Quantum Computing Risks: How investment companies can now protect data – CFA Institute Enterprising Investor

Quantum Computing Risks: How investment companies can now protect data – CFA Institute Enterprising Investor

7 minutes, 54 seconds Read

Quantum Computing may sound futuristic, but for investment companies it is just around the corner. The rapid pace of innovation in quantum computer use in combination with the threat level that is set by a lack of similar security measures requires rapid action in industry.

Investment in Quantum Computing Technologies reached new highlights in 2025, with more than $ 1.25 billion collected in Q1,[1] And research emphasizes the transition from development to deployment.[2] Although the practical possibilities of Kwantum are still on the rise, investment firms should not only take the opportunities, but also the risks. This message outlines immediate steps that investment companies can take to strengthen data security and prepare for the quantum era.

As the quantum opportunities improve, cyber security specialists warn that existing coding standards can soon be endangered. Security experts use the term “Q-day” to describe the point at which quantum computers become powerful enough to break the coding of today, so that current protection is outdated. Although that threshold has not yet been reached, a related and more direct danger is already on the rise. Harmful actors can ‘harvest now, later decode’, who today underestimate and store coded data with the intention of unlocking it as soon as the quantum possibilities become adults.

Why modern coding methods are inadequate

To contextualize the risks of Quantum Computing, it is necessary to first assess the mechanisms underlying modern cryptographic systems. Digital information, whether it is text, numbers or visuals, is displayed universally in binary format. The sequences of zeros and those ensure interoperability in global computer networks.

Coding protects digital communication by converting original binary sequences into unintelligible forms through mathematical transformations. This warns customer records, trade data, internal communication and other own data. It is also based on the digital signature algorithms and hash functions that are used to guarantee safety and privacy in block chains.

Coding can be subdivided into two general types:

  1. Private key codingfor which a safe key exchange between parties requires.
  2. Public codingAlso known as asymmetrical coding that uses various public and private keys.

The RSA -AlgorithmMuch used in financial systems, illustrates public key coding. Its security is not derived from the secret of the method, as used by private key coding, but from the calculation of invoicing large prime numbers with classic computers. However, this dependence on mathematical stubbornness makes the system that is vulnerable to progress in computational capacities, in particular Kwantum Computing.

In the nineties, computer scientist Peter Shor introduced a quantumalgorithm that is able to have large entire numbers invoiced efficiently, which undermines the security of RSA and other widely used coding schedules. Although originally of theoretical importance, given the immature of quantum hardware at that time, this algorithm is now of profound meaning as the quantum technologies progress.

What once seemed purely theoretically is now closer to the practical reality, thanks to rapid technological progress. The estimated resources needed to break RSA coding have steadily decreased, from around 20 million qubits[3] In 2019 to fewer than 1 million Qubits in 2025 (current quantum computers, 100 to 200 Qubits work).[4] To put this in perspective, Google estimates that their 105 breeding quantum processor can calculate in just five minutes, which would take the fastest non-Kantum super computers today about 10 Septillion (10²⁵) years.[5]

The algorithm from Shor shows that, as soon as sufficient powerful quantum computers have been realized, many current cryptographic systems will become outdated. The consequences extend between domains such as financial transactions, government data and private communication. In contrast to conventional cyber attacks, such an infringement could go unnoticed, with a systemic risk of an unprecedented scale.

The harvest now, decoded later threat

Malicious Actors can already intercept and archive encrypted data with the intention of decoding it retroactively as soon as quantum computational sources are available. As soon as they have the data, there is little that a company can do to prevent decoding using future advanced computing power.

The threat to financial institutions is particularly serious.

“Harvest now, Decrypt later” emphasizes the urgent need for proactive security measures. Reactive strategies will not be effective as soon as Q day occurs; Data in the past and present are accessible. That is why the anticipatory acceptance of quantum -resistant cryptographic techniques is essential.

Why the current cryptography methods are not in force after the quantum

While companies are looking for ways to defend themselves against future quantum fractures, two main approaches have emerged. The first, cryptography after Quantum (PQC), strengthens existing digital systems using new mathematical algorithms that are designed to withstand quantum attacks. The second, quantum key distribution (QKD), uses principles of quantum physics to make inherently secure communication channels.

Cryptography after Quantum (PQC) refers to classic cryptographic algorithms designed to withstand quantum computational attacks. In contrast to quantum cryptography, PQC does not use quantum phenomena, but rely on mathematical problems as a resistant against quantum attacks.

The implementation of PQC is an interim security, because it strengthens the resilience against quantum improvements in the short term. However, PQC is not a definitive solution. As quantum hardware evolves, algorithms that are currently considered safe can ultimately be affected. Consequently, PQC must be considered a transitional measure within a wider, dynamic framework of cyber security.

While PQC Interim protection offers, Quantum Key Distribution (QKD) uses the principles of quantum mechanics to make safe communication channels possible. In particular, QKD operates quantum phenomena over long distance to guarantee that any attempt at interception can be detected.

For example, if confusing photons are used in the most important distribution, eavesdropping installes observable disruptions, whereby legitimate parties are warned. In contrast to classical methods, QKD offers theoretical safety guaranteed by physical law instead of computational problems.

Although there are pilot applications, including land -based fiberglass and satellite -based quantum networks, current limitations in scalability and infrastructure hinder widespread acceptance. Nevertheless, QKD represents a critical road for long -term safe communication in the quantum era.

Companies must now act

The approaching disturbance of Quantum Computing requires coordinated board. Although governments only start struggling with the scale of quantum threats, many financial institutions continue to hesitate to act. A recent study shows that companies are waiting for regulating mandates before tackling the quantum risk in their risk management frameworks, a delay that can prove to be expensive.[6]

At the same time, migration to quantum -resistant systems presents formidable challenges for financial institutions. The process includes considerable costs, technical complexity and extensive timelines for implementation, including systemup grades and retraining of workforce.

The uncertainty of future technological developments is the worsening of these challenges. A newly adopted algorithm after the quantum could itself become vulnerable within a decade, so that substantial investments in the sunken costs can be endangered.

One of the most important initiatives to take on this challenge together is led by the National Institute of Standards and Technology (Nist) in the United States. In 2016, Nist launched an international competition to identify cryptographic algorithms that can be displayed. After rigorous tests and evaluation, Nist announced four selected algorithms in December 2024 and imposed the establishment for global cryptographic standards after Quantum.

This milestone represents the formal start of the era after the quantum, underlines the role of international cooperation and adaptive regulatory frameworks in shaping secure data infrastructures.

Given the risks of waiting for policy guidelines in combination with the challenges of complete quantummigration, experts recommend a layered strategy:

  1. Phase one: Transition to a hybrid model that combines today’s well-tested coding methods with the recently adopted PQC standards of Nist, which considerably increases the threshold for potential attackers.
  2. Phase two: Build up resilience in the long term by preparing for the integration of quantum coding and quantum networks, which offer security based on the physical principles of quantum mechanics.

This approach emphasizes agility and adaptability and acknowledges that cyber security requires continuous evolution in the quantum era instead of dependent on a single definitive solution.

A phase one checklist for investment firms

Involve and train stakeholders

  • Leadership and staff training on the risks of quantum technologies and bravely further learning and participation.
  • Board Oversight: Add the willingness of quantity to riskodashboards.

Inventorize

  • Map each system, supplier and process on the map of cryptographic methods.
  • CBOMs (cryptographic bill of materials) can be produced that identify cryptographic assets and their properties and dependencies.

Prioritize based on risk

  • Identify high -quality data with the greatest risk.
  • Sketch a route map of the quantum protection with milestones and KPIs.

Perform the seller due diligence

  • Make sure that preservators, OMS/EMS providers and data vendors have quantum transition plans.
  • Dialogue with suppliers about quantum threats and risk management strategies.

Pilot and test new algorithms

  • Start by driving NIST-AGE OPERED PQC algorithms.
  • Keep checking and updating based on revised PQC standards and demonstrating cryptographic agility as cyber threats evolve.

Conclusion

If market participants lose confidence in the ability of the investment management industry to keep their data safe, general confidence can decrease. But more than that, retail and institutional investors can experience financial damage. Early and agile acceptance of quantum strategies and processes is an integral part of reducing these risks.


[1] Swayne, 2025

[2] Soller, 2025

[3] Qubits refer to “Kwantumbits” and are the fundamental unity of quantum information.

[4] Gidney, C. (2025). How to refrain from 2048 bit RSA -reminded numbers with less than a million noisy Qubits. Arxiv PrePrint Arxiv: 2505.15917.

[5] Neven, H. (2024). Meet Willow, our state-of-the-art quantum chip. Google. https://blog.google/technology/research/google-willow-quantum-chip/

[6] EvolutionQ (2025). “Quantum Threat Timeline 2025: Executive perspectives on barriers for action.” Global Risk Institute in Financial Services (GRI). htts

#Quantum #Computing #Risks #investment #companies #protect #data #CFA #Institute #Enterprising #Investor

Similar Posts

Leave a Reply

Your email address will not be published. Required fields are marked *