Quantum Maturity"] D --> E["Quantum Decryption <br/>(High Risk)"] E --> F["Post-Quantum <br/>Cryptography Deployed"] A --> G["Hybrid Encryption <br/>Solutions Introduced"] G --> F
Explanation:
• In the present day, classical encryption protects data. Bad actors may still harvest data (B).
• Organizations undertake quantum-resistant planning (C), as quantum computers reach maturity in the next 5–10 years (D).
• Once powerful quantum decryption capabilities exist (E), non-migrated systems become vulnerable.
• Post-quantum cryptography (F) and interim hybrid encryption (G) mitigate these risks.
As discussed throughout prior chapters (especially Chapter 4 on IT Audit and Assurance), CPAs and IT auditors play a critical role in verifying the adequacy of control environments. For quantum computing impacts, consider the following:
• Continuous Monitoring: Implement procedures that track cryptographic algorithms and key lengths across the enterprise.
• Audit Focus on Migration Roadmap: Assess the organization’s quantum transition plans, ensuring adequate milestones, budget, and stakeholder involvement.
• Regulatory Compliance: Evaluate whether the client or organization monitors emerging national/international regulations related to quantum readiness.
• Integration with SOC Reports: For SOC 2® and SOC for Cybersecurity engagements, verify management’s description of the system addresses quantum-driven risks and planned mitigations.
While quantum computing remains under active development, the rapid strides in qubit fidelity, the birth of quantum-as-a-service offerings from major cloud providers, and increased government funding have made quantum a pivotal consideration for long-term data security and enterprise resilience. CPAs, auditors, and advisory professionals must stay ahead of the quantum curve to ensure:
• Forward-looking security strategies.
• Compliance with emerging regulations.
• Ongoing alignment with frameworks such as COSO, ERM, and COBIT.
A proactive stance on post-quantum cryptography and quantum governance will be essential for safeguarding sensitive financial information and maintaining stakeholder trust in a world of rapidly evolving threats.
Information Systems and Controls (ISC) CPA Mocks: 6 Full (1,500 Qs), Harder Than Real! In-Depth & Clear. Crush With Confidence!
Disclaimer: This course is not endorsed by or affiliated with the AICPA, NASBA, or any official CPA Examination authority. All content is for educational and preparatory purposes only.