The Countdown of Digital Security: How Quantum Computing Challenges IoT and the Cloud

Quantum computing promises an unprecedented revolution, but it also opens the door to an era of unparalleled risks in terms of cybersecurity. Avishay Shraga, CTO and head of Security Technologies at Sony Semiconductor Israel, has recently issued a warning about the urgent need to design quantum-resistant standards for low-power devices in the Internet of Things (IoT). This call to action is resonating increasingly louder among experts.

“Current encryption is sufficient today, but it will be obsolete tomorrow. And we’re not talking about a distant tomorrow,” Shraga has warned.

At present, algorithms like ECC-256 are considered secure against attacks from classical computers: breaking their keys would take millions of years. However, with the arrival of operational quantum computers—expected by NIST and the European Union in the 2030s—this security horizon shrinks to days or even hours. Consequently, IoT devices being deployed today will be at risk tomorrow if they are not prepared for this new scenario.

Crypto-Agility and Costs: The Developer’s Dilemma

Shraga emphasized that integrating post-quantum cryptographic systems into low-power devices (such as water meters or agricultural sensors) today is not economically viable; doubling the chip size or reducing its lifespan would be a commercial mistake. His proposal is clear: invest in “crypto-agility,” meaning designing devices that can be updated at the security level when the quantum threat becomes real.

The Cloud Challenge: Is What We’re Doing Enough?

From the cloud infrastructure space, David Carrero, co-founder of Stackscale (Grupo Aire), adds a complementary reflection:

“The post-quantum future is not just an IoT issue; it’s also a cloud issue. Current cloud architectures must anticipate, integrating support for quantum cryptography, especially in critical environments like European data centers that handle sensitive information from companies and governments.”

Carrero warns of the risk that, in a post-quantum scenario, data stored today—even if encrypted with current algorithms—could be intercepted and decrypted in the future using “harvest now, decrypt later” techniques. That’s why he stresses the need to review both encryption in transit and encryption at rest.

“The cloud must lead the way in adapting to the quantum era. Investments in technology must be accompanied by a flexible security strategy capable of evolving,” he adds.

How Do We Build a Secure Future?

Although the threat has not yet fully materialized, there are already tangible advancements. NIST has recently approved post-quantum algorithms like Kyber for general encryption and Dilithium for digital signatures. However, widespread implementation is far from complete, and adoption in low-power devices remains a technical challenge.

According to Shraga, there is no one-size-fits-all solution. In some cases, such as connected cars or industrial equipment with a constant power supply, quantum cryptography can be applied immediately. But in others, like remote sensors, the solution lies in preparing systems to be updated with new keys and algorithms when the time comes.

Europe and Regulation on the Horizon

Both Carrero and Shraga agree that Europe needs to take a more proactive role. Carrero highlights the need to establish common regulations for cloud and IoT environments within the framework of quantum computing:

“Just as the EU leads in privacy with the GDPR, it can also pave the way for post-quantum security. It’s a natural step to ensure digital sovereignty.”

Conclusion

The transition to a post-quantum world will not be immediate, but the clock is already ticking. Both chip manufacturers and cloud service providers, as well as companies, must prepare today for a future that is closer than it seems.

In Shraga’s words: “We must not underestimate what is brewing in quantum labs. The security of tomorrow depends on the decisions we make today.”

And as Carrero reminds us: “The cloud and IoT must walk together toward a resilient, crypto-agile ecosystem, aware of the disruptive—and also destructive—power of quantum computing.”

Image by AI free images.

Scroll to Top