Cybersecurity

Safeguarding central bank digital currency systems in the post-quantum computing age

Blue glowing futuristic quantum computer, computer generated abstract background, 3D rendering

Cryptographic agility needs to be embedded into central bank digital currency systems to defend against quantum cyberattacks. Image: Getty Images/iStockphoto

Cameron Nili
Project Fellow, Financial Market Infrastructure Modernization & Wholesale CBDC, Accenture
Tom Patterson
Managing Director, Emerging Technology Security, Accenture
Carl Dukatz
Next Gen Compute Lead, Managing Director, Accenture
  • Quantum computers can transform data-intensive tasks, but they also pose a unique threat to encryption techniques that protect data in motion.
  • Central bank digital currency (CBDC) systems aim to improve cross-border payments, which can expose key transaction data to quantum attack risks.
  • Central banks must embed cryptographic agility into CBDC systems to defend against quantum cyberattacks targeting payment infrastructure.

Quantum computing is a disruptive force that will revolutionize data-intensive tasks across sectors. Yet, it poses a unique cybersecurity threat as it could be used to break current data encryption schemes.

Discover

How is the World Economic Forum improving the global financial system?

As industry players modernize financial markets, an emphasis must be placed on building quantum-resistant financial systems in the era of central bank digital currencies (CBDCs).

Critical infrastructure requires critical safeguards

In parallel, the private sector is pursuing scalable quantum computers that can operate at scale to create $1.3 trillion in value by 2025.

Quantum computers employ quantum bits (qubits) that can exist in a multidimensional state (i.e., can be a 0, 1, or any part of 0 and 1) to solve complex problems like optimizing financial portfolios or discovering new drugs better than classical supercomputers.

Have you read?

Yet, bad actors can also wield this novel technology to break some public key encryption mechanisms of our most critical systems.

CBDC systems rely on cryptographic mechanisms to safeguard “in-motion” data being transmitted, like many systems, such as sensitive customer, transaction, and market data. Thus, CBDC and other national payment systems, such as RTGS systems, are vulnerable to the quantum threat.

The interconnected nature of these systems with platforms like settlement and clearing systems underscores the importance of mitigating attacks to prevent financial contagion.

There is growing consensus that CBDC systems are poised to modernize cross-border payments, which can involve certain data-sharing activities across jurisdictions and between institutions. As such, distributed ledger technology (DLT) is often experimented with as the infrastructure for CBDC systems, with examples including mBridge, Icebreaker and Mariana.

A bad actor could use quantum computers to intercept a CBDC system’s networked communication to impersonate individuals and steal financial assets. Broadly, there are three types of quantum attack methods:

  • Network interception: Intercept information transmitted via networked and wireless communications.
  • Identity impersonation: Impersonate individuals online to bypass verification checks and perform privileged actions.
  • ‘Harvest now, decrypt later’: Intercept and store encrypted data in motion to decrypt later once quantum computers are practicable, which experts believe will be in 10-15 years.

The implications of such incidents are not to be underestimated. A 2021 study by the Hudson Institute demonstrated that a theoretical quantum attack on the US real-time gross settlement (RTGS) system (“Fedwire Funds Service”) could result in a 10-17% decline in real GDP following the attack, which could then trigger a six-month recession and trillions in indirect losses.

Quantum computers are deemed a threat to CBDC systems because they can break in-motion encryption standards, such as RSA and elliptic-curve cryptography (ECC), which are universally used in financial systems.

While not yet widely practicable, experts predict there will be around 5,000 operational quantum computers by 2030. With the emergence of quantum computing, it is ever-more important to understand how to defend our critical infrastructure against such attacks.

Cryptographic agility is a capability that provides the ability to orchestrate and rotate cryptographic algorithms based on real-time threats easily and to thwart evolving attack techniques.

For example, current asymmetric encryptions like RSA and ECC must be augmented with NIST-candidate lattice-based algorithms like Module-Lattice-Based Encapsulation-Method (ML-KEM/Kyber), Module-Lattice-Based Digital Signature Algorithm (ML-DSA/Dilithium), or Stateless Hash-Based Digital Signature Algorithms (SLH-DSA/SPHINCS+).

Other examples of the mechanisms that are expected to be implemented this year are:

  • Key encapsulation mechanism (KEM): A cryptographic protocol designed to secure symmetric keys for transmission using asymmetric algorithms, which can largely safeguard communication protocols from being attacked.
  • Digital signature algorithm (DSA): An asymmetric encryption algorithm that generates and verifies electronic signatures, thus securing identities in each system.

Implementing KEM and DSA across CBDC systems’ four layers – network, application, data flow and code – will be paramount to prevent network interception, identity impersonation and harvest now, decrypt later.

Central banks and financial institutions should therefore embrace quantum-resistant strategies when designing and building CBDC systems, including:

  • Performing a quantum security risk analysis based on the new threat and determining the counter-measure capabilities.
  • Cataloguing a cryptographic bill of materials (CBOM) that establishes an inventory of relevant encryption mechanisms in a system to enable regular upgrades.
  • Imposing strict cyber-resilience measures on entities granted access to CBDC systems to safeguard network endpoints, such as mobile devices.
  • Encapsulating traffic at the network- and application levels and embedding the use of certain libraries in the software development lifecycle to promote safe and agile applications.
  • Facilitating redundancy of data by sharing data storage to multiple data centres or nodes, if based on DLT, taking precautions to ensure that the key management deployed for this is quantum-safe.

While potenitally valuable in other ways, DLT does not add cryptographic agility benefits to defend against a quantum attack compared to conventional systems because protection is needed at all four layers, not just at the application level where smart contracts exist.

However, emerging evidence indicates DLT could greatly benefit CBOMs for multiple parties as it facilitates a trustlessly validated inventory of encryptions.

Continuing the exploration of quantum-resistant strategies

International efforts are under way to uncover approaches for safeguarding the next generation of national payment systems, including CBDCs.

The World Economic Forum has formed the Quantum Economy Network that recently developed guidance for the Financial Sector on Informing Global Regulatory Approaches, given the key role of regulators to trigger industry action.

The Bank for International Settlements (BIS) has published the results of the first phase of Project Leap, advancing quantum-safe cryptography research for financial systems. Meanwhile, Project Tourbillon is another BIS initiative exploring the replacement of RSA encryption methods with quantum-safe, lattice-based schemes in the CBDC context.

Loading...

A notable private sector effort is the Quantum Security Maturity Index, originated by Accenture and other companies, to speed up and improve the security of the civilized world by defending against this fast-growing threat to cryptography.

As central banks pursue CBDCs, cryptographic agility must be at the core of the approach to safeguard financial infrastructure from quantum cyber-attacks.

Without this, CBDC systems and critical infrastructure could be exposed and result in significant economic damages. Deep public and private sector collaboration on instituting cyber-resilience beyond an organization’s four walls will be key to successfully deterring the quantum threat.

Don't miss any update on this topic

Create a free account and access your personalized content collection with our latest publications and analyses.

Sign up for free

License and Republishing

World Economic Forum articles may be republished in accordance with the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International Public License, and in accordance with our Terms of Use.

The views expressed in this article are those of the author alone and not the World Economic Forum.

Stay up to date:

Cybersecurity

Related topics:
CybersecurityFinancial and Monetary Systems
Share:
The Big Picture
Explore and monitor how Cybersecurity is affecting economies, industries and global issues
A hand holding a looking glass by a lake
Crowdsource Innovation
Get involved with our crowdsourced digital platform to deliver impact at scale
World Economic Forum logo
Global Agenda

The Agenda Weekly

A weekly update of the most important issues driving the global agenda

Subscribe today

You can unsubscribe at any time using the link in our emails. For more details, review our privacy policy.

5 ways to achieve effective cyber resilience

Filipe Beato and Jamie Saunders

November 21, 2024

We asked 6 tech strategy leaders how they're promoting security and reliability. Here's what they said

About us

Engage with us

  • Sign in
  • Partner with us
  • Become a member
  • Sign up for our press releases
  • Subscribe to our newsletters
  • Contact us

Quick links

Language editions

Privacy Policy & Terms of Service

Sitemap

© 2024 World Economic Forum