Rinat Zilberstein.

Tech TLV
"Once quantum computers are operational, they could potentially breach all existing encrypted communications"

Rinat Zilberstein, AT&T Israel General Manager and VP R&D at AT&T, added: "With any groundbreaking development, there comes responsibility. It’s crucial that we ensure quantum technology does not lead to harm or pose risks to humanity."

"Quantum computers will be able to solve extremely complex mathematical problems, which will have far-reaching effects on science, technology, artificial intelligence, and many other fields," said Rinat Zilberstein, AT&T Israel General Manager and VP R&D at AT&T, speaking at Calcalist and LeumiTech's Tech TLV conference about preparing for the era of quantum computing. "However, with any groundbreaking development, there comes responsibility. It’s crucial that we ensure quantum technology does not lead to harm or pose risks to humanity."
1 View gallery
כנס TECH TLV -  רינת זילברשטיין סגנית נשיא ומנכ"לית מרכז המו"פ של AT&T בישראל
כנס TECH TLV -  רינת זילברשטיין סגנית נשיא ומנכ"לית מרכז המו"פ של AT&T בישראל
Rinat Zilberstein.
(Photo: Kobi Kuenkas)
What is the main challenge, and what responsibilities do we face in the future?
"Today, most communication is encrypted. In traditional cryptography, decrypting encrypted data can take years, even decades. However, quantum computers will be capable of breaking encryption within hours, potentially exposing all the information currently protected on networks," Zilberstein explained.
"There is a lot of discussion about security, and one major focus is on cryptography that cannot be hacked. However, once quantum computers are operational, they could potentially breach all existing encrypted communications, making sensitive information accessible. Hackers could exploit this by recording current encrypted communication and, in 5–10 years, use quantum computers to decrypt it. This is particularly concerning for highly sensitive information, such as White House communications, government meetings, military data, and financial records."
What can be done to mitigate the risks?
"One solution is to replace encryption methods with quantum-resistant cryptography, but this is a complex and time-consuming process," Zilberstein said. "The greater concern is that hackers could already be recording encrypted communication today, with plans to decrypt it once quantum computers are available. This presents a real threat to sensitive information.
"In recent years, we’ve seen significant advancements in quantum computing. For example, the Israeli company Quantum Machines, which develops solutions for the quantum ecosystem, has raised $100 million. Similarly, Google has developed a quantum chip that accelerates quantum computing progress. These developments show that quantum computing is advancing rapidly."
Zilberstein pointed out that major players are already preparing for the quantum era.
"The U.S. federal government has invested $7 billion to prepare for the quantum future. In the financial and tech sectors, companies like Apple have already started adopting quantum-resistant encryption methods. At AT&T, we recognized this challenge years ago and began preparing our infrastructure to protect our customers’ information in a quantum-powered world."
Zilberstein outlined four key steps for companies to prepare for the quantum era:
  • Understand the new technology: Learn about quantum computing and how it impacts cryptography. Global standardization organizations provide guidance on which cryptographic methods are most vulnerable.
  • Evaluate technological components: Examine your systems, data, and communications to identify which cryptographic methods could be compromised.
  • Prioritize sensitive information: Conduct risk management by identifying critical data that would pose significant risks if compromised. Focus on protecting this information.
  • Adopt quantum-ready encryption: In August 2024, the International Organization for Standardization (ISO) issued new encryption standards designed to be quantum-resistant. Companies should begin transitioning to these methods.