Preparing for Q-Day: Making payments quantum-safe

by George Iddenden

Share this post

As the threat of quantum computing looms, how can the payments industry safeguard against the quantum decryption capabilities that could undermine global financial security?

Quantum computing represents a revolutionary leap in computational power, with the potential to solve complex problems far beyond the reach of classical computers. However, this power also threatens the cryptographic systems currently securing digital payments. As quantum technology advances, the payments industry faces a critical challenge: preparing for the inevitable arrival of Q-Day—the moment when quantum computers can break the encryption protecting our financial transactions.

Q-Day would compromise the cryptographic protections underlying many aspects of digital security, including payment systems, online communications, and data storage. This could potentially expose sensitive information to attackers with access to quantum computers.

Although the exact timing of Q-Day is uncertain, the concept serves as a call to action for companies and governments to prepare for the post-quantum era. It underscores the urgency of developing and adopting quantum-resistant cryptographic algorithms before quantum computers can break current encryption standards. With the stakes clearly defined, it’s crucial to understand how quantum computing could impact the security of payment systems and the vulnerabilities it could expose.

Understanding quantum computing and its potential impact on payments

Current payment security relies heavily on encryption methods like Rivest–Shamir–Adleman (RSA) and Elliptic curve cryptography (ECC), based on the complexity of solving intricate mathematical problems. However, quantum computers, particularly with the use of Shor’s algorithm—developed by mathematician Peter Shor in 1994—pose a serious threat to these encryption schemes.

Shor’s algorithm is capable of factoring large numbers exponentially faster than the best-known classical algorithms. For instance, while a classical computer might take an impractically long time to factor a 2048-bit number typical of RSA encryption, a sufficiently powerful quantum computer running Shor’s algorithm could break this encryption in a fraction of the time.

The implications for the financial industry are profound. If quantum computers can crack the encryption safeguarding payment systems, attackers could gain access to vast amounts of sensitive information. Decrypted credit card data could be exploited for unauthorised transactions, while personal data breaches could lead to widespread identity theft. Furthermore, the ability to undermine current encryption could facilitate large-scale financial fraud, eroding trust in digital payments and potentially destabilising the entire financial system.

This looming threat underscores the critical need for companies to begin transitioning to quantum-resistant cryptography, ensuring that their payment systems remain secure as quantum technology advances.

Sudeepta Das, chief technology officer at Cohesive Architecture, warns of the catastrophic potential of quantum computers compromising widely-used encryption: “While Shor’s algorithm could potentially compromise RSA encryption, if such an event were to occur, it would put much of the internet at risk, as RSA-2048 safeguards payment systems and a wide range of other data.”

The gravity of this potential threat highlights the urgency with which the financial industry must approach the development and adoption of quantum-resistant cryptographic methods. The sooner these systems are in place, the more secure payment systems will be against the growing capabilities of quantum technology.

Quantum computing presents a profound challenge to the security of digital payment systems, with the potential to render traditional cryptographic algorithms obsolete.

Key threats to current payment systems

One of the most pressing concerns with the advent of quantum computing is its potential to render current encryption methods, such as RSA and ECC, obsolete. Today’s payment systems rely heavily on these cryptographic algorithms to secure financial transactions and protect sensitive data.

These algorithms are designed to make it extremely difficult for anyone without the proper decryption key to access the information, thanks to the monumental computational challenge involved in factoring large numbers and solving complex mathematical problems.

However, the arrival of quantum computing threatens to upend this security paradigm. Quantum computers, equipped with algorithms like Shor’s, could break these encryption methods with relative ease, exposing a wide range of data to potential compromise. The types of data at risk are extensive and include:

  • Credit card numbers: If encryption is broken, credit card information could be intercepted and used for unauthorised transactions.
  • Transaction records: Financial transaction histories could be exposed, allowing attackers to manipulate or steal funds.
  • User credentials: Login credentials, including passwords and PINs, could be decrypted, giving attackers access to accounts and financial resources.

The decryption of sensitive financial data by quantum computers could lead to a surge in identity theft and financial fraud. Once attackers gain access to decrypted information, such as personal identification details, bank account numbers, or credit card information, they can easily impersonate individuals, open fraudulent accounts, make unauthorised purchases or even transfer funds without the owner’s consent.

The scale of this impact could be staggering. While individual accounts may be compromised, quantum computing’s ability to decrypt data on a large scale means that entire databases of financial information could be exposed in a single breach.

Such breaches could result in massive financial losses across millions of accounts, overwhelming financial institutions with fraud claims and disrupting services. The sheer magnitude of these potential breaches could dwarf any data theft or fraud incidents seen to date, putting unprecedented pressure on the financial industry to respond and recover.

As the threat of quantum computing continues to loom, it is essential for the financial industry to recognise these risks and take proactive steps to safeguard payment systems before it’s too late.

Steps companies can take to prepare for quantum computing

As quantum computing advances, the potential threats to payment systems become increasingly clear, making it crucial for companies to take proactive measures to safeguard their data and systems. The key to mitigating the risks posed by quantum computers lies in adopting cryptographic algorithms designed to withstand quantum decryption capabilities. Researchers are already developing quantum-resistant cryptographic methods that are believed to be secure against these emerging threats.

Two notable types of quantumresistant algorithms are latticebased cryptography and hash-based cryptography:

  • Lattice-based cryptography utilises mathematical structures known as lattices to create encryption methods that are highly challenging for quantum computers to break. These methods rely on problems related to lattice structures, such as finding short vectors or solving the closest vector problem, which are currently considered difficult even for quantum machines.
  • Hash-based cryptography uses hash functions to build secure digital signatures. This approach leverages the strength of hash functions, which are inherently resistant to quantum attacks, to create signature schemes that remain secure even in the quantum era.

To effectively transition to a quantum-safe future, companies must begin integrating these quantum-resistant algorithms into their security infrastructure now, before quantum computing capabilities reach a critical level. The process of transitioning to quantum-safe encryption should be methodical and phased to minimise disruption and ensure compatibility with existing systems.

Beyond adopting new cryptographic methods, companies should also consider the following steps:

1. Evaluate current cryptographic infrastructure: Start by assessing your existing cryptographic algorithms to identify vulnerabilities to quantum attacks. Understanding where your systems are susceptible is essential for planning an effective transition.

2. Implement a phased transition plan: Develop a phased plan to replace old algorithms with quantumresistant ones gradually. This approach allows for testing and validation of new algorithms before full deployment, ensuring minimal disruption to existing systems.

3. Engage with industry and standards organisations: Collaborate with industry peers and participate in standards organisations working on quantum-resistant cryptography. This engagement helps ensure your practices align with emerging standards and best practices.

4. Educate and train personnel: Ensure your IT and security teams know quantum threats and quantumresistant cryptography. Training will be essential for managing and implementing the new systems effectively.

By taking these steps now, companies can position themselves to stay ahead of quantum threats, ensuring that their payment systems remain secure as quantum technology continues to evolve.

The sooner organisations begin this transition, the better prepared they will be to face the challenges of the post-quantum era.

The urgency of this transition cannot be overstated; while the full realisation of quantum computing’s potential may still be years away, the time to act is now.

Looking ahead

Quantum computing presents a profound challenge to the security of digital payment systems, with the potential to render traditional cryptographic algorithms obsolete. As the industry moves closer to the era of quantum computing, the stakes for financial institutions and technology providers have never been higher. The threats posed by quantum technology could lead to widespread financial fraud, identity theft, and a significant erosion of trust in digital payments.

To safeguard against these looming risks, it is crucial for companies to begin transitioning to quantum-resistant cryptographic algorithms and implement robust security measures. Securing payment systems against quantum threats will require significant investment, collaboration, and a proactive approach to adopting new technologies.

The urgency of this transition cannot be overstated. While the full realisation of quantum computing’s potential may still be years away, the time to act is now. By preparing today, companies can ensure that their systems remain secure in the face of tomorrow’s quantum challenges, protecting sensitive data and maintaining the trust of their customers.

As the industry works towards harnessing the power of quantum computing, it is essential that these advancements are pursued responsibly. Das emphasises the broader implications: “Looking forward, I hope that those of us involved in developing and using these technologies will strive to create innovations that benefit humanity and society as a whole. Quantum computing has the potential to bring about transformative changes, and it is crucial that we harness this technology responsibly.”

In the end, the transition to quantumsafe encryption is not just about protecting financial systems—it’s about ensuring the continued trust and stability of the entire digital economy. The time to prepare is now, before the quantum future becomes the quantum present.

Payments Review Autumn 2024
Read the Payments Review autumn edition here

More To Explore

Membership

Merchant Community Membership

Are you a member of The Payments Association?

Member benefits include free tickets, discounts to more tickets, elevated brand visibility and more. Sign in to book tickets and find out more.

Welcome

Log in to access complimentary passes or discounts and access exclusive content as part of your membership. An auto-login link will be sent directly to your email.

Continue reading

Explore how the payments industry can counter quantum threats to maintain digital security. Subscribe to Payments Review to read the full article.

Subscribe to continue reading

Already a subscriber? Please log in to continue

Having trouble signing?

We use an auto-login link to ensure optimum security for your members hub. Simply enter your professional work e-mail address into the input area and you’ll receive a link to directly access your account.

First things first

Have you set up your Member account yet? If not, click here to do so.

Still not receiving your auto-login link?

Instead of using passwords, we e-mail you a link to log in to the site. This allows us to automatically verify you and apply member benefits based on your e-mail domain name.

Please click the button below which relates to the issue you’re having.

I didn't receive an e-mail

Tip: Check your spam

Sometimes our e-mails end up in spam. Make sure to check your spam folder for e-mails from The Payments Association

Tip: Check “other” tabs

Most modern e-mail clients now separate e-mails into different tabs. For example, Outlook has an “Other” tab, and Gmail has tabs for different types of e-mails, such as promotional.

Tip: Click the link within 60 minutes

For security reasons the link will expire after 60 minutes. Try submitting the login form again and wait a few seconds for the e-mail to arrive.

Tip: Only click once

The link will only work one time – once it’s been clicked, the link won’t log you in again. Instead, you’ll need to go back to the login screen and generate a new link.

Tip: Delete old login e-mails

Make sure you’re clicking the link on the most recent e-mail that’s been sent to you. We recommend deleting the e-mail once you’ve clicked the link.

Tip: Check your security policies

Some security systems will automatically click on links in e-mails to check for phishing, malware, viruses and other malicious threats. If these have been clicked, it won’t work when you try to click on the link.

Need to change your e-mail address?

For security reasons, e-mail address changes can only be complete by your Member Engagement Manager. Please contact the team directly for further help.

Still got a question?