
This article is brought to you thanks to the collaboration of The European Sting with the World Economic Forum.
Author: Cameron Nili, Project Fellow, Financial Market Infrastructure Modernization & Wholesale CBDC, Accenture, Tom Patterson, Managing Director, Emerging Technology Security, Accenture, Carl Dukatz, Next Gen Compute Lead, Managing Director, Accenture
- Quantum computers can transform data-intensive tasks, but they also pose a unique threat to encryption techniques that protect data in motion.
- Central bank digital currency (CBDC) systems aim to improve cross-border payments, which can expose key transaction data to quantum attack risks.
- Central banks must embed cryptographic agility into CBDC systems to defend against quantum cyberattacks targeting payment infrastructure.
Quantum computing is a disruptive force that will revolutionize data-intensive tasks across sectors. Yet, it poses a unique cybersecurity threat as it could be used to break current data encryption schemes.
As industry players modernize financial markets, an emphasis must be placed on building quantum-resistant financial systems in the era of central bank digital currencies (CBDCs).
Critical infrastructure requires critical safeguards
More than 98% of the global economy’s central banks are exploring CBDCs to improve cross-border payment efficiency, enhance financial inclusion, and preserve the role of central bank money in the next generation of financial markets.
In parallel, the private sector is pursuing scalable quantum computers that can operate at scale to create $1.3 trillion in value by 2025.
Quantum computers employ quantum bits (qubits) that can exist in a multidimensional state (i.e., can be a 0, 1, or any part of 0 and 1) to solve complex problems like optimizing financial portfolios or discovering new drugs better than classical supercomputers.
Yet, bad actors can also wield this novel technology to break some public key encryption mechanisms of our most critical systems.
CBDC systems rely on cryptographic mechanisms to safeguard “in-motion” data being transmitted, like many systems, such as sensitive customer, transaction, and market data. Thus, CBDC and other national payment systems, such as RTGS systems, are vulnerable to the quantum threat.
The interconnected nature of these systems with platforms like settlement and clearing systems underscores the importance of mitigating attacks to prevent financial contagion.
There is growing consensus that CBDC systems are poised to modernize cross-border payments, which can involve certain data-sharing activities across jurisdictions and between institutions. As such, distributed ledger technology (DLT) is often experimented with as the infrastructure for CBDC systems, with examples including mBridge, Icebreaker and Mariana.
A bad actor could use quantum computers to intercept a CBDC system’s networked communication to impersonate individuals and steal financial assets. Broadly, there are three types of quantum attack methods:
- Network interception: Intercept information transmitted via networked and wireless communications.
- Identity impersonation: Impersonate individuals online to bypass verification checks and perform privileged actions.
- ‘Harvest now, decrypt later’: Intercept and store encrypted data in motion to decrypt later once quantum computers are practicable, which experts believe will be in 10-15 years.
The implications of such incidents are not to be underestimated. A 2021 study by the Hudson Institute demonstrated that a theoretical quantum attack on the US real-time gross settlement (RTGS) system (“Fedwire Funds Service”) could result in a 10-17% decline in real GDP following the attack, which could then trigger a six-month recession and trillions in indirect losses.
Embedding cryptographic agility to safeguard CBDC systems
Quantum computers are deemed a threat to CBDC systems because they can break in-motion encryption standards, such as RSA and elliptic-curve cryptography (ECC), which are universally used in financial systems.
While not yet widely practicable, experts predict there will be around 5,000 operational quantum computers by 2030. With the emergence of quantum computing, it is ever-more important to understand how to defend our critical infrastructure against such attacks.
Cryptographic agility is a capability that provides the ability to orchestrate and rotate cryptographic algorithms based on real-time threats easily and to thwart evolving attack techniques.
For example, current asymmetric encryptions like RSA and ECC must be augmented with NIST-candidate lattice-based algorithms like Module-Lattice-Based Encapsulation-Method (ML-KEM/Kyber), Module-Lattice-Based Digital Signature Algorithm (ML-DSA/Dilithium), or Stateless Hash-Based Digital Signature Algorithms (SLH-DSA/SPHINCS+).
Other examples of the mechanisms that are expected to be implemented this year are:
- Key encapsulation mechanism (KEM): A cryptographic protocol designed to secure symmetric keys for transmission using asymmetric algorithms, which can largely safeguard communication protocols from being attacked.
- Digital signature algorithm (DSA): An asymmetric encryption algorithm that generates and verifies electronic signatures, thus securing identities in each system.
Implementing KEM and DSA across CBDC systems’ four layers – network, application, data flow and code – will be paramount to prevent network interception, identity impersonation and harvest now, decrypt later.
Central banks and financial institutions should therefore embrace quantum-resistant strategies when designing and building CBDC systems, including:
- Performing a quantum security risk analysis based on the new threat and determining the counter-measure capabilities.
- Cataloguing a cryptographic bill of materials (CBOM) that establishes an inventory of relevant encryption mechanisms in a system to enable regular upgrades.
- Imposing strict cyber-resilience measures on entities granted access to CBDC systems to safeguard network endpoints, such as mobile devices.
- Encapsulating traffic at the network- and application levels and embedding the use of certain libraries in the software development lifecycle to promote safe and agile applications.
- Facilitating redundancy of data by sharing data storage to multiple data centres or nodes, if based on DLT, taking precautions to ensure that the key management deployed for this is quantum-safe.
While potenitally valuable in other ways, DLT does not add cryptographic agility benefits to defend against a quantum attack compared to conventional systems because protection is needed at all four layers, not just at the application level where smart contracts exist.
However, emerging evidence indicates DLT could greatly benefit CBOMs for multiple parties as it facilitates a trustlessly validated inventory of encryptions.
Continuing the exploration of quantum-resistant strategies
International efforts are under way to uncover approaches for safeguarding the next generation of national payment systems, including CBDCs.
The World Economic Forum has formed the Quantum Economy Network that recently developed guidance for the Financial Sector on Informing Global Regulatory Approaches, given the key role of regulators to trigger industry action.
The Bank for International Settlements (BIS) has published the results of the first phase of Project Leap, advancing quantum-safe cryptography research for financial systems. Meanwhile, Project Tourbillon is another BIS initiative exploring the replacement of RSA encryption methods with quantum-safe, lattice-based schemes in the CBDC context.
A notable private sector effort is the Quantum Security Maturity Index, originated by Accenture and other companies, to speed up and improve the security of the civilized world by defending against this fast-growing threat to cryptography.
As central banks pursue CBDCs, cryptographic agility must be at the core of the approach to safeguard financial infrastructure from quantum cyber-attacks.
Without this, CBDC systems and critical infrastructure could be exposed and result in significant economic damages. Deep public and private sector collaboration on instituting cyber-resilience beyond an organization’s four walls will be key to successfully deterring the quantum threat.
Trending now:
Discover more from The European Sting - Critical News & Insights on European Politics, Economy, Foreign Affairs, Business & Technology - europeansting.com
Subscribe to get the latest posts sent to your email.







































Why don't you drop your comment here?