And the perils
There are risks, however. The computing power of these mighty quantum machines could threaten modern cryptography. This has far-reaching implications for financial stability and privacy. Today’s cryptography is based on three main types of algorithms: symmetric keys, asymmetric keys (also known as public keys), and hash functions. With symmetric keys, the same key is used to encrypt and decrypt a message. Asymmetric cryptography uses a pair of related keys (one private and the other public). A message encrypted by one key can be decrypted only by that key’s pair. These algorithms are widely used for digital authentication, digital signatures, and data security. Hash functions convert digital input into a unique set of bytes of fixed size. They are used to store passwords securely and to support digital identities.
These cryptographic algorithms have mostly succeeded in safeguarding data. Even today’s most advanced digital supercomputers and cryptanalysis techniques cannot break them fast enough. However, quantum computers will be able to solve hard mathematical problems exponentially faster than digital supercomputers. This will make asymmetric cryptography obsolete and will weaken other cryptographic keys and hashes. Theoretically, a fully functioning quantum computer could break an asymmetric key in a matter of minutes. Public keys are especially vulnerable because most of them are based on the factorization problem: it is hard for digital computers to find two prime numbers from their product. Quantum computers, by contrast, can do it effortlessly.
Asymmetric keys are widely used to secure communications over the internet. Successful attacks against these algorithms would compromise connections used by the financial system, including mobile banking, e-commerce, payment transactions, ATM cash withdrawals, and VPN communications, to name just a few. Vulnerable applications that rely on public-key cryptography also include popular digital assets such as Bitcoin and Ethereum, as well as password-protected web applications. The best known of these protocols, HTTPS, is used by 97 of the world's top 100 websites.
For some applications, it may be too late already. Any information assumed secure today could be captured and stored to be deciphered later once sufficiently powerful quantum computers are created. In fact, almost any encrypted personal or financial message sent and stored today could be deciphered retroactively by a powerful quantum computer. Most financial institutions and regulators are not yet alert to these novel risks.