Key Expertise
Cybersecurity Specialists focusing on quantum computing analyse and address the security implications of quantum computational capabilities, particularly regarding cryptographic systems. These professionals develop transition strategies and implement new security approaches to maintain data protection in the quantum computing era.
These specialists conduct comprehensive cryptographic vulnerability assessments to identify systems susceptible to quantum attacks. They analyse existing security infrastructure to identify cryptographic algorithms vulnerable to quantum methods such as Shor’s algorithm, which threatens widely-deployed public key crypto systems including RSA and elliptic curve cryptography.
A primary responsibility involves developing and implementing post-quantum cryptography transition strategies. This includes selecting appropriate quantum-resistant algorithms from candidates being standardised by organisations such as NIST, creating migration pathways for existing systems, and establishing cryptographic agility to accommodate evolving standards and threats.
Cybersecurity Specialists in this domain establish appropriate timelines and priorities for cryptographic transitions based on threat models, data sensitivity, and system lifespans. They identify systems requiring immediate attention versus those that can transition on normal replacement cycles, balancing security requirements against operational and financial constraints.
These professionals may also evaluate quantum cryptographic approaches, including Quantum Key Distribution (QKD) systems that use quantum mechanical properties for secure key exchange. They assess the security properties, implementation requirements, and appropriate use cases for these technologies within specific organizational contexts.
A significant challenge involves maintaining interoperability during cryptographic transitions. Security specialists must implement hybrid approaches that maintain compatibility with external systems while progressively enhancing security against quantum threats. They develop testing methodologies to verify that post-quantum implementations maintain required security properties without compromising system functionality.
As quantum computing advances, these specialists continuously monitor technological developments to adjust security strategies appropriately. Their work ensures that organisational data remains protected against both current threats and future quantum capabilities, maintaining security continuity through the cryptographic transition period.
Recommended Reading
The following are a hand-picked selection of articles and resources relating to the Cybersecurity Specialist role and relevant input in the safe adoption of quantum computing. The readings that follow include experts in the field, active practitioners, and notable perspectives.
Foundational Concepts: The Quantum Threat to Cryptography
Caltech Science Exchange. (Accessed July 20, 2025). “How Will Quantum Technologies Change Cryptography?” Caltech Science Exchange. https://scienceexchange.caltech.edu/topics/quantum-science-explained/quantum-cryptography
Su, R., Zhang, J., & Zhu, J. (May 2022). “Quantum Computing and its Impact on Cryptography.” MIT Computer Science and Artificial Intelligence Laboratory. https://courses.csail.mit.edu/6.857/2022/projects/Su-Zhang-Zhu.pdf
RocketMeUpCybersecurity. (Oct. 26, 2023). “Quantum Computing’s Impact on Cryptography — The Future of Encryption.” Medium. https://medium.com/@RocketMeUpCybersecurity/quantum-computings-impact-on-cryptography-the-future-of-encryption-1f8804205d86
ByteBridge. (Jan. 15, 2024). “Quantum Computing and Cryptography: An Analysis of Shor’s Algorithm.” Medium. https://bytebridge.medium.com/quantum-computing-and-cryptography-an-analysis-of-shors-algorithm-66980e3c8d10
Post-Quantum Cryptography (PQC) Transition and Strategy
Wikipedia. (Accessed July 20, 2025). “NIST Post-Quantum Cryptography Standardization.” Wikipedia, the Free Encyclopedia. https://en.wikipedia.org/wiki/NIST_Post-Quantum_Cryptography_Standardization
National Institute of Standards and Technology. (Aug. 2024). “NIST Releases First 3 Finalized Post-Quantum Encryption Standards.” NIST.gov. https://www.nist.gov/news-events/news/2024/08/nist-releases-first-3-finalized-post-quantum-encryption-standards
National Institute of Standards and Technology. (March 2025). “NIST Selects HQC as Fifth Algorithm for Post-Quantum Encryption.” NIST.gov. https://www.nist.gov/news-events/news/2025/03/nist-selects-hqc-fifth-algorithm-post-quantum-encryption
Industrial Cyber. (June 5, 2024). “New PQC Migration Roadmap offers actionable guidance for transitioning to quantum-safe cryptography.” Industrial Cyber. https://industrialcyber.co/threats-attacks/new-pqc-migration-roadmap-offers-actionable-guidance-for-transitioning-to-quantum-safe-cryptography/
Encryption Consulting. (March 12, 2024). “10 Enterprise Must-Haves for a Successful Post-Quantum Cryptography (PQC) Migration.” EncryptionConsulting.com. https://www.encryptionconsulting.com/must-haves-for-a-successful-pqc-migration/
epicbytecraft. (Jan. 22, 2024). “Post-Quantum Cryptography Transition: An Analysis of Challenges and Efficiency.” Medium. https://medium.com/@epicbytecraft/post-quantum-cryptography-transition-an-analysis-of-challenges-and-efficiency-6f983db24fe5
Bosch Global. (May 8, 2024). “Quantum computing threat: How to prepare for a smooth transition to post-quantum cryptography.” Bosch.com. https://www.bosch.com/stories/quantum-computing-threat-how-to-prepare-for-a-smooth-transition-to-post-quantum-cryptography/
Quantum Key Distribution (QKD)
National Security Agency. (Sept. 20, 2022). “Quantum Key Distribution (QKD) and Quantum Cryptography (QC).” NSA.gov. https://www.nsa.gov/Cybersecurity/Quantum-Key-Distribution-QKD-and-Quantum-Cryptography-QC/
Wikipedia. (Accessed July 20, 2025). “Quantum key distribution.” Wikipedia, the Free Encyclopedia. https://en.wikipedia.org/wiki/Quantum_key_distribution
RocketMeUpCybersecurity. (Nov. 13, 2023). “Quantum Key Distribution — An Overview of Secure Communication.” Medium. https://medium.com/@RocketMeUpCybersecurity/quantum-key-distribution-an-overview-of-secure-communication-ebbe720d0925
Toshiba Europe. (Accessed July 20, 2025). “Quantum Key Distribution - What Is QKD? How Does It Work?” Toshiba.eu. https://www.toshiba.eu/quantum/products/quantum-key-distribution/
Related Case Studies
QuantX Labs and Australian Government Strategic Quantum Computing Initiative
QuantX Labs partnered with the Australian Government to develop quantum computing solutions for national security, climate modeling, and healthcare optimization. This collaboration aims to position Australia as a global leader in quantum technology while addressing critical national challenges through advanced computational capabilities.
CQC and AXA explore applications in financial risk management
AXA and CQC explore quantum computing for financial modeling, risk assessment, and enhanced cybersecurity.
Honeywell Quantum Solutions and J.P. Morgan explore financial services
Applying quantum computing to financial challenges like optimization, risk analysis, and cryptography using trapped-ion technology.
ID Quantique and SK Telecom: Pioneering Quantum-Safe Communications Infrastructure in South Korea
ID Quantique and SK Telecom formed a strategic partnership to deploy quantum key distribution (QKD) technology across South Korea's telecommunications infrastructure, establishing one of the world's first commercial quantum-secured networks. This collaboration has enabled SK Telecom to offer quantum-safe communication services to government agencies, financial institutions, and enterprises, while positioning South Korea as a global leader in quantum communications technology.
Rigetti Computing and US Air Force Research Laboratory
Partnering to work on optimizing defence applications, machine learning, and cryptography.
Nu Quantum and CERN White Rabbit: Advancing Quantum Network Synchronization
Nu Quantum partnered with CERN's White Rabbit technology to develop ultra-precise timing synchronization for quantum communication networks. This collaboration combines Nu Quantum's quantum networking expertise with White Rabbit's sub-nanosecond timing precision to enable reliable quantum information transfer across distributed quantum computing systems.
IBM and Daimler (Mercedes-Benz) explore battery design
Daimler and IBM Quantum simulate chemistry for next-generation lithium-sulfur batteries, exploring quantum computing for materials discovery in the automotive industry.
IonQ and US Air Force Research Laboratory
Focusing on developing quantum algorithms for optimization problems, secure communications, and advanced modeling capabilities critical to military operations.
Qrypt and Mattermost build encryption for communications
Integrating quantum-safe encryption technology to protect internal communications in Mattermost's open-source collaboration platform.
SandboxAQ and Deloitte on Cybersecurity
Partnering to explore quantum-ready cybersecurity and AI solutions for the enterprise.
ZZZ Insufficient Information Available
After comprehensive research, no verifiable partnership between FS-ISAC and an entity called 'TBD' regarding quantum computing could be identified. This case study cannot be completed due to lack of documented evidence.
SandboxAQ and Deloitte Strategic Alliance for Enterprise Quantum and AI Solutions
SandboxAQ and Deloitte formed a strategic alliance to accelerate enterprise adoption of quantum technologies and AI solutions across multiple industries. The partnership combines SandboxAQ's advanced quantum simulation and AI platforms with Deloitte's global consulting expertise to deliver transformative solutions for complex business challenges.