{"id":62211,"date":"2025-09-13T19:28:22","date_gmt":"2025-09-13T19:28:22","guid":{"rendered":"https:\/\/www.europesays.com\/ie\/62211\/"},"modified":"2025-09-13T19:28:22","modified_gmt":"2025-09-13T19:28:22","slug":"ais-biggest-security-risk-may-be-quantum-decryption","status":"publish","type":"post","link":"https:\/\/www.europesays.com\/ie\/62211\/","title":{"rendered":"AI&#8217;s Biggest Security Risk May Be Quantum Decryption"},"content":{"rendered":"<p><img decoding=\"async\" class=\" top-image\" src=\"https:\/\/www.europesays.com\/ie\/wp-content\/uploads\/2025\/09\/1757791702_938_960x0.jpg\" alt=\"Quantum threats are accelerating fast. Experts note that if AI infrastructure isn\u2019t secured soon, the consequences could be irreversible.\" data-height=\"972\" data-width=\"1728\" fetchpriority=\"high\" style=\"position:absolute;top:0\"\/><\/p>\n<p>Quantum threats are accelerating fast. Experts note that if AI infrastructure isn\u2019t secured soon, the consequences could be irreversible.<\/p>\n<p>getty<\/p>\n<p>AI now powers hospitals, courtrooms, banks and national security systems \u2014 the crown jewel of modern enterprise. But as quantum computing accelerates, experts warn these systems may be more vulnerable than anyone realizes.<\/p>\n<p>Somewhere between the optimism of generative AI and the acceleration of quantum computing is a growing risk that few organizations are addressing today. While many worry about adversarial prompts and model hallucinations, experts say those are the least of our problems.<\/p>\n<p>David Harding, CEO of <a href=\"https:\/\/entrokeylabs.com\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" data-ga-track=\"ExternalLink:https:\/\/entrokeylabs.com\/\" aria-label=\"Entrokey Labs\">Entrokey Labs<\/a> \u2014 a cybersecurity firm building quantum-resistant key infrastructure \u2014 warned that the real risk lies in how AI systems handle sensitive data. He argued that AI systems, and the massive volumes of sensitive data they ingest, may soon be the first victims of quantum-enabled cyberattacks. And most companies are walking into that future blind.<\/p>\n<p>The Quantum Threat to AI Security Is No Longer Theoretical<\/p>\n<p>Earlier this year, Nvidia CEO Jensen Huang <a href=\"https:\/\/www.barchart.com\/story\/news\/32835931\/quantum-computing-is-reaching-an-inflection-point-says-nvidias-jensen-huang-should-you-buy-qubt-stock-here\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" data-ga-track=\"ExternalLink:https:\/\/www.barchart.com\/story\/news\/32835931\/quantum-computing-is-reaching-an-inflection-point-says-nvidias-jensen-huang-should-you-buy-qubt-stock-here\" aria-label=\"described quantum computing\">described quantum computing<\/a> as reaching \u201can inflection point.\u201d While that statement sparked interest among investors, its implications for cybersecurity \u2014 particularly for AI-driven systems \u2014 haven\u2019t fully sunk in. As researchers push closer to building scalable quantum machines, long-standing encryption protocols such as RSA and ECC could be broken, making previously secure data fair game.<\/p>\n<p>In other words, the data feeding your AI today may be tomorrow\u2019s biggest liability. This isn\u2019t some distant sci-fi scenario. The groundwork has already begun. Nation-state actors are believed to be stockpiling encrypted data using what\u2019s known as a \u201charvest now, decrypt later\u201d strategy. Think of it like thieves stealing locked safes today knowing they\u2019ll get the keys tomorrow.<\/p>\n<p>Once <a href=\"https:\/\/www.forbes.com\/sites\/gilpress\/2025\/02\/25\/after-google-microsoft-breakthroughs-quantum-machines-raises-170m\/\" data-ga-track=\"InternalLink:https:\/\/www.forbes.com\/sites\/gilpress\/2025\/02\/25\/after-google-microsoft-breakthroughs-quantum-machines-raises-170m\/\" target=\"_self\" aria-label=\"quantum machines\" rel=\"nofollow noopener\">quantum machines<\/a> become powerful enough, they could retroactively decrypt troves of corporate secrets, defense communications and medical data, including everything passed through AI models today.<\/p>\n<p>\u201cAny electronic data is at risk from harvest now, decrypt later if it is not using digital keys resistant to today\u2019s AI attacks and near-term quantum attacks,\u201d said Harding. \u201cSeveral countries including Russia, China, Iran and North Korea have well over 100,000 individuals solely focused on hacking our systems. Add automation into the mix, and the scale becomes nearly unmanageable.\u201d<\/p>\n<p>Quantum threatens all digital systems, but AI amplifies the risk. These models don\u2019t just generate content \u2014 they ingest patient records, financial models, intellectual property and legal data. In autonomous systems, they make decisions. In others, they write code and trigger workflows. That puts entire AI pipelines \u2014 from training data to deployed agents \u2014 directly in the crosshairs.<\/p>\n<p>\u201cQuantum and <a href=\"https:\/\/www.forbes.com\/councils\/forbestechcouncil\/2025\/07\/23\/how-hackers-use-ai-today-and-how-to-stay-safe\/\" data-ga-track=\"InternalLink:https:\/\/www.forbes.com\/councils\/forbestechcouncil\/2025\/07\/23\/how-hackers-use-ai-today-and-how-to-stay-safe\/\" target=\"_self\" aria-label=\"AI-safe encryption\" rel=\"nofollow noopener\">AI-safe encryption<\/a> has the same level of importance as the foundation of a building,\u201d explained Scott Streit, Entrokey Labs\u2019 chief scientist. \u201cWithout it, the structure collapses. There\u2019d be no protection for customer data, IP or communications. In national security, satellites or precision weapons could be taken over.\u201d<\/p>\n<p>Regulations Lag Behind The Quantum-AI Collision<\/p>\n<p>Despite these risks, many enterprises still treat quantum computing as a future problem \u2014 something to solve by 2030. The U.S. National Institute of Standards and Technology (NIST) has laid out a path for <a href=\"https:\/\/www.nist.gov\/news-events\/news\/2022\/07\/nist-announces-first-four-quantum-resistant-cryptographic-algorithms\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" data-ga-track=\"ExternalLink:https:\/\/www.nist.gov\/news-events\/news\/2022\/07\/nist-announces-first-four-quantum-resistant-cryptographic-algorithms\" aria-label=\"adopting quantum-safe cryptography\">adopting quantum-safe cryptography<\/a> by 2035. But according to Harding, that timeline no longer reflects how fast both AI and quantum capabilities are evolving.<\/p>\n<p>\u201cThe timeline is increasingly out of step with the pace of AI and quantum advancements,\u201d said Harding. \u201cSome believe AI is already breaking into encryption systems.\u201d<\/p>\n<p>And yet, most organizations continue to treat quantum-readiness as a long-haul IT project, involving years of consultations, infrastructure upgrades and vendor reviews. Harding refers to this pattern as \u201ccyber inertia\u201d \u2014 an outdated playbook for a much faster threat.<\/p>\n<p>\u201cWe\u2019re trying to solve a smarter threat with outdated answers,\u201d Harding said. Streit added that \u201cAI can already create math that top mathematicians can\u2019t explain,\u201d arguing that \u201cthe only way to win is by using AI to secure AI.\u201d<\/p>\n<p>To make matters worse, regulatory frameworks haven\u2019t caught up. Neither the <a href=\"https:\/\/artificialintelligenceact.eu\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" data-ga-track=\"ExternalLink:https:\/\/artificialintelligenceact.eu\/\" aria-label=\"EU AI Act\">EU AI Act<\/a> nor <a href=\"https:\/\/www.nist.gov\/itl\/ai-risk-management-framework\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" data-ga-track=\"ExternalLink:https:\/\/www.nist.gov\/itl\/ai-risk-management-framework\" aria-label=\"NIST\u2019s AI Risk Management Framework\">NIST\u2019s AI Risk Management Framework<\/a> say much about defending AI systems against quantum cryptographic threats, leaving a critical vulnerability unaddressed at the policy level.<\/p>\n<p>Quantum Security Is a Boardroom Problem Now<\/p>\n<p>The financial fallout from a breach caused by quantum decryption is hard to estimate. But the principle is simple: What\u2019s considered secure today may not be tomorrow. That includes confidential model outputs, internal prompts, logged agentic decisions and sensitive metadata. Any of it could be exposed or tampered with.<\/p>\n<p>\u201cThink about how we respond to weather warnings,\u201d Harding said. \u201cIf there\u2019s even a 10% chance of a tornado, you don\u2019t wait. You get to shelter.\u201d<\/p>\n<p>He added that this level of risk isn\u2019t something CISOs can handle alone. \u201cQuantum is a boardroom issue now \u2014 not just an engineering one. The scale of impact makes Y2K look like a warm-up act.\u201d<\/p>\n<p>Without Trust, AI Fails<\/p>\n<p>While companies double down on AI performance, many remain dangerously naive about the risks embedded at its roots. As Harding put it, \u201cThe question is no longer whether quantum will impact AI systems, but how quickly organizations can adapt before it does.\u201d<\/p>\n<p>AI security depends not just on encryption, but on anticipating how fragile the entire ecosystem becomes when that encryption fails. If attackers can retroactively decrypt, reroute, or manipulate those systems, the blow to public confidence could rival or exceed any previous cyber event.<\/p>\n<p>Trust is what gives AI its power. Lose that, and even the smartest models would collapse.<\/p>\n<p>\u201cWe\u2019ve built an entire era of decision-making on architectures that might be more fragile than we thought,\u201d Harding said. \u201cWhile companies chase optimization, adversaries are chasing the keys.\u201d<\/p>\n","protected":false},"excerpt":{"rendered":"Quantum threats are accelerating fast. Experts note that if AI infrastructure isn\u2019t secured soon, the consequences could be&hellip;\n","protected":false},"author":2,"featured_media":62212,"comment_status":"","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[262],"tags":[44055,21387,314,22654,982,18,1349,19,17,751,44056,44058,44057,82],"class_list":{"0":"post-62211","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-computing","8":"tag-ai-encryption","9":"tag-ai-models","10":"tag-computing","11":"tag-cryptography","12":"tag-cybersecurity","13":"tag-eire","14":"tag-enterprise-ai","15":"tag-ie","16":"tag-ireland","17":"tag-quantum-computing","18":"tag-quantum-hacking","19":"tag-quantum-threats","20":"tag-secure-ai","21":"tag-technology"},"share_on_mastodon":{"url":"","error":""},"_links":{"self":[{"href":"https:\/\/www.europesays.com\/ie\/wp-json\/wp\/v2\/posts\/62211","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.europesays.com\/ie\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.europesays.com\/ie\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.europesays.com\/ie\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.europesays.com\/ie\/wp-json\/wp\/v2\/comments?post=62211"}],"version-history":[{"count":0,"href":"https:\/\/www.europesays.com\/ie\/wp-json\/wp\/v2\/posts\/62211\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.europesays.com\/ie\/wp-json\/wp\/v2\/media\/62212"}],"wp:attachment":[{"href":"https:\/\/www.europesays.com\/ie\/wp-json\/wp\/v2\/media?parent=62211"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.europesays.com\/ie\/wp-json\/wp\/v2\/categories?post=62211"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.europesays.com\/ie\/wp-json\/wp\/v2\/tags?post=62211"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}