NIST Unveils Quantum Computing-proof Standards; When Will the Threat Arrive?
The development of quantum computing represents a fundamental threat to current security, owing to the significant increase in computing power that quantum computers will provide. At present, protection against quantum computing attacks is limited, leaving sensitive data vulnerable to quantum attacks in the future. However, adoption of post-quantum cryptography is expected to accelerate over the next few years, especially in mission critical infrastructure such as healthcare services and telecommunications networks.
Unlike traditional computers, quantum computers are based on quantum bits to store and process data. Quantum bits can function like a traditional bit in a state of 0 or 1, however they can also be in as superposition of both, providing a weighted combination of 1 and 0 at the same time. This will allow quantum computers to provide significantly greater computing power, as quantum bits can scale exponentially when combined, with N quantum bits able to represent 2N states. For example, two quantum bits can store four bits of information, three quantum bits can store eight bits, and four can store 12.
This significant increase in computing capacity will render asymmetric cryptographic algorithms obsolete. These algorithms are crucial for data encryption and digital signatures, but will become more readily breakable. They rely on a one-way function that is easy to compute, but time-consuming for traditional computing to break.
However, quantum computers are expected to be able to break these forms of encryption within the next 10 years. This is significant as asymmetric cryptographic algorithms are the basis of authentication and confidentiality protections, which are used extensively in cybersecurity. For example, asymmetric cryptographic algorithms are used by the Internet for TLS (Transport Layer Security) and SSH (Secure Shell). As a result, the transition to post-quantum cryptography will be critical to ensuring future global cybersecurity.
Inside NIST's New Standards
Earlier this month, NIST (National Institute of Standards and Technology) released FIPS (Federal Information Processing Standards) publications for three post-quantum cryptography standards. Post-quantum cryptography involves cryptographic algorithms which are designed to be secure against both classical and quantum computers.
The following standards were finalised:
- FIPS 203: Also known as ML-KEM or CRYSTALS-Kyber, this algorithm ensures that sensitive information can be securely exchanged despite the presence of quantum-capable adversaries. It is suitable for a large number of applications, ranging from secure communications to cloud storage, due to its efficiency in encryption and decryption.
- FIPS 204: Also known as ML-DSA or CRYSTALS-Dilithium, this provides a robust mechanism for verifying identities and ensuring the integrity of messages and documents, focusing on digital signatures. It is ideal for software updates, code signing, and scenarios where the authentication of information is key, such as user authentication.
- FIPS 205: Also known as SLH-DSA or SPHINCS+, this alternative to FIPS 204 focuses on digital signatures, emphasising resilience against attacks which leverage traditional and quantum computing. It is slightly less efficient than FIPS 204 as it generally has larger signature sizes; however, its stateless nature provides an additional layer of security, particularly for applications requiring long-term security, such as long-term data storage.
In addition to FIPS 203, 204, and 205, a draft of FIPS 206 is expected to be released in late 2024, based on FALCON (Fast Fourier Lattice-based Compact Signatures over NTRU). NIST is also continuing to evaluate two sets of algorithms in the future.
The introduction of NIST’s standards will be critical to the adoption of post-quantum cryptography in the US. Use of NIST standards is mandatory for federal agencies, and a significant number of private enterprises will adopt the standards due to NIST’s reputation for secure and comprehensive security standards. Furthermore, NIST’s standards can be used as a foundation to further the development of alternative post-quantum cryptography, meaning the standards will more broadly accelerate the adoption of post-quantum cryptography.
However, Juniper Research notes that other standards will also be key, with a number of other organisations currently working on post-quantum cryptography. These include CACR (Chinese Association for Cryptologic Research), and ETSI (European Telecommunications Standards Institute).
When Will Quantum Computing Launch Commercially?
Our upcoming quantum computing research suggests that we shouldn't expect the arrival of commercial quantum computers before 2035. However, this does not mean that enterprises can wait for the adoption of quantum cryptography. The US government will begin to prefer post-quantum cryptography in sensitive systems in 2025, and is more generally encouraging its rapid adoption.
A significant concern is that malicious actors will be able to collect and store current sensitive data, and then break it in the future using quantum computers. As a result, whilst the development of quantum computing attacks remains far away, the threat exists currently. However, Juniper Research notes that these attacks would likely be targeted at high-value data with a long-life span, such as data from critical infrastructure.
Moreover, alongside releasing the three FIPS standards, NIST stated that full integration of the standards will take time, and integration of standards into systems must begin immediately. This means that if enterprises are slow to move, increasing amounts of their data will be vulnerable to quantum attacks in the future.
Therefore, enterprises around the world must begin or continue to develop strategies for the transition to post-quantum cryptography. In these strategies, enterprises must identify where they are most vulnerable to quantum attacks, prioritising transitioning to post-quantum cryptography in these areas. The timeline of these transitions should then be used to ensure that the development of vendors’ offerings aligns with those of the enterprise. This will prevent plans for the adoption of post-quantum cryptography being delayed.
Alex is a Research Analyst within Juniper Research’s Telecoms & Connectivity team, focusing on the latest developments in operator and telecommunications markets. His recent reports include Operator O-RAN Strategies, Telecommunications Cloud Strategies, and Cellular IoT.
Latest research, whitepapers & press releases
-
ReportOctober 2025Telecoms & Connectivity
Travel SIMs & eSIMs Market: 2025-2030
Our comprehensive Travel eSIMs research suite comprises detailed assessment of a market undergoing rapid growth. It provides insight into how travel eSIM providers can differentiate their services to maximise success in the market over the next two years.
VIEW -
ReportOctober 2025IoT & Emerging Technology
Direct to Satellite Market: 2025-2030
Juniper Research’s Direct to Satellite research suite provides satellite providers, investors, and partners, such as Mobile Network Operators, with an extensive analysis and insights into the direct to satellite market.
VIEW -
ReportSeptember 2025Fintech & Payments
Instant Payments Market: 2025-2030
Juniper Research’s Instant Payments research suite provides a wide-ranging and strategic analysis of this market; enabling stakeholders - from banks, infrastructure providers, regulators, and businesses - to understand future growth, key trends, and the competitive environment.
VIEW -
ReportSeptember 2025Fintech & Payments
Anti-money Laundering Systems Market: 2025-2030
Our AML Systems research suite provides a detailed and insightful analysis of this evolving market; enabling stakeholders from financial institutions, law enforcement agencies, regulatory bodies and technology vendors to understand future growth, key trends, and the competitive environment.
VIEW -
ReportSeptember 2025Fintech & Payments
A2A Payments Market: 2025-2030
Our A2A Payments research suite provides detailed analysis of this rapidly changing market; enabling A2A payments service providers to gain an understanding of key payment trends and challenges, potential growth opportunities, and the competitive environment.
VIEW -
ReportSeptember 2025Telecoms & Connectivity
Mobile Messaging Fraud Prevention Market: 2025-2030
Our Mobile Messaging Fraud Prevention research suite provides a detailed and insightful analysis of a market set for significant disruption over the next five years. It enables stakeholders from mobile operators, enterprises, and mobile messaging fraud prevention vendors to understand how the market for mobile messaging fraud will evolve, as well as the impact of AI, RCS, and the evolving competitive environment.
VIEW
-
WhitepaperOctober 2025IoT & Emerging Technology
Beam Me Up: The Direct to Satellite Revolution
Our complimentary whitepaper, Beam Me Up: The Direct to Satellite Revolution, evaluates the future key services that satellite providers must offer in the direct to satellite market.
VIEW -
WhitepaperSeptember 2025Fintech & Payments
Core Banking Transformation - A Strategic Conversation with SAP Fioneer
Core banking transformation is no longer optional, as regulatory change, rising compliance costs, and shifting customer expectations make legacy systems unsustainable. Anna Koritz, Global Head of Transaction Banking at SAP Fioneer, shares how banks can overcome cultural and technical hurdles and why SAP Fioneer’s modular, cloud-ready approach enables confident modernisation.
VIEW -
WhitepaperSeptember 2025Fintech & Payments
From Detection to Prevention: The Next Era of Anti-money Laundering
Our complimentary whitepaper, From Detection to Prevention: The Next Era of Anti-money Laundering, examines the state of the AML systems market; considering the impact that a changing regulatory environment and a growing number of use cases is having on the market. Additionally, it includes a forecast summary of the total value of the AML systems market in 2030.
VIEW -
WhitepaperSeptember 2025Fintech & Payments
3 Key Trends Driving Instant Payments
Our complimentary whitepaper, 3 Key Trends Driving Instant Payments, assesses how key trends are driving the evolution of the instant payments market, and which challenges these resolve. Additionally, it includes a forecast summary of the global transaction values via instant payment schemes by 2029.
VIEW -
WhitepaperSeptember 2025Fintech & Payments
Ascending-to-Ailing: The Deceleration of A2A Adoption
Our complimentary whitepaper, Ascending-to-Ailing: The Deceleration of A2A Adoption, examines the state of the A2A payments market; considering the impact of this payment method and how it is shaping the modern payments landscape through lower fees and enriched user experience.
VIEW -
WhitepaperSeptember 2025Telecoms & Connectivity
RCS Fraud: Emerging Threats in Next-gen Messaging
Our complimentary whitepaper, RCS Fraud: Emerging Threats in Next-gen Messaging, examines the future of the messaging fraud prevention market, with a particular focus on the latest trends within RCS Business Messaging (RBM). Additionally, it includes a forecast summary of the total cost of fraud over RBM to subscribers in 2030.
VIEW
-
IoT & Emerging Technology
Satellite Broadband Market to Break $20 Billion by 2030, as Satellite Constellations Disrupt Established Services
October 2025 -
Fintech & Payments
Subscription Economy to Reach $1.2 Trillion by 2030 Globally, Despite Increasing Subscription Fatigue
October 2025 -
Fintech & Payments
AML Systems Market to Surpass $75 Billion by 2030 Globally, With LexisNexis Risk Solutions, Oracle, and Experian Leading the Defence
September 2025 -
Fintech & Payments
Instant Payments to Exceed $110 Trillion by 2029 Globally, Accelerated by European Regulation & FedNow Impact
September 2025 -
Fintech & Payments
B2B Payments to Hit $224 Trillion by 2030 Globally, Driven by Emerging Market Expansion
September 2025 -
Fintech & Payments
A2A Transaction Value to Reach $195 Trillion in 2030 Globally, Driven by Advanced Value-added Services
September 2025