Quick Answer: By 2028, quantum computers capable of breaking RSA-2048 and elliptic-curve encryption β the backbone of modern banking security β may be operational. This means standard savings accounts, wire transfers, and digital banking credentials could become cryptographically vulnerable. Banks and regulators are racing to adopt post-quantum cryptography (PQC), but the transition is slow, uneven, and underfunded.
The financial system rests on a mathematical assumption: that factoring large prime numbers is computationally infeasible. For classical computers, that assumption holds. For quantum computers running Shor's algorithm, it does not. This is not a theoretical future problem β it is an active engineering challenge with a hard deadline, and your bank almost certainly has not fully prepared for it.
The Cryptographic Foundation of Modern Banking
Every time you log into online banking, initiate a transfer, or authenticate a card payment, you are relying on one of two cryptographic families:
- RSA (RivestβShamirβAdleman): Typically RSA-2048, used in TLS handshakes and certificate authorities
- ECC (Elliptic Curve Cryptography): Used in mobile banking apps, contactless payments, and API authentication
Both systems derive their security from mathematical problems that classical computers cannot solve in practical time. RSA relies on integer factorization; ECC relies on the discrete logarithm problem over elliptic curves.
The quantum threat is precise: Shor's algorithm, published in 1994, can solve both problems in polynomial time on a sufficiently large quantum computer. A 4,000-logical-qubit fault-tolerant quantum computer could theoretically break RSA-2048 in hours β not millennia.
Where Quantum Hardware Actually Stands (2024β2028 Timeline)
As of mid-2024, the most advanced publicly known quantum processors include:
| Organization | System | Logical Qubits (approx.) | Status |
|---|---|---|---|
| IBM | Heron (2023) | 133 physical qubits | Research |
| Sycamore successor | 70+ physical qubits | Research | |
| Microsoft | Topological qubit prototype | Early-stage | Pre-commercial |
| IonQ | Forte Enterprise | 35 algorithmic qubits | Commercial |
The critical distinction: Physical qubits β Logical qubits. Error correction overhead means breaking RSA-2048 requires an estimated 4,000+ logical qubits, which may require millions of physical qubits depending on error rates.
NIST's internal assessments, alongside a 2022 report from the Global Risk Institute, estimate a 1-in-7 chance that RSA-2048 becomes breakable by 2026, rising to 1-in-2 by 2031. The 2028 window sits precisely in this high-uncertainty zone.
"A cryptographically relevant quantum computer (CRQC) does not need to be publicly announced before it becomes a threat. Nation-state actors with classified programs may achieve it earlier." β CISA, Post-Quantum Cryptography Initiative, 2023
The "Harvest Now, Decrypt Later" Attack Vector
This is the most immediately actionable threat β and it is already happening.
Adversaries (particularly nation-state intelligence services) are known to be intercepting and archiving encrypted banking communications today, with the intention of decrypting them once quantum capability is achieved. This strategy is called HNDL (Harvest Now, Decrypt Later).
For banking, this means:
- Long-term account records encrypted in transit today could be exposed retroactively
- Private key material embedded in legacy TLS sessions could be recovered
- Correspondent banking messages (SWIFT traffic) archived for future decryption
A 2023 intelligence brief from the UK's NCSC confirmed that HNDL operations targeting financial infrastructure are considered a "credible and active" threat vector.
NIST's Post-Quantum Cryptography Standards: What Banks Must Adopt
In August 2024, NIST finalized its first set of Post-Quantum Cryptography (PQC) standards:
- ML-KEM (formerly CRYSTALS-Kyber) β Key encapsulation mechanism
- ML-DSA (formerly CRYSTALS-Dilithium) β Digital signatures
- SLH-DSA (formerly SPHINCS+) β Hash-based signatures
These algorithms are based on mathematical problems β primarily lattice problems and hash functions β believed to be resistant to both classical and quantum attacks.
The migration challenge for banks is substantial:
- Legacy system depth: Core banking systems like Temenos T24 or FIS Profile were not designed with cryptographic agility
- Certificate infrastructure: Millions of SSL certificates, HSMs (Hardware Security Modules), and PKI hierarchies require replacement
- Regulatory compliance lag: Basel III, PCI-DSS 4.0, and DORA do not yet mandate PQC timelines explicitly
- Third-party exposure: Payment processors, ATM networks, and API partners each introduce independent vulnerabilities
Case Study: The Dutch Banking Sector's PQC Pilot
In 2022β2023, De Nederlandsche Bank (DNB) coordinated a pilot program with ING, Rabobank, and ABN AMRO to test hybrid cryptographic protocols β running classical and post-quantum algorithms simultaneously as a transitional measure.
Key findings published in their 2023 technical report:

