Blog


Exploring the future of security — From Hardware Root of Trust to End-to-End Quantum-Safe Protection.


[Quantum Security]The Post-Quantum World — What Quantum Computing Will Actually Break

BH Kang
7 Jan 2026

The Post-Shor World — What Quantum Computing Will Actually Break

▲ img source: Gettyimagesbank.com

 

Quantum computers are not “faster classical computers.”

They are a new physical computing system that performs fundamentally different types of computation.

Once quantum computing is introduced at scale,

existing security, authentication, and communication systems will be shaken from their foundations.


👉 Previous Post: The Beginning of the Quantum Threat — Why RSA and ECC Are No Longer Secure


In this part, we move beyond the abstract statement that “RSA and ECC will be broken,”

and instead examine — in concrete terms — how quantum computing can destabilize and collapse

real-world industrial and national infrastructure.


1. Financial infrastructure fails first

Most modern financial systems are built on RSA-based cryptographic structures, including:

  • Internet banking

  • ATM ↔ Core banking encryption

  • Card payment networks

  • SWIFT messaging

  • Digital-signature-based transfer approvals

In the post-quantum era, these cryptographic assumptions become decryptable.

This is not merely a matter of stolen accounts — it represents:

a collapse of system-wide integrity across the financial infrastructure.

Once message integrity and identity validation fail, the financial system can no longer guarantee trusted execution.


2. Telecommunications (Telco) infrastructure is structurally vulnerable

The following systems all rely on RSA / ECC-based authentication and signature schemes:

  • USIM / eSIM authentication (MILENAGE / EAP-AKA)

  • HSS / AAA authentication servers

  • LTE / 5G Core signaling

  • RAN device authentication

If quantum attacks succeed, the following become feasible:

  • IMSI extraction

  • Rogue / spoofed base stations

  • Fake Core Networks

  • Telco equipment turning into APT entry points

In other words:

the telecom network itself can transform into an offensive attack platform.

This risk propagates laterally across operators, roaming environments, and cross-domain trust boundaries.


3. Automotive, industrial, and manufacturing systems become exposed

Modern automotive and manufacturing ecosystems consist of dozens —

often hundreds — of networked components:

  • ECUs

  • sensors

  • controllers

  • industrial robots

The authentication of these devices is predominantly RSA / ECC-based.

In a post-quantum environment, the following attacks become realistic:

  • OTA firmware update tampering

  • forged vehicle control messages

  • impersonated factory robots

  • remote penetration of industrial equipment

The result is that

the entire industrial control network becomes an expanded attack surface.

Trust anchors inside operational technology (OT) systems cease to function as reliable roots of identity.


4. Defense and space systems are primary quantum-era targets

The following domains retain strategic value for 20–50+ years,

making them high-priority targets for HNDL (Harvest Now, Decrypt Later):

  • satellite communications

  • tactical communications (TACCOM)

  • weapon-system command links

  • cryptographic devices (KMIP-based key exchange)

  • GPS spoofing scenarios

Meaning:

adversaries collect encrypted intelligence today because it will still be valuable long after decryption becomes possible.


The long-term persistence of classified data makes national defense systems one of the most exposed sectors in the quantum transition timeline.


5. Blockchain and digital assets fail the fastest

Cryptocurrency ecosystems rely heavily on ECC-based signatures (particularly secp256k1),

which become attractive quantum targets.

Feasible attack scenarios include:

  • private key exposure

  • wallet takeover

  • large-scale transaction forgery

  • chain-fork manipulation (easier than a 51% attack in some cases)

As such,

blockchains are expected to be among the earliest large-scale distributed systems to fail in the quantum era.


In practice, however, the more immediate risk is likely to emerge in:

  • exchange cryptographic infrastructure

  • authentication & key-management systems

Historically, most real-world incidents have targeted

exchange vulnerabilities rather than the blockchain protocol itself.

Quantum risk amplifies this asymmetry.


6. Combined with supply-chain compromise, the impact scales exponentially

Quantum-enabled cryptographic failure becomes a gateway enabler
for large-scale supply-chain attacks:

  • forged firmware signatures

  • bypassed device authentication

  • compromised update servers

  • OEM-level manipulation and tampering

Thus,

quantum threat vectors converge with other QAAS attack pillars, completing a multi-vector, system-level attack model.

The problem is not merely a cryptography failure — it is the collapse of trust across interconnected ecosystems.


In the next part, we will examine:

  • How quantum threats create systemic risk across entire industries

  • Why current trust architectures cannot survive a post-quantum transition

  • nd what this implies for authentication, key management, and infrastructure trust models.


CMO(Chief Marketing Officer), ICTK

CTO(Chief Technical Officer), ICTK

Director, Cisco Systems Korea 

Developer, SK Teletech



Read more






Copyright ⓒ 2025 ICTK.com. All Rights Reserved.

16, Gangnam-daero 84-gil, Gangnam-gu, Seoul, Republic of Korea (06241)

+82.2.569.0010