{"id":86400,"date":"2025-08-08T15:45:28","date_gmt":"2025-08-08T19:45:28","guid":{"rendered":"https:\/\/chargebacks911.com\/?p=86400"},"modified":"2025-08-21T11:14:58","modified_gmt":"2025-08-21T15:14:58","slug":"quantum-computing-encryption","status":"publish","type":"post","link":"https:\/\/chargebacks911.com\/quantum-computing-encryption\/","title":{"rendered":"Quantum Computing Encryption"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\">Quantum Computing Encryption: Are Businesses Safe Against More Advanced Technological Threats?<\/h2>\n\n\n\n<div class=\"c-category-alert c-category-alert--teal\">\n    <span class=\"c-category-alert--teal__icon\">\n        <object data=\"https:\/\/chargebacks911.com\/wp-content\/uploads\/2025\/01\/callout-icon-brain-blue-06.svg\" width=\"20\" height=\"20\"><\/object>\n    <\/span>\n    <span class=\"c-category-alert--teal__heading\">Expert Insight<\/span>\n    <p class=\"c-category-alert--teal__description\">This article has been published in collaboration with our good friends over at <a href=\"https:\/\/basistheory.com\/\" target=\"_blank\" rel=\"noopener\">Basis Theory<\/a>, a provider focused on helping merchants with PCI compliance and creating more flexibility in their payment workflows.<\/p>\n<\/div>\n\n\n\n<p class=\"wp-block-paragraph\">Quantum computing may sound like something out of a science fiction movie, but it\u2019s rapidly becoming one of the most significant threats to payment security. The power of quantum computing could exploit the same algorithms that have protected credit card numbers, tokens, and transaction data for decades.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">It\u2019s true that large-scale quantum computing is not commercially viable yet. But, adversaries are already prepared with \u201charvest now, decrypt later\u201d strategies to collect encrypted data that can be decrypted when quantum capabilities have progressed.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Merchants, processors, and security vendors would be wise to act proactively and prepare their payment infrastructure for a <a href=\"https:\/\/mitsloan.mit.edu\/ideas-made-to-matter\/quantum-computing-what-leaders-need-to-know-now\" target=\"_blank\" rel=\"noopener\">post-quantum future<\/a>, and evaluate their quantum computing encryption risk.<\/p>\n\n\n<div class=\"c-suggested-reading\"><div class=\"c-suggested-reading__inner\"><div class=\"c-suggested-reading__header\"><h3 class=\"c-suggested-reading__headline\">Recommended reading<\/h3><\/div><ul class=\"c-suggested-reading__items\"><li class=\"c-suggested-reading__item\"><a href=\"https:\/\/chargebacks911.com\/emv-bypass-cloning\/\" class=\"c-suggested-reading__link\">What is EMV Bypass Cloning? Are Chip Cards Still Secure?<\/a><\/li><li class=\"c-suggested-reading__item\"><a href=\"https:\/\/chargebacks911.com\/chip-and-pin-technology\/\" class=\"c-suggested-reading__link\">Chip-and-PIN: How it Works &amp; How it Helps Stop Fraud<\/a><\/li><li class=\"c-suggested-reading__item\"><a href=\"https:\/\/chargebacks911.com\/terminal-id-number\/\" class=\"c-suggested-reading__link\">Terminal ID Number (TID): What is it? What Does it Do?<\/a><\/li><li class=\"c-suggested-reading__item\"><a href=\"https:\/\/chargebacks911.com\/debit-networks\/\" class=\"c-suggested-reading__link\">What is a Debit Network? How Does it Help You Get Paid?\u00a0<\/a><\/li><li class=\"c-suggested-reading__item\"><a href=\"https:\/\/chargebacks911.com\/transaction-settlement\/\" class=\"c-suggested-reading__link\">How Transaction Settlement Works: Guide to Manage Cash Flow<\/a><\/li><li class=\"c-suggested-reading__item\"><a href=\"https:\/\/chargebacks911.com\/iso-country-codes\/\" class=\"c-suggested-reading__link\">ISO Country Codes: How They Work, Formats, Uses &amp; More<\/a><\/li><\/ul><\/div><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">What is Quantum Computing?<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">Let\u2019s start by clarifying what we\u2019re talking about here.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Classical computers are based on using <em>bits,<\/em> which can hold a value of 0 or 1. In contrast, quantum computers use <em>qubits<\/em>, a quantum superposition of the states 0 and 1, and whose value can be either 0 or 1. You won\u2019t know until the value is measured.&nbsp;&nbsp;<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">The advantage of quantum computing has to do with quantum algorithms that can exploit superposition, entanglement, and interference. This lets the computer find solutions more efficiently for certain problems when compared to classic processing. Nothing in classical computing is cycling through all possible values that can be represented as 0 or 1.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/chargebacks911.com\/wp-content\/uploads\/2025\/08\/Illustration-classic-bit-vs-quantum-bit-2.jpg\" data-rel=\"lightbox-image-0\" data-magnific_type=\"image\" data-rl_title=\"\" data-rl_caption=\"\" title=\"\"><img loading=\"lazy\" decoding=\"async\" width=\"1408\" height=\"1319\" src=\"https:\/\/chargebacks911.com\/wp-content\/uploads\/2025\/08\/Illustration-classic-bit-vs-quantum-bit-2.jpg\" alt=\"Illustration: Classical Computing vs Quantum Computing\" class=\"wp-image-86760\" srcset=\"https:\/\/chargebacks911.com\/wp-content\/uploads\/2025\/08\/Illustration-classic-bit-vs-quantum-bit-2.jpg 1408w, https:\/\/chargebacks911.com\/wp-content\/uploads\/2025\/08\/Illustration-classic-bit-vs-quantum-bit-2-300x281.jpg 300w, https:\/\/chargebacks911.com\/wp-content\/uploads\/2025\/08\/Illustration-classic-bit-vs-quantum-bit-2-1024x959.jpg 1024w, https:\/\/chargebacks911.com\/wp-content\/uploads\/2025\/08\/Illustration-classic-bit-vs-quantum-bit-2-768x719.jpg 768w\" sizes=\"auto, (max-width: 1408px) 100vw, 1408px\" \/><\/a><\/figure>\n\n\n\n<p class=\"wp-block-paragraph\">This technology is impressive. But, it becomes a problem when we look to encryption. <\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Why Quantum Computing Threatens Payment Encryption<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">Complex encryption keys are not immune to being broken by classical computers, but the time necessary to do so renders the risk relatively low. However, the rapid analysis capabilities of quantum computing could make it possible to hack encryption keys more quickly than they can be updated.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Encryption methods like RSA and ECC have kept cardholder data safe for decades. However, quantum computing introduces a new variable for information security teams to consider: being able to exploit those widely-used encryption standards. Quantum computers, using <a href=\"https:\/\/andisama.medium.com\/qubit-an-intuition-6-two-famous-quantum-algorithms-shors-and-grover-algorithms-95c0e0577f9b\" target=\"_blank\" rel=\"noopener\">algorithms like Shor\u2019s<\/a>, could solve the mathematical problems that have kept these standards secure in a very short period of time.<\/p>\n\n\n\n<div class=\"c-category-alert c-category-alert--grey\">\n    <span class=\"c-category-alert--grey__icon\">\n        <object data=\"https:\/\/chargebacks911.com\/wp-content\/uploads\/2022\/06\/reminder-hands-04.svg\" width=\"20\" height=\"20\" aria-label=\"Finger bullet\"><\/object>\n    <\/span>\n    <span class=\"c-category-alert--grey__heading\">Did You Know?<\/span>\n    <p class=\"c-category-alert--grey__description\">Shor\u2019s algorithm is a quantum computing method that can quickly find the prime factors of large numbers; a task that's extremely slow for traditional computers. It works by using quantum mechanics to find patterns in numbers that classical methods can\u2019t easily detect. This is important because many encryption systems rely on the difficulty of factoring large numbers. If powerful quantum computers become practical, Shor's algorithm could break these encryption methods, changing the way we secure digital information.<\/p>\n<\/div>\n\n\n\n<p class=\"wp-block-paragraph\">In short, the encryption used to protect credit cards, tokens, and PII could become obsolete in the face of quantum computing encryption cracking. This would put billions of transactions at risk.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Tokenization: Critical (But Not Complete) Defense<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">Aside from post-quantum cryptography, merchants should turn to <a class=\"wpil_keyword_link\" href=\"https:\/\/chargebacks911.com\/tokenization\/\" title=\"Tokenization\" data-wpil-keyword-link=\"linked\" data-wpil-monitor-id=\"1933\">tokenization<\/a> with an independent payment vault.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><a href=\"https:\/\/blog.basistheory.com\/what-is-tokenization\" target=\"_blank\" rel=\"noopener\">Tokenization<\/a> replaces sensitive payment data (like a PAN) with a non-sensitive token with no relationship to the original value. As a result, even if an adversary intercepts a token, there\u2019s nothing to decrypt. Tokens become meaningless without access to the vault that it came from, making it significantly harder for even quantum computers to decrypt or recover the original information.&nbsp;<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">That said, most tokenization systems still rely on encryption to Secure the original sensitive data, and to encrypt the communication between systems (during a retrieval or detokenization.)<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">In other words, if quantum computers can break the encryption that secures the <em>vault<\/em>, the encryption keys used to detokenize, or the network layer protecting the data in transit, then the security of the entire tokenization system could be compromised.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Tokenization can help merchants reduce the risk of quantum computers breaking payment encryption, but it\u2019s not a silver bullet against these threats.&nbsp;This is why a programmable payments vault like Basis Theory\u2019s employs many other security systems to prevent access even to the encrypted data.<\/p>\n\n\n\n<div class=\"c-shortcode-ebook c-shortcode-ebook--whitepaper\"><a href=\"https:\/\/chargebacks911.com\/chargeback-field-report\/\" class=\"c-shortcode-ebook__block\"><div class=\"c-shortcode-ebook__inner\"><div class=\"c-shortcode-ebook__graphics\"><div class=\"c-shortcode-ebook__graphics-inner\"><div class=\"c-shortcode-ebook__ipad\">\n\t\t\t\t<img decoding=\"async\" src=\"https:\/\/chargebacks911.com\/wp-content\/themes\/CB911\/assets\/img\/shortcodes\/ebooks\/ipad--field-report.png\" alt=\"2022\" chargeback=\"\" field=\"\" report=\"\"\/>\n\t\t\t<\/div>\n\t\t\t<div class=\"c-shortcode-ebook__cover\">\n\t\t\t\t<img decoding=\"async\" src=\"https:\/\/chargebacks911.com\/wp-content\/themes\/CB911\/assets\/img\/shortcodes\/ebooks\/cover--field-report.png\" alt=\"2022\" chargeback=\"\" field=\"\" report=\"\"\/>\n\t\t\t<\/div><\/div><\/div><div class=\"c-shortcode-ebook__content\"><span class=\"c-shortcode-ebook__title\"><span>A Real-World Look at<\/span> Chargeback Management<\/span><p class=\"c-shortcode-ebook__description\">Based on a survey of over 400 merchants, the report presents a comprehensive, cross-vertical look at the current state of chargebacks and chargeback management.<\/p><span class=\"c-btn c-btn--primary c-shortcode-ebook__btn\">Access the FREE Report<\/span><\/div><\/div><div class=\"c-shortcode-ebook__close\" data-shortcode-ebook-close=\"true\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 20 20\" fill=\"currentColor\"><path fill-rule=\"evenodd\" d=\"M4.293 4.293a1 1 0 011.414 0L10 8.586l4.293-4.293a1 1 0 111.414 1.414L11.414 10l4.293 4.293a1 1 0 01-1.414 1.414L10 11.414l-4.293 4.293a1 1 0 01-1.414-1.414L8.586 10 4.293 5.707a1 1 0 010-1.414z\" clip-rule=\"evenodd\"><\/path><\/svg><\/div><\/a><div class=\"c-shortcode-ebook__overlay\"><\/div><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">How Vault Providers Help Protect Payment Data<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\"><a href=\"https:\/\/blog.basistheory.com\/token-vault\" target=\"_blank\" rel=\"noopener\">Token vaults<\/a> still use encryption to secure the original data, both in transit and at rest, <a href=\"https:\/\/chargebacks911.com\/pci-dss-compliance\/\">as required by PCI-DSS standards<\/a>.&nbsp;<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">For customer data encrypted in transit, connections to all APIs and endpoints are made using TLS 1.3 or greater. When customer data is encrypted at rest, all token data is encrypted using a hierarchical key model rooted in a hardware security module.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">It could also be argued that encryption at rest may use the same vulnerable algorithms. A big benefit of using a vault is having the ability to re-encrypt using stronger algorithms once weaknesses are identified and a plan is in place to guard against those.&nbsp;<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Basis Theory can re-encrypt customer data at rest through a process completely transparent to the merchant. The token will not change, but the encryption grows stronger over time as the vault \u2014 in this scenario Basis Theory \u2014 would choose to evolve and re-encrypt.&nbsp;<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">This makes an independent vault not just a storage solution, but a resilience layer for any future payments stack.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large p-narrow-img\"><img loading=\"lazy\" decoding=\"async\" width=\"970\" height=\"1024\" src=\"https:\/\/chargebacks911.com\/wp-content\/uploads\/2025\/08\/Illustration-quantum-computing-storage-970x1024.jpg\" alt=\"Illustration: Quantum computer vault storage\" class=\"wp-image-86600\" srcset=\"https:\/\/chargebacks911.com\/wp-content\/uploads\/2025\/08\/Illustration-quantum-computing-storage-970x1024.jpg 970w, https:\/\/chargebacks911.com\/wp-content\/uploads\/2025\/08\/Illustration-quantum-computing-storage-284x300.jpg 284w, https:\/\/chargebacks911.com\/wp-content\/uploads\/2025\/08\/Illustration-quantum-computing-storage-768x811.jpg 768w, https:\/\/chargebacks911.com\/wp-content\/uploads\/2025\/08\/Illustration-quantum-computing-storage.jpg 1000w\" sizes=\"auto, (max-width: 970px) 100vw, 970px\" \/><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">Where the Industry Stands on Quantum-Safe Infrastructure&nbsp;<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">Encryption and tokenization should be viewed as complementary tools in defending against quantum-powered attacks. Together, they form the foundation of a quantum-resistant payment architecture.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">No major global acquirer or card network has broadly shared any quantum-safe endpoints. However, several pilot programs suggest progress toward quantum computing encryption is underway. The <a href=\"https:\/\/thequantuminsider.com\/2024\/12\/16\/banco-sabadell-collaborates-with-accenture-and-qusecure-to-implement-post-quantum-cryptography-solutions\/\" target=\"_blank\" rel=\"noopener\">Banco Sabadell, Accenture, and QuSecure<\/a> partnership, for example, indicates that productization is closer to reality. This pilot is a benchmark for financial institutions to demonstrate how quantum-safe technologies can be implemented in complex environments.&nbsp;<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">According to the news release cited above, one of the project\u2019s main innovations was the deployment of network-layer encryption. This enables organizations to implement quantum-safe standards without overhauling existing infrastructure.&nbsp;<\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><a href=\"https:\/\/www.fsisac.com\/\" target=\"_blank\" rel=\"noopener\">FS-ISAC<\/a> released more guidance in February 2025 to help the payment card industry mitigate the risks of quantum computing. The series advises strong access controls to restrict access to cardholder data, encryption of sensitive data, and mitigation strategies to reduce <a href=\"https:\/\/www.fsisac.com\/newsroom\/fsisac-releases-guidance-to-help-the-payment-card-industry-mitigate-risks-of-quantum-computing\" target=\"_blank\" rel=\"noopener\">quantum-related threats<\/a> in a post-quantum PCI ecosystem.<\/p>\n\n\n\n<div class=\"c-custom-cta c-custom-cta--red\">\n    <div class=\"c-custom-cta__inner\">\n        \n        <div class=\"c-custom-cta__content\">\n            <h4 class=\"c-custom-cta__title\">Technology changes fast.<\/h4>\n            <p class=\"c-custom-cta__description\">Make sure you\u2019re prepared for disruption.<\/p>\n            <a class=\"c-btn c-btn--primary c-custom-cta__btn\" data-open-demo-modal>Request a Demo<\/a>\n        <\/div>\n\n        <div class=\"c-custom-cta__graphics\">\n            <div class=\"c-custom-cta__graphics-inner\">\n                <div class=\"c-custom-cta__image\">\n                                    <img decoding=\"async\" src=\"https:\/\/chargebacks911.com\/wp-content\/themes\/CB911\/assets\/img\/shortcodes\/cta\/cta--revenue-recovered.png\" alt=\"The Original End-to-End Chargeback Management Platform\"\/>\n                            <\/div>\n            <\/div>\n        <\/div>\n    <\/div>\n<\/div>\n\n\n\n<p class=\"wp-block-paragraph\">The timeline for quantum disruption isn\u2019t decades long. Quantum computing encryption risk could come any time, and start to emerge at an accelerating rate. While current encryption protocols may hold for now, the data being stored today is becoming a liability for tomorrow. Adversaries are already harvesting data who are betting on quantum computing encryption cracking breakthroughs.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">So, what should businesses do to adapt to this new reality? One can start by:<\/p>\n\n\n\n<div class=\"c-icon-list\">\n<div class=\"c-icon-list__item\"><div class=\"c-icon-list__icon\"><object data=\"https:\/\/chargebacks911.com\/wp-content\/uploads\/2021\/10\/NEW-ICONS-DuoTone-Lineal-Icons_DuoTone-Iconz_DuoTone-Iconz-08.svg\" type=\"image\/svg+xml\"><\/object><\/div><div class=\"c-icon-list__content\"><h3 class=\"c-icon-list__title\">Minimizing What is Stored<\/h3><div class=\"c-icon-list__text\">\n<p class=\"wp-block-paragraph\">Reducing the amount of sensitive data the business retains will limit risk exposure in the event of a breach (quantum or otherwise). Evaluate which data is essential for operations and compliance, and securely dispose of what\u2019s unnecessary. This approach not only strengthens data protection posture but also helps streamline compliance with evolving privacy regulations.<\/p>\n<\/div><\/div><\/div>\n\n\n\n<div class=\"c-icon-list__item\"><div class=\"c-icon-list__icon\"><object data=\"https:\/\/chargebacks911.com\/wp-content\/uploads\/2023\/03\/NEW-ICONS-DuoTone-ai-brain.svg\" type=\"image\/svg+xml\"><\/object><\/div><div class=\"c-icon-list__content\"><h3 class=\"c-icon-list__title\">Choose Providers With Quantum-Readiness in Mind<\/h3><div class=\"c-icon-list__text\">\n<p class=\"wp-block-paragraph\">Tokenization replaces sensitive information with non-sensitive equivalents, reducing the risk of exposure. When selecting a provider, ask about their roadmap for post-quantum cryptography and whether their systems are built to adapt to future standards. A quantum-aware vendor can help future-proof one\u2019s data security strategy and reduce the likelihood of costly migrations down the line.<\/p>\n<\/div><\/div><\/div>\n\n\n\n<div class=\"c-icon-list__item\"><div class=\"c-icon-list__icon\"><object data=\"https:\/\/chargebacks911.com\/wp-content\/uploads\/2022\/08\/NEW-ICONS-DuoTone-Lineal-Icons-July2022-Update_DuoTone-Iconz-270.svg\" type=\"image\/svg+xml\"><\/object><\/div><div class=\"c-icon-list__content\"><h3 class=\"c-icon-list__title\">Ensure Systems Can Evolve With the Cryptography of the Future<\/h3><div class=\"c-icon-list__text\">\n<p class=\"wp-block-paragraph\">Many legacy systems are built around encryption standards that may become obsolete once quantum computers mature. To stay secure, businesses should assess the flexibility of their infrastructure and prioritize modularity, making it easier to integrate post-quantum algorithms as they are standardized. Planning for adaptability now can prevent security gaps and reduce technical debt in the future.<\/p>\n<\/div><\/div><\/div>\n<\/div>\n\n\n\n<p class=\"wp-block-paragraph\">If quantum computing hasn\u2019t been raised during any quarterly or yearly planning conversations, use this blog as the catalyst for change. Providers like Basis Theory can help merchants reduce their data risk and prepare for a future that is out of a science fiction movie. This isn\u2019t just a security concern, it\u2019s a strategic decision.&nbsp;<\/p>\n\n\n\n<div class=\"c-shortcode-faq\" data-shortcode-faq=\"true\" class=\"wp-block-cb911-block-library-faq\"><div class=\"c-shortcode-faq__inner\"><h2 class=\"c-shortcode-faq__heading joli-heading\" id=\"faqs\">FAQs<\/h2><div class=\"c-shortcode-faq__items\">\n\n<div class=\"c-shortcode-faq__item\" data-shortcode-faq-item=\"true\" class=\"wp-block-cb911-block-library-faq-item\"><div class=\"c-shortcode-faq__item-inner\"><div class=\"c-shortcode-faq__icons\"><div class=\"c-shortcode-faq__icons-inner\"><div class=\"c-shortcode-faq__icon c-shortcode-faq__icon--minus\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" fill=\"none\" viewBox=\"0 0 24 24\" stroke=\"currentColor\" stroke-width=\"2\"><path stroke-linecap=\"round\" stroke-linejoin=\"round\" d=\"M20 12H4\"><\/path><\/svg><\/div><div class=\"c-shortcode-faq__icon c-shortcode-faq__icon--plus\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" fill=\"none\" viewBox=\"0 0 24 24\" stroke=\"currentColor\" stroke-width=\"2\"><path stroke-linecap=\"round\" stroke-linejoin=\"round\" d=\"M20 12H4\"><\/path><\/svg><\/div><\/div><\/div><h3 class=\"c-shortcode-faq__question\">What is encryption in quantum computing?<\/h3><p class=\"c-shortcode-faq__answer\">In the context of quantum computing, encryption refers to how data is protected against quantum-enabled attacks. It also includes the development of post-quantum cryptography, or new encryption methods designed to withstand the capabilities of quantum computers.<\/p><\/div><\/div>\n\n\n<div class=\"c-shortcode-faq__item\" data-shortcode-faq-item=\"true\" class=\"wp-block-cb911-block-library-faq-item\"><div class=\"c-shortcode-faq__item-inner\"><div class=\"c-shortcode-faq__icons\"><div class=\"c-shortcode-faq__icons-inner\"><div class=\"c-shortcode-faq__icon c-shortcode-faq__icon--minus\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" fill=\"none\" viewBox=\"0 0 24 24\" stroke=\"currentColor\" stroke-width=\"2\"><path stroke-linecap=\"round\" stroke-linejoin=\"round\" d=\"M20 12H4\"><\/path><\/svg><\/div><div class=\"c-shortcode-faq__icon c-shortcode-faq__icon--plus\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" fill=\"none\" viewBox=\"0 0 24 24\" stroke=\"currentColor\" stroke-width=\"2\"><path stroke-linecap=\"round\" stroke-linejoin=\"round\" d=\"M20 12H4\"><\/path><\/svg><\/div><\/div><\/div><h3 class=\"c-shortcode-faq__question\">Can quantum computers break any encryption?<\/h3><p class=\"c-shortcode-faq__answer\">Quantum computers have the potential to break certain types of encryption, especially those based on factoring (like RSA) or discrete logarithms (like ECC), using algorithms such as Shor\u2019s. However, not all encryption methods are vulnerable; some remain secure even against quantum attacks.<\/p><\/div><\/div>\n\n\n<div class=\"c-shortcode-faq__item\" data-shortcode-faq-item=\"true\" class=\"wp-block-cb911-block-library-faq-item\"><div class=\"c-shortcode-faq__item-inner\"><div class=\"c-shortcode-faq__icons\"><div class=\"c-shortcode-faq__icons-inner\"><div class=\"c-shortcode-faq__icon c-shortcode-faq__icon--minus\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" fill=\"none\" viewBox=\"0 0 24 24\" stroke=\"currentColor\" stroke-width=\"2\"><path stroke-linecap=\"round\" stroke-linejoin=\"round\" d=\"M20 12H4\"><\/path><\/svg><\/div><div class=\"c-shortcode-faq__icon c-shortcode-faq__icon--plus\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" fill=\"none\" viewBox=\"0 0 24 24\" stroke=\"currentColor\" stroke-width=\"2\"><path stroke-linecap=\"round\" stroke-linejoin=\"round\" d=\"M20 12H4\"><\/path><\/svg><\/div><\/div><\/div><h3 class=\"c-shortcode-faq__question\">Can AES-256 be cracked by quantum computers?<\/h3><p class=\"c-shortcode-faq__answer\">AES-256 is considered relatively resistant to quantum attacks due to its symmetric key structure. While Grover\u2019s algorithm could theoretically reduce its security from 256-bit to 128-bit, that still provides strong protection and makes it impractical to break with foreseeable quantum hardware.<\/p><\/div><\/div>\n\n\n<div class=\"c-shortcode-faq__item\" data-shortcode-faq-item=\"true\" class=\"wp-block-cb911-block-library-faq-item\"><div class=\"c-shortcode-faq__item-inner\"><div class=\"c-shortcode-faq__icons\"><div class=\"c-shortcode-faq__icons-inner\"><div class=\"c-shortcode-faq__icon c-shortcode-faq__icon--minus\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" fill=\"none\" viewBox=\"0 0 24 24\" stroke=\"currentColor\" stroke-width=\"2\"><path stroke-linecap=\"round\" stroke-linejoin=\"round\" d=\"M20 12H4\"><\/path><\/svg><\/div><div class=\"c-shortcode-faq__icon c-shortcode-faq__icon--plus\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" fill=\"none\" viewBox=\"0 0 24 24\" stroke=\"currentColor\" stroke-width=\"2\"><path stroke-linecap=\"round\" stroke-linejoin=\"round\" d=\"M20 12H4\"><\/path><\/svg><\/div><\/div><\/div><h3 class=\"c-shortcode-faq__question\">Which encryption is safe from quantum computing?<\/h3><p class=\"c-shortcode-faq__answer\">Symmetric encryption schemes like AES (with longer keys) and hash-based algorithms are generally more resistant to quantum threats. Additionally, researchers are developing and standardizing post-quantum cryptography, or encryption algorithms specifically designed to be secure even against large-scale quantum computers.<\/p><\/div><\/div>\n\n<\/div><\/div><\/div>\n\n\n\n<p class=\"wp-block-paragraph\"><\/p>\n","protected":false},"excerpt":{"rendered":"<h2 class=\"wp-block-heading\">Quantum Computing Encryption: Are Businesses Safe Against More Advanced Technological Threats?<\/h2>\n<p>    Expert Insight<br \/>\n    This article has been published in collaboration with our good friends over at Basis Theory, a provider focused on helping merchants with PCI compliance and creating more flexibility in their payment workflows.<\/p>\n<div><a class=\"btn-filled btn\" href=\"https:\/\/chargebacks911.com\/quantum-computing-encryption\/\" title=\"Quantum Computing Encryption\">Read More<\/a><\/div>\n","protected":false},"author":9192235,"featured_media":86689,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_crdt_document":"","inline_featured_image":false,"footnotes":""},"categories":[58],"tags":[113,79],"class_list":["post-86400","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-payment-technology","tag-fintech-friday","tag-technology"],"acf":[],"_links":{"self":[{"href":"https:\/\/chargebacks911.com\/wp-json\/wp\/v2\/posts\/86400","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/chargebacks911.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/chargebacks911.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/chargebacks911.com\/wp-json\/wp\/v2\/users\/9192235"}],"replies":[{"embeddable":true,"href":"https:\/\/chargebacks911.com\/wp-json\/wp\/v2\/comments?post=86400"}],"version-history":[{"count":11,"href":"https:\/\/chargebacks911.com\/wp-json\/wp\/v2\/posts\/86400\/revisions"}],"predecessor-version":[{"id":88201,"href":"https:\/\/chargebacks911.com\/wp-json\/wp\/v2\/posts\/86400\/revisions\/88201"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/chargebacks911.com\/wp-json\/wp\/v2\/media\/86689"}],"wp:attachment":[{"href":"https:\/\/chargebacks911.com\/wp-json\/wp\/v2\/media?parent=86400"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/chargebacks911.com\/wp-json\/wp\/v2\/categories?post=86400"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/chargebacks911.com\/wp-json\/wp\/v2\/tags?post=86400"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}