Illinois Businesses Must Act Now: Quantum Computing Could Break Your Current Encryption by 2034
The cybersecurity landscape is facing an unprecedented threat that could fundamentally change how Illinois businesses protect their data. Quantum computing technology is developing rapidly, and some experts predict that a device with the capability to break current encryption methods could appear within a decade, threatening the security and privacy of individuals, organizations and entire nations. For businesses across Illinois, the time to prepare for quantum-safe encryption isn’t tomorrow—it’s today.
The Quantum Threat: Understanding the Timeline
While quantum computers capable of breaking current encryption don’t exist yet, the threat is rapidly approaching. In 2024, it estimated that by 2034, there was between a 17% and 34% chance that a cryptographically relevant quantum computer (CRQC) would exist capable of breaking RSA 2048 in 24 hours. This means that the RSA encryption currently protecting your business communications, financial transactions, and sensitive data could become vulnerable within the next decade.
The danger isn’t just theoretical. As quantum computing advances, the threat of Harvest Now, Decrypt Later (HNDL) cyberattacks become increasingly pressing—where threat actors record and store encrypted data today with the intention of decrypting it once quantum capabilities mature. Cybercriminals are already collecting encrypted data with the expectation that they’ll be able to decrypt it once quantum computers become available.
NIST Standards: The Foundation of Quantum-Safe Security
Recognizing this emerging threat, NIST has released a final set of encryption tools designed to withstand the attack of a quantum computer. The algorithms announced today are specified in the first completed standards from NIST’s post-quantum cryptography (PQC) standardization project, and are ready for immediate use. The standards — containing the encryption algorithms’ computer code, instructions for how to implement them, and their intended uses — are the result of an eight-year effort managed by NIST.
Most recently, NIST has chosen a new algorithm for post-quantum encryption called HQC, which will serve as a backup for ML-KEM, the main algorithm for general encryption. HQC is based on different math than ML-KEM, which could be important if a weakness were discovered in ML-KEM.
Why Illinois Businesses Need to Act Now
Illinois has emerged as a major hub for quantum research and development. Governor Pritzker and the State of Illinois pledged to coinvest up to $140 million in the project for the new federal- and state-funded Quantum Proving Ground, demonstrating the state’s commitment to quantum technology advancement. This positions Illinois businesses at the forefront of both quantum opportunities and quantum threats.
The transition to post-quantum cryptography isn’t a simple switch. Migration to post quantum cryptography (PQC) is not a flip-the-switch moment, it’s a multiyear transformation that requires immediate planning and coordinated execution to avoid a last-minute scramble. The US Office of Management and Budget has estimated that transitioning prioritized sensitive information within the US government to post-quantum encryption will cost approximately $7.1 billion between 2025 and 2035. This extensive transition plan will require not only significant financial investment but also substantial human resources, specialized skills, and top-down leadership initiatives to implement effectively.
Practical Steps for Illinois Businesses
For Illinois businesses looking to prepare for the quantum-safe era, the process should begin with assessment and planning. Start by educating key employees at all levels throughout the organization about the risks posed by quantum computing and the importance of quantum-safe measures. The most important first step in the PQC transition is understanding your current cryptographic footprint. Agencies should begin by conducting a full inventory of systems using vulnerable encryption algorithms. This includes identifying where encryption is used, the types of cryptographic protocols in play, and the sensitivity of the protected data.
Many organizations will benefit from a hybrid approach during the transition period. Most organizations can’t replace their entire security infrastructure overnight, so a hybrid approach is the best starting point. Use Hybrid TLS (Transport Layer Security), which combines traditional encryption (RSA, ECC) with Post-Quantum Cryptography (PQC).
The Role of Professional Cybersecurity Services
Given the complexity of transitioning to quantum-safe encryption, many Illinois businesses will benefit from partnering with experienced cybersecurity providers. Professional Cybersecurity Services in Illinois can help businesses navigate this transition by conducting comprehensive assessments, developing customized migration strategies, and implementing quantum-safe solutions that align with NIST standards.
Established cybersecurity providers understand that since 1991, CTS Computers has been a leading provider of IT support and consulting, focusing on small and medium sized businesses in central Illinois and Indiana. With our comprehensive cybersecurity services, you can rest easy knowing that your business is protected from evolving threats. These providers can help businesses prepare for quantum threats while maintaining current security standards.
Industry-Specific Considerations
Different industries face varying levels of quantum risk. Adoption of the new NIST-approved encryption algorithms for post-quantum cryptography for data in transit has started and will slowly climb in 2025, starting first in the especially risk-aware sectors like defense and finance. Healthcare organizations, financial institutions, and manufacturing companies—all significant sectors in Illinois’s economy—should prioritize their quantum-safe transitions due to the sensitive nature of their data.
Looking Ahead: The Quantum-Safe Future
2025 is an important year – it is probably our last chance to start our migration to post quantum cryptography before we are all undone by cryptographically relevant quantum computers. For Illinois businesses, this represents both a challenge and an opportunity. Those who act now to implement quantum-safe encryption will not only protect their data but also gain a competitive advantage in an increasingly security-conscious marketplace.
The quantum revolution is coming, and it will fundamentally change cybersecurity as we know it. Illinois businesses that begin their quantum-safe journey today will be the ones that thrive in tomorrow’s post-quantum world. The question isn’t whether quantum computers will break current encryption—it’s whether your business will be ready when they do.
Don’t wait for quantum computers to become a reality. Start planning your transition to quantum-safe encryption now, and ensure your Illinois business is prepared for the cybersecurity challenges of the quantum era.