IT in Manufacturing


Quantum computing is not as futuristic as it sounds

January 2025 IT in Manufacturing

The first quantum computer was created almost three decades ago, in 1998. Yet the topic still seems to elicit images of ‘Back to the Future’ for most. While its applications are still unknown to many, this advanced field combines computer science, physics and mathematics to deliver solutions the world has been trying to find for aeons – and those it doesn’t yet know it needs.

Rivalling classical computers and coming out on top, quantum computing uses quantum mechanics to find fast and complete answers to complex problems. According to Carrie Peter, managing director at Impression Signatures and Advocacy Committee vice-chair at the Cloud Signature Consortium, although it sounds futuristic, quantum computing is advancing at a rapid rate – certainly faster than expected. Today, many countries are already in possession of their own quantum computers, with quantum computing even being available as a SaaS solution.

As is the case with most technological developments, the opportunities offered by quantum computing are equalled by the threats this advanced computer science introduces. “The evolution of quantum computing puts the security of any data available in the digital space in jeopardy,” warns Peter.

IBM recently published an article on quantum computing, noting that “quantum technology will soon be able to solve complex problems that supercomputers can’t solve, or can’t solve fast enough”. But what if the problem it’s trying to solve is breaking through security firewalls or encryptions?

“This poses a massive threat to encryption, as a quantum computer could decrypt traditional encryption in a fraction of the time it does today. While this surely won’t halt the evolution of the quantum computer, it does mean that security must be bolstered,” adds Peter. Thankfully, global standards and security bodies have been hard at work developing and testing a new set of post-quantum encryption algorithms, with the first three standards being released on 13 August 2024.

As published by the National Institute of Standards and Technology (NIST), these new standards include the Federal Information Processing Standard (FIPS) 203, intended as the primary standard for general encryption; FIPS 204, intended as the primary standard for protecting digital signatures; and FIPS 205, also designed for digital signatures and employing the Sphincs+ algorithm.

In parallel, as standards and security measures are fortified against the threats of quantum computing, it is essential that organisations begin paying attention to post-quantum cryptography (PQC). “Somewhat short-sightedly, many business leaders are countering the argument for PQC with the misguided belief that we are years away from commercially available quantum computers,” says Peter. “The reality is that these computers are already being miniaturised, and will likely come to market much sooner than expected.”

Additionally, putting PQC measures in place now will protect data from nefarious strategies such as Store-Now Decrypt-Later (SNDL). This cyberthreat entails the storing of large amounts of encrypted data now, with the intention of decoding and using it later, once quantum computers become more widely available.

In a recent blog entry, HP put it like this: “A sufficiently powerful quantum computer will break the cryptography we rely on in our digital lives. An attacker can intercept and store encrypted data today, and when quantum computers become feasible, the attacker could decrypt the stored data.”

Lastly, Peter motivated that companies need to start thinking about PQC now, because some devices (such as cars) that are being produced today will most certainly be on the road when quantum computing is proliferated. “In 2023, the US government already put out a mandate that companies must transition onto PQC as soon as possible. Now, with the release of the new standards it is critical to take the need to transition onto PQC seriously.”

Of course, with many global standards being incorporated into these algorithms, any standards-based organisation or solution (such as digital signature providers) will be forced to adopt and comply with PQC. This means that for users of these solutions the switch to the more secure standard will be seamless.

However, it is important for companies to note that encryption is only as good as the authentication they apply while using encryption. “For organisations to guarantee that they are secure, they must ensure appropriate access management, authentication, and zero trust within their organisations.”

For more information contact Carrie Peter, Impression Signatures, +27 71 881 9241, www.impression-signatures.com




Share this article:
Share via emailShare via LinkedInPrint this page

Further reading:

Sustainable energy management
Siemens South Africa IT in Manufacturing
Utilising its innovative ONE approach technology, Siemens provides complete transparency on resource consumption and offers data-driven optimisation recommendations for sustainable energy management.

Read more...
Paving the way for a carbon-neutral future in South Africa
IT in Manufacturing
At ABB Electrification, we believe the infrastructure of the future must do more than support daily operations, it must anticipate them. We are committed to building intelligent systems that connect and optimise infrastructure across sectors.

Read more...
Africa’s hidden AI advantage
IT in Manufacturing
Through my work implementing AI systems across three continents, I’ve become convinced that Africa’s unique context demands urgent AI adoption. Successful implementation requires local expertise to understand resource constraints as design parameters to create the innovations that make technology truly work under real-world conditions.

Read more...
Siemens Xcelerator empowers space-tech pioneer, Skyroot Aerospace
Siemens South Africa IT in Manufacturing
Siemens Digital Industries Software has announced that Skyroot Aerospace, a leading private space launch service company in India, has adopted Polarion software from the Siemens Xcelerator portfolio to digitally transform its software development processes and enhance efficiency as it aims to accelerate access to space for its customers worldwide.

Read more...
Water is running out, is your ESG strategy ready?
IT in Manufacturing
Water is one of the most critical yet undervalued resources in modern business. Water stewardship asks businesses to understand their water footprint across the entire value chain and to engage with others who share the same water resources.

Read more...
Cybersecurity in 2025: Six trends to watch
Rockwell Automation IT in Manufacturing
Rockwell Automation’s 10th State of Smart Manufacturing report finds that cybersecurity risks are a major, ever-present obstacle, and are now the third-largest impediment to growth in the next 12 months.

Read more...
The state of the smart buildings market in 2025
IT in Manufacturing
Smart buildings are entering a transformative phase, driven by sustainability goals, technological innovation and evolving user expectations. According to ABI Research’s latest whitepaper, the sector is undergoing a strategic overhaul across key areas like retrofitting, energy efficiency, data-driven operations and smart campus development.

Read more...
Digital twin for Bavaria’s National Theatre
Siemens South Africa IT in Manufacturing
Siemens and the Bavarian State Opera are digitalising the acoustics in Bavaria’s National Theatre in Munich, Germany. The result is a digital twin that simulates sound effects, orchestral setups and venue configurations in a realistic 3D acoustic model so that musicians, the director and conductors can assess a concert hall’s acoustics even before the first rehearsal.

Read more...
How AI can help solve South Africa’s water crisis
IT in Manufacturing
Climate change, ageing infrastructure, pollution and unequal access are putting intense pressure on the country’s water systems. A powerful question arises: “Can artificial intelligence help us change course?”

Read more...
Backup has evolved, but has your strategy?
IT in Manufacturing
With cyber threats rising and compliance standards tightening, South African organisations are under growing pressure to revisit their data protection strategies. The era of treating backups as a box-ticking exercise is over.

Read more...









While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd | All Rights Reserved