Readiness Assessment Tool
To effectively prepare for the quantum era, Iowa businesses in agriculture, insurance, and manufacturing should first assess their current level of readiness. This involves evaluating existing IT infrastructure, data security protocols, and workforce capabilities in the context of emerging quantum threats and opportunities [1, 2].
Key Areas for Assessment:
-
Data Security and Cryptographic Inventory:
- Identify all sensitive data assets, especially those with long retention periods (e.g., in healthcare and agriculture, where data longevity exceeds 20 years) [3, 4].
- Inventory the cryptographic algorithms currently in use for data protection and communication [4].
- Assess the potential vulnerability of these algorithms to future quantum computer attacks [3, 5, 6]. Current RSA security will be weak against quantum attacks [6].
- Recognize that failure to adopt Post-Quantum Cryptography (PQC) proactively could have “generational consequences” [3]. Iowa’s agriculture and insurance, cornerstones of its economy, face “generational consequences” without quantum-safe data [2, 7].
- Understand that current encryption, the ‘digital front door,’ is ‘sweet-talked’ open by future quantum computers [5, 8].
-
IT Infrastructure and Compatibility:
- Evaluate the existing IT infrastructure for its ability to integrate with or transition to quantum-safe cryptographic solutions [3, 9]. “We need to start preparing our IT infrastructure for quantum-safe cryptography to protect our data assets now” [3, 9-11].
- Consider the potential for hybrid quantum-classical solutions for near-term gains [9, 12].
- Assess the feasibility of deploying quantum-inspired algorithms on classical High-Performance Computing (HPC) clusters [9].
- Think about how quantum computing pilot projects can integrate with existing systems [9, 11, 13]. “We should consider pilot projects to see how quantum computing can integrate with our existing systems, focusing on risk modeling or cybersecurity” [9, 11, 13].
-
Workforce Skills and Quantum Literacy:
- Evaluate the current quantum literacy and expertise within the IT and relevant business teams [3, 13, 14].
- Acknowledge the looming “72% shortage in quantum-literate engineers by 2025” (Moody’s prediction) [3, 13, 15, 16]. How will your organization prepare for this? [3, 13, 16].
- Determine the need for talent acquisition or partnerships with quantum experts [13].
- Consider the importance of expanding STEM curricula in Iowa’s universities and fostering public-private partnerships to address this skills gap [9, 17-20].
-
Potential Quantum Applications and Business Needs:
- Identify specific business challenges or areas where quantum computing could offer a significant advantage [3, 9, 21].
- Explore potential applications in areas relevant to Iowa, such as prediction of crop health, precise application of resources, and better management of crop diseases in agriculture [3], improved models for natural disasters and agricultural risks in insurance [3], and optimized production lines in manufacturing [22].
- Consider applications like streamlining complex claims in insurance or optimizing fertilizer use in agriculture [23, 24]. Quantum computing could “save us millions in fertilizer costs” through precise application in Iowa’s agriculture [17, 24].
- “Pick a problem, something specific within your company that quantum could potentially help with and then start exploring” [9].
-
Awareness of Standards and Regulations:
- Stay informed about the ongoing developments in quantum technology, NIST standards for PQC, and relevant geopolitical trends [9, 11, 15, 25].
- Understand NIST’s critical role in standardizing PQC algorithms and ensuring interoperability and security [3, 16, 26]. “By setting benchmarks for technology standards, NIST drives innovation, helping companies remain competitive by adopting cutting-edge, secure technologies” [3, 16, 26].
- Recognize that NIST’s work is “critical for future-proofing business communications and data protection against quantum computing threats, ensuring long-term viability and security of digital assets” [3, 16].
Next Steps in Assessment:
- Conduct workshops with IT, security, and business leaders to discuss these assessment areas.
- Engage external consultants with expertise in quantum technology to provide an objective evaluation.
- Begin a detailed inventory of cryptographic assets and data vulnerabilities.