EY quantum cryptography revolution

Is the financial sector ready for the transition towards post-quantum cryptography?

Explore how advancing quantum computing poses risks to the Dutch financial sector's cryptography and the urgent need for post-quantum solutions.


In brief:

  • Quantum computing threatens to dismantle asymmetric cryptography, crucial for secure financial communications and transactions.
  • The Dutch financial sector has a critical five-year window to transition to post-quantum cryptography to safeguard sensitive data.
    • Implementing new cryptographic standards is complex, requiring comprehensive inventories and proactive measures to mitigate vulnerabilities.

    The Dutch financial sector has earned a reputation for innovation, with its commitment to technology and cybersecurity often seen as a benchmark for others. However, advances in quantum computing present a material risk to modern financial systems. Once theoretical, quantum capabilities are steadily maturing, bringing the potential to compromise the asymmetric cryptography that secures communications, payments, identities, and market infrastructure. This development raises a crucial question: are Dutch financial institutions ready to confront the impending cryptographic challenges posed by quantum technology?

    Quantum computing is closer than you think

    Quantum computing is no longer a distant dream. Recent advancements in quantum computer processor technology from Google, IBM, and Microsoft, signal that the quantum era is not just far away on the horizon (Google, 2024) (IBM, 2025) (Microsoft, 2025). These machines, once fully developed, will possess the ability to dismantle asymmetric cryptographic protocols that are essential not only for financial institutions but also for various sectors reliant on digital infrastructure.

    Estimates suggest that the decade from 2030 to 2040 may witness quantum computers capable of breaking asymmetric encryption. For Dutch financial institutions, continued reliance on classical encryption methods poses significant risks, as these methods will become inadequate in the face of quantum computing advancements. The Dutch Central Bank (DNB) emphasizes the need for institutions to monitor developments closely and take proactive measures to secure their systems, including transitioning to post-quantum encryption standards (DNB, 2024).

    Vulnerabilities in current cryptography

    The core issue resides in the computational assumptions that underpin modern asymmetric cryptography. These schemes rely on the difficulty of solving mathematical problems that would take classical computers an impractically long time to compute. These methods underpin secure communication, digital signatures, identity verification, and key exchange across the financial sector. Quantum computing is changing the game when it comes to solving complex mathematical problems.

    A sufficiently capable quantum computer can utilize specially designed quantum algorithms to perform specific tasks much faster than traditional computers. For instance, many online security algorithms, such as RSA, depend on the difficulty of factoring large numbers. Currently, this task is challenging for classical computers, which is why these systems are considered secure. However, a quantum computer could accomplish this quickly, rendering these security systems vulnerable.

    Waiting for fully operational quantum systems is a risky bet due to the ‘harvest now, decrypt later’ threat

    The primary concern is the 'harvest now, decrypt later' (HNDL) attack model: capable adversaries intercept and store encrypted data today, whether in transit or at rest, with the intention of decrypting it once cryptographically relevant quantum computers become available. This approach can be used by attackers to accumulate valuable information over time, or to ensure they have access to data that may be useful in the future, particularly in the context of evolving threats and technological advancements.

    Data considered secure today may be at risk in the future, particularly for information with long-term confidentiality requirements, such as financial records, health data, or classified communications. While regularly updating sensitive information can mitigate exposure, immutable identifiers like ID numbers and passport information remain vulnerable. The permanence of such data increases the potential for fraud and identity misuse, underscoring the need for proactive measures by financial institutions.

    The challenge of transitioning to post-quantum cryptography

    Implementing post-quantum cryptography effectively across complex systems and organizations is a significant challenge. The transition to more secure cryptographic methods is not only resource-intensive but also requires a deep understanding of the cryptographic landscape within an organization. The first step involves developing a comprehensive cryptographic inventory that maps all cryptographic components across the organization and its supply chain, including algorithms, protocols, keys, certificates, data flows, and system dependencies. Without this visibility, organizations risk overlooking critical vulnerabilities and hidden interdependencies, leading to delays in remediation and increased exposure to quantum-related threats.

    For example, many organizations faced considerable challenges when migrating from the vulnerable SHA-1 hashing algorithm to its secure successor, SHA-256. In practice, this migration took more than five years for many organizations, even after the necessary specifications and implementations were available (AIVD,2024). This lengthy timeline highlights the operational friction that can accompany the adoption of new cryptographic standards, algorithms, and supporting technologies. Similar complexity and potential delay should be anticipated for the transition to post-quantum cryptography, as timelines for cryptographically relevant quantum capabilities continue to tighten.

    Financial institutions cannot afford to wait for EU deadlines

    In June 2025, the European Commission published a roadmap for transitioning to post-quantum encryption. Supported by ENISA and the NIS Cooperation Group, the roadmap outlines key milestones: by the end of 2026, initial national PQC transition roadmaps need to be established by all member states, including awareness campaigns, and cryptographic inventories. By 2030, critical infrastructure sectors, including finance, telecommunications, and government, should be secured with PQC. The goal is to complete PQC migration across most systems in the EU by 2035, including legacy environments where feasible. (European Commission, 2025)

     

    Currently, Dutch financial institutions have a critical window of about five years to implement post-quantum cryptography and safeguard customers, core business operations, and sensitive data from emerging quantum threats. While this may seem like ample time, historical transitions, such as the migration from SHA-1 to SHA-256, demonstrate that it is not. Organizations should, therefore, begin immediately by conducting a comprehensive cryptographic inventory and establishing crypto-agile architectures to prepare for post-quantum deployment. The year 2026 marks the quantum inflection point. Organizations may have post quantum cryptography on their radar, but it is now crucial to start taking concrete steps. Our next article will detail how to identify quantum exposed assets and build a phased migration roadmap for your organization.


    Summary

    The Dutch financial sector faces significant risks from advancing quantum computing, which threatens to compromise asymmetric cryptography essential for secure communications and transactions. As quantum capabilities mature, institutions must transition to post-quantum cryptography to safeguard sensitive data. The European Commission has set a roadmap for this transition, with critical deadlines approaching. However, implementing new cryptographic standards is complex and resource-intensive, requiring organizations to conduct comprehensive inventories of their cryptographic systems. Financial institutions must act swiftly to mitigate vulnerabilities and protect against potential 'harvest now, decrypt later' attacks as quantum technology evolves.

    Related articles

    Four regulatory shifts financial firms must watch in 2026

    Our Global Financial Services Regulatory Outlook has four regulatory priorities to drive financial institutions' focus in 2026. Download the report.

    AI-agents can make or break a financial institution

    Explore how AI-agents create opportunities and risks in finance. Onsi, Stater, and EY share insights on safe, effective adoption.

    Why organizations should prepare for quantum computing cybersecurity now

    This technology is finding its way out of research labs and into commercial applications, upending the norms of cryptography. Learn how to be ready.


      About this article