Global Risks Report 2026

Page 54 of 100 · WEF_Global_Risks_Report_2026.pdf

Quantum technologies stand to offer huge economic and social benefits. However, major risks are also on the horizon, potentially within a decade. These include cryptographic challenges (encryption and authentication) with potentially cascading impacts; new extremes in concentration of economic and business power; and an amplification of security risks. Cryptographic complacency Cryptographic risks are looming from expected quantum computing attacks on classical mathematics-based cryptography. The latter underlies current user authentication as well as data protection, storage and transmission, affecting the digital lives of all organizations and individuals. The quantum algorithm that exists today (known as Shor’s algorithm) already poses a theoretical threat to classical mathematics-based cryptography. Importantly, there are two specific threat vectors and impacts: First is decryption of private data, which will threaten Personally Identifiable Information (PII) and data privacy (e.g. medical data) as well as intellectual property data. This threat is immediate, due to so-called “harvest now, decrypt later” campaigns, whereby encrypted data is stolen and stored until quantum technology becomes sufficiently advanced to decrypt it.117 The second threat relates to breaking the cryptographic system that lets people, devices or services prove who they are online. Shor’s algorithm threatens to break this so-called “public-key infrastructure” as it is based on asymmetric keys and allows the impersonation of identities. All forms of digital authentication – including impersonation of online wallets for blockchain, authentication of digital contracts, trust establishment between a credit card and the issuing bank, or trust establishment between digital devices – will be at risk. National critical infrastructure could be at risk, too, since hostile actors could, for example, potentially take over self-driving vehicles or utilities. This threat is a longer-term one, as it does not depend on data, rather on whether quantum protection is in place at the time that a quantum attack becomes possible. Shor’s algorithm is waiting for a quantum computer powerful enough to run it, and progress towards this objective is quickening thanks to AI. According to a survey conducted in 2024, 53% of quantum experts believe that within a decade there will be at least a 50% likelihood of a quantum computer being able to break RSA-2048, a type of public-key classical mathematics-based cryptography118 within 24 hours.119 Time is thus of essence in preparing for this milestone, often termed “Q-day”.120 The US National Institute of Standards and Technology (NIST) in 2024 took the lead121 in issuing a set of standards for post-quantum cryptography (PQC),122 which is currently serving as a benchmark for other jurisdictions, focused on implementing new PQC algorithms that are resistant to Shor's algorithm. EU Member states have also developed a roadmap for the transition to PQC.123 However, many organizations appear to be lagging when it comes to understanding the potential impacts of quantum, both positive and negative. Only 12% of employers surveyed view quantum and encryption as critical technologies that will transform their organizations.124 Moreover, it is estimated that only 5% of organizations have quantum-safe encryption (i.e. to protect against Shor’s algorithm) in place.125 According to IBM’s Quantum Safe Readiness Index, which assesses organizations’ level of readiness across quantum- safe discovery, observability and transformation, the average quantum-safe readiness score is only 25 out of 100, where 100 is the safest.126 While large companies and some governments may have the know-how and resources to implement protections in time, many smaller companies Getty Images, Unsplash Global Risks Report 2026 54
Ask AI what this page says about a topic: