HeadlinesBriefing favicon HeadlinesBriefing.com

Quantum Threats Force Big Tech to Rush Security Overhaul

Ars Technica •
×

Back in 2012, a malware bundle called Flame exploited MD5 to forge a Microsoft update certificate, demonstrating the fragility of widely used hash functions. That incident, tied to U.S. and Israeli developers, reminds engineers that collisions can turn routine software patches into nation‑state attacks. This episode set the stage for a broader push to abandon legacy cryptography across the industry.

Recent papers from Oratomic and Google show that a neutral‑atom quantum computer could break ECC‑256 with just 10,000 physical qubits, while Google’s own circuits need 1,200 logical qubits—about 500,000 physical qubits—to crack 256‑bit keys in nine minutes. The result forces firms like Google and Cloudflare to cut their post‑quantum readiness deadlines to 2029 before quantum threats emerge in the future.

Industry bodies echo this urgency: the U.S. Defense Department demands quantum‑safe systems by 2031, and NIST calls for deprecation of vulnerable algorithms by 2035. With ECC now shown to be breakable in minutes, consumers face higher stakes: compromised digital signatures could undermine everything from blockchain transactions to secure VPN tunnels, making the transition to lattice‑based schemes imperative for all users.