The timeline for when quantum computers will be capable of breaking modern encryption is uncertain, and it depends on various factors, such as technological advancements and the scale of quantum computers developed. While it is difficult to predict exact timelines, it is generally agreed that the development of large-scale, error-corrected quantum computers capable of breaking commonly used cryptographic algorithms would require significant progress in the field, which could take many years, possibly even decades.
However, it is important to note that not all quantum computers, including D-Wave systems, are suitable for breaking encryption. D-Wave quantum computers are designed specifically for solving optimization problems and are not built for general-purpose quantum computation. They use a different approach called quantum annealing, which is not currently expected to be as effective for breaking encryption as other quantum computing architectures like gate-based quantum computers.
Furthermore, the potential use of quantum computers for criminal activities is a concern that needs to be addressed. To mitigate these risks, researchers and organizations are actively working on developing quantum-resistant encryption methods, also known as post-quantum cryptography. These encryption algorithms are designed to be secure against both classical and quantum computers, ensuring that sensitive data remains protected even in the presence of powerful quantum computing capabilities.
In addition, there are legal and ethical considerations surrounding the acquisition and use of powerful technologies like quantum computers. Governments and regulatory bodies play a crucial role in enforcing laws and regulations that restrict the misuse of such technologies. As with any advanced technology, there are legal frameworks in place to prevent their illicit use, and law enforcement agencies work to combat cybercrime and hold criminals accountable.
While it is important to be vigilant and proactive in addressing potential risks associated with quantum computing, it is worth noting that the development of quantum-resistant encryption methods and the enforcement of laws and regulations can help mitigate the threats posed by criminals obtaining and using quantum computers for illicit purposes.