Navigating the Quantum Leap: Preparing for a Post-Quantum World

  • Cybersecurity
  • Enterprise
  • Mobile communications
Data signaled from a sim

© 123RF

  • Written by Yecaneh Aguado
  • Type Insight
  • Published
  • Last updated

Explore the quantum threat to mobile security and how Thales is preparing for a post-quantum world.

In time, quantum computers will be able to crack the encryption methods that safeguard the entire mobile ecosystem, exposing them to hackers and cyberattacks. 

The Quantum Threat

The explosion of connected devices has heralded a new era of efficiency and convenience, but traditional cryptographic algorithms may prove to be insufficient against this new computing power. 

In our mobile connectivity ecosystem, there are vulnerabilities at every data exchange point. From eSIMs and eSIM management platforms to 5G core networks, SIM manufacturers, and all IT-based communications like VPNs, the spectrum of potential attack vectors is vast and diverse. And the ripple effects of quantum computing extend beyond algorithms alone – communication protocols, certificates, and key management protocols will all need to adapt to this new landscape. 

It is also worth noting that, within 5G networks, cryptography plays a much more important role than in previous cellular generations. Unless these networks have adequate quantum-safe protections, they will be exposed and vulnerable to attack. 

© 123RF

Preparing for a Post-Quantum World

Quantum is coming, and we need to act now to protect our communications security and privacy. That’s why, at Thales, we’ve been leading the way in developing quantum-resistant cryptographic solutions for the telecoms sector. 

Our latest innovation, post-quantum cryptography (PQC) SIM cards, have been successfully tested on SK Telecom’s 5G standalone commercial network. This is a breakthrough innovation because it enables the encryption and decryption of subscriber identities in a secure way to protect user privacy from future quantum threats. This is important not only for the future, but also for the present, as it prevents possible “record now, decrypt later” attacks. 

The Importance of Resilient Solutions

This is one reason why it’s critical to start investigating resilient solutions now, and why we’ve recently been testing end-to-end encrypted phone calls for resilience in the post-quantum era. The successful pilot project was performed with the Thales ‘Cryptosmart’ secure mobile app and 5G SIM cards installed in smartphones, testing a mobile-to-mobile call, voice/data encryption, and device content protection. 

This pilot adopted a ‘hybrid cryptography’ approach – meaning it combines the convenience of a public-key cryptosystem with the efficiency of a symmetric-key cryptosystem. This approach is recommended during the transitional period towards a post-quantum world. 

Protecting Infrastructure with HSMs

We are also helping MNOs protect their infrastructure with our HSMs (hardware security modules) safeguarding subscriber privacy and identities by providing end-to-end security of 5G subscriber identifiers and subscriber authentication with certified quantum-safe algorithms.

Latest News

  • Cybersecurity

Securing IoT in everyday life: How to build trust into connected ecosystems

Insight
  • Cybersecurity

Protecting our freedoms: securing data, identity and critical systems—without compromise

Insight
Group of people using mobile phones
  • Cybersecurity

Learning From the Outliers: How to Increase Trust Levels in 2025 

Insight
AI
  • Cybersecurity

Securing the Future: The Role of Trust & Edge Computing in AI

Insight
embedded SIM
  • eSIM, iSIM

6 Key Points to Understand What an eSIM Is

Insight
  • Cybersecurity

Getting your organisation post-quantum ready

Insight
  • Cybersecurity

What is post-quantum cryptography and why is it important?

Insight