Quantum Computers vs Encryption: How Australia is Preparing for the Cyber Threat (2025)

Imagine a world where all your online secrets are suddenly exposed. Your bank accounts, your private emails, even national security data – all vulnerable. This isn't science fiction; it's the looming threat of quantum computers cracking today's encryption, and Australia is on high alert. Are we ready for this quantum apocalypse?

The Australian Signals Directorate’s Australian Cyber Security Centre (ACSC) recently released its Annual Cyber Threat Report 2024-2025, and the findings paint a concerning picture. You can find the full report here: https://www.cyber.gov.au/about-us/view-all-content/reports-and-statistics/annual-cyber-threat-report-2024-2025. This report isn't just another dry government document; it's a wake-up call. It highlighted that Australians are reporting cybercrime at an alarming rate – roughly once every six minutes. But the real bombshell? A warning about the impending disruption of modern cryptography.

The report suggests that a "cryptographically relevant quantum computer" (CRQC) isn't some far-off fantasy; it's “on the horizon.” A CRQC, as defined by the Australian Computer Society (ACS), is a quantum computer powerful enough to break current encryption standards (https://ia.acs.org.au/article/2025/companies-ignore-quantum-decryption-threat.html). Imagine a master key that unlocks every digital lock. This is the power a CRQC would wield. It could effortlessly crack encrypted data, granting cybercriminals unprecedented access to sensitive information.

Defence Minister Richard Marles acknowledges that CRQCs are “still a few years down the track.” But here's where it gets controversial... even a few years isn't much time to overhaul our entire digital security infrastructure. Marles is urging Australian companies to prepare now for a world where today's encryption is obsolete. The stakes are incredibly high, and procrastination could be catastrophic.

So, what exactly is post-quantum cryptography, and why is it so important?

Think of conventional encryption like a complex maze. It scrambles your data using mathematical algorithms, making it unreadable to anyone without the correct key. But quantum computers, with their immense processing power, could potentially solve these mazes with ease, rendering current encryption methods useless. This day of reckoning is often referred to as 'Q-Day' (https://www.wired.com/story/q-day-apocalypse-quantum-computers-encryption).

Post-quantum cryptography, on the other hand, uses algorithms designed to be resistant to both classical and quantum computers. It's like building a new maze so complex that even the most powerful quantum computers struggle to find their way through. The ACSC report stresses that businesses need to start adopting these quantum-resistant algorithms now.

Marles emphasized that solutions already exist. “It’s really important that they get on board with those products as soon as possible,” he stated. Andrew Wilson, CEO of encryption specialist Senetas, echoes this urgency, urging organizations to “begin their quantum-safe migration without delay.” He recommends using “dedicated encryption systems to safeguard sensitive and high-value data.”

And this is the part most people miss... Wilson warns of a “harvest-now, decrypt-later” threat. Cybercriminals might be stealing encrypted data today, knowing they can decrypt it later once a quantum computer becomes available. It's a long-term game for them, and we need to be prepared. “The report sends a clear message,” Wilson says. “This is a critical national security challenge that Australian organizations must address immediately.”

Beyond Encryption: A Digital Spring Cleaning

The ACSC report goes beyond just encryption, recommending businesses focus on three other crucial areas: implementing best-practice logging, managing third-party risk, and, perhaps most importantly, replacing legacy IT systems.

Keeping old IT systems on your network is like leaving a window open for cybercriminals. “Keeping legacy IT on a network increases the likelihood of a cybersecurity incident,” the report states. “It can also make any cybersecurity incident that does occur much more impactful.” The problem is particularly acute in government, where a staggering 70% of Commonwealth entities are still burdened by legacy IT, according to consulting firm Mandala (https://mandalapartners.com/reports/unlocking-the-productivity-dividend-of-digital-government). These outdated systems are costly, vulnerable, and stifle innovation. The ACSC urges businesses to “eliminate the risks associated with legacy IT” by replacing them with supported systems. If that's not immediately possible, “temporary measures” should be implemented to mitigate the risk. As Marles bluntly put it, “Old IT systems are gateways for cybercriminals.”

Notably, Microsoft’s Windows 10 operating system reached its end-of-life this week (https://ia.acs.org.au/article/2025/windows-10-reaches-end-of-life.html), meaning that after three years, even paying users will no longer receive security updates. Continuing to use unsupported operating systems is akin to driving a car with bald tires – an accident waiting to happen.

Aussie IDs Under Siege

Marles, in the report's foreword, highlights that cybercriminals have “relentlessly targeted Australians” over the past year. The numbers speak for themselves: ReportCyber received over 84,700 cybercrime reports in the 2024-25 financial year. While this represents a slight decrease, it still averages out to one report every six minutes (https://ia.acs.org.au/article/2024/small-business-costs-rise-as-cyber-attacks-refine.html). The Australian Cyber Security Hotline received over 42,500 calls, a 16% increase, averaging 116 calls per day. Identity fraud accounted for 30% of self-reported cybercrime for individuals, an 8% increase from the previous year. The average cost of self-reported cybercrimes was a hefty $36,633 per person, with online shopping fraud and online banking fraud being the most common culprits. Businesses, meanwhile, saw a 50% jump in costs following a cybercrime incident, averaging $80,850.

“[Cybersecurity] is an area that is having a big impact on our economy, and it’s really important that everyone – companies and individuals alike – are doing everything they can to ensure the public cyber health of our nation,” Marles concludes.

This is more than just a technical problem; it's a societal challenge. But here's a thought: Is enough being done to educate the average Australian about these threats? Are we relying too heavily on businesses to shoulder the burden, or do individuals need to take more responsibility for their own cybersecurity?

What do you think? Are Australian businesses and individuals adequately prepared for the quantum computing threat? Is the government doing enough to support the transition to post-quantum cryptography? Share your thoughts in the comments below!

Quantum Computers vs Encryption: How Australia is Preparing for the Cyber Threat (2025)

References

Top Articles
Latest Posts
Recommended Articles
Article information

Author: Francesca Jacobs Ret

Last Updated:

Views: 6137

Rating: 4.8 / 5 (48 voted)

Reviews: 95% of readers found this page helpful

Author information

Name: Francesca Jacobs Ret

Birthday: 1996-12-09

Address: Apt. 141 1406 Mitch Summit, New Teganshire, UT 82655-0699

Phone: +2296092334654

Job: Technology Architect

Hobby: Snowboarding, Scouting, Foreign language learning, Dowsing, Baton twirling, Sculpting, Cabaret

Introduction: My name is Francesca Jacobs Ret, I am a innocent, super, beautiful, charming, lucky, gentle, clever person who loves writing and wants to share my knowledge and understanding with you.