A Snapshot of Post-Quantum Cryptography at MWC25 Barcelona

Post-quantum security is an urgent challenge facing the mobile industry in preparation for ‘Q-Day’. As quantum computing inches closer to cryptographic relevance, the security models underpinning banking, telecommunications, and digital infrastructure could buckle under the weight of quantum decryption—making immediate preparation essential.

At the 6th Post-Quantum Network Seminar in MWC25 Barcelona, industry leaders, policymakers, and cryptography experts discussed the looming threats, the industry’s response, and the need for an immediate migration to quantum-safe cryptographic solutions. As Luke Ibbetson, Head of Group R&D at Vodafone, put it, “The complexity of the ecosystem in which we need to upgrade cryptography is such that we need to start planning for this today.”

A person speaks passionately at a podium labeled "GSMA," addressing the urgent challenge of post-quantum security facing the mobile industry. With long dark hair and a light-colored suit, their raised left hand underscores the critical nature of their speech against a dark background with a red and white design.
A speaker stands at a podium labeled "GSMA," discussing post-quantum security, an urgent challenge facing the mobile industry. He sports glasses, a gray shirt, and a blue lanyard with an ID badge. The backdrop is vivid red with "MWC25" prominently displayed in white.
A speaker in a dark suit stands on stage beside a red podium emblazoned with "GSMA," addressing the audience about the urgent challenge of post-quantum security facing the mobile industry. He holds a device, framed by a black and red backdrop, with two microphones poised on the podium.

The quantum threat: why act now?

Once powerful enough, quantum computers will shatter today’s encryption standards, rendering sensitive data vulnerable. The ‘store now, decrypt later’ attack model is a particular concern: attackers are already harvesting encrypted data, waiting for the day quantum computing allows them to break it. Mark Carney, Head of Quantum for Cybersecurity Research at Santander, highlighted this stark reality: “If decrypt that data in ten years, I’ve got a data lake that a quantum computer doesn’t help me with. A smart attacker will know that. They’ll be targeting the right data now.”

But this isn’t just about encryption—quantum computers could undermine digital signatures, authentication mechanisms, and even network integrity. Bad actors could rewrite transaction histories, impersonate institutions, and systematically dismantle trust in digital systems.

The financial sector, which operates under strict regulatory oversight, is particularly concerned. Anne Leslie, Cloud Risk Leader at IBM Cloud Financial Services, explained that “The challenge isn’t just technical. It’s human. We’re already dealing with regulatory overload, operational resilience, and cyber threats. Adding quantum risk to that mix means prioritising what must be tackled first.”

The estimated timeline for ‘Q-Day’, when quantum computers reach cryptographic relevance, varies—but many experts predict it could arrive as early as 2030. Given the time required for global cryptographic migration, the industry must act now.

Four people are seated on a stage in chairs, engaged in conversation. The person in a light outfit speaks animatedly with hand gestures, perhaps discussing how post-quantum security is an urgent challenge facing the mobile industry. Two water bottles sit on a table before a large red backdrop with white lines.
Two women are seated on white chairs, engaged in a conversation about post-quantum security in front of a red backdrop displaying "MWC25". The woman on the left has papers and wears a dark outfit. The woman on the right, in a tan suit, gestures as she speaks. A table with water bottles is between them.
A woman in a bright pink blazer sits on a stage, passionately discussing post-quantum security as an urgent challenge facing the mobile industry. Speaking into a headset microphone, she gestures animatedly. Her curly dark hair contrasts with her white top, drawing focus in the dimly lit setting.

Post-quantum security relies on industry collaboration

With mobile networks so crucial to digital infrastructure, the telecoms industry is at the centre of post-quantum security. Networks must transition to quantum-resistant encryption, but the task is immense. With security deeply embedded across supply chains, legacy infrastructure, and IoT ecosystems, the migration must be coordinated across sectors.

Lory Thorpe, Chair of the GSMA Post-Quantum Telco Network Task Force and Senior Strategy Advisor at IBM, emphasised that “The telco industry doesn’t work in isolation. We need collaboration across vendors, regulators, and enterprises. This is a security upgrade at an unprecedented scale.”

One key challenge is interoperability—ensuring that quantum-safe cryptographic standards work seamlessly across global networks. While organisations like NIST, IETF, and 3GPP are leading standardisation efforts, different countries are pursuing their own quantum security strategies. Laura Iglesias, Head of Cybersecurity for European Markets at Vodafone, acknowledged the challenge: “We do need interoperability. We need an agreement between the different agents in the ecosystem—telcos, vendors, software providers—so we can all move in sync.”

Regulation is also shaping this transition. The Digital Operational Resilience Act (DORA) in Europe and U.S. federal mandates are forcing enterprise to confront post-quantum security. As Anne Leslie noted: “regulation is painful, but necessary. If we’d all been following best practices, we wouldn’t need it. The reality is, companies aren’t securing their cryptography fast enough.”

Challenges in implementation: IoT, legacy systems, and energy constraints

The IoT represents a particularly difficult security challenge for post-quantum security. IoT devices often have limited processing power, long lifespans, and no straightforward upgrade path—yet they are critical to industries like energy, transportation, and healthcare. Simon Bryden, Consulting Engineer at Fortinet, warned: “IoT is where quantum security gets tricky. These devices are deployed for 10–15 years, sometimes longer. If we don’t build quantum resilience into them today, we’re setting ourselves up for massive security failures in the future.”

Legacy infrastructure compounds the problem. Telecom networks, financial institutions, and governments must phase out outdated encryption across thousands of suppliers and generations of hardware. This is neither quick nor cheap.

At the same time, post-quantum encryption demands more processing power, which affects energy efficiency—especially in battery-powered IoT devices. This creates a trade-off between security and sustainability.

An older man with gray hair and glasses speaks on stage, holding notes, highlighting that post-quantum security is an urgent challenge facing the mobile industry. Behind him, four women sit on chairs, smiling in business attire against a red "MWC23" backdrop. Water bottles decorate tables at this professional conference.
Two people are seated on stage against a red background. The woman on the left, in a patterned dress, holds a notepad, while the man on the right, in a light blue shirt with lanyard, clasps his hands. As bottles of water rest nearby, they discuss how post-quantum security is an urgent challenge for the mobile industry.
A speaker takes the stage at the 6th Post Quantum Network Seminar, MWC25, highlighting post-quantum security as an urgent challenge facing the mobile industry. Behind them, a screen reads "Q-Day is coming..." Next to a red panel with event details and a QR code are four white chairs.

Regulatory landscape and standardisation efforts

Global cryptographic standardisation remains a moving target. NIST’s selection of post-quantum cryptographic algorithms is a major milestone, but competing approaches exist. For example, countries like China and South Korea are pursuing their own quantum security strategies, creating uncertainty for global enterprises. Patricia Díez Muñoz, Global Security Director for Networks & Systems at Telefónica, stressed that “the explosion of IoT devices means we need harmonised global security standards. Otherwise, manufacturers will be stuck following conflicting regulations in different regions.”

For MNOs this fragmentation poses a serious risk. Without unified standards, networks will be forced to juggle multiple cryptographic frameworks, increasing complexity and cost.

The road ahead for post-quantum security

The consensus at the seminar was clear: organisations must act now to avoid ominous security gaps in the near future. Post-quantum security is not a one-time upgrade but an ongoing process. Enterprises must follow a three-phase approach:

  1. Discovery and inventory: identify cryptographic dependencies across networks, software, and supply chains.
  2. Migration and testing: implement hybrid cryptographic solutions to transition gradually while ensuring resilience.
  3. Continuous monitoring and adaptation: maintain cryptographic agility to accommodate future advancements.
A man in a suit stands on stage beside a red podium labeled "GSMA," gesturing with his left hand and holding a smartphone in his right. The red and black backdrop sets the stage for discussing urgent challenges like post-quantum security facing the mobile industry at this formal conference.
At MWC25, a woman in a black blazer and floral blouse takes the stage to address post-quantum security—an urgent challenge facing the mobile industry. With her pointer and microphone, she commands attention, framed by red and black walls displaying "MWC25" in bold white letters.
A group of eleven people stand on a stage in front of a red screen displaying "Up Next Security Summit Session 5 Mobile Device Security 16:30-17:30 CET." With post-quantum security as an urgent challenge for the mobile industry, logos and a QR code adorn the backdrop behind white chairs.

The shift will require cross-sector cooperation. As Maxime Flament, CTO of the 5G Automotive Association, pointed out: “Quantum threats don’t respect industry boundaries. Whether it’s telecom, banking, or automotive, we all need a shared security roadmap.” The organisations that take quantum security seriously today will be the ones best positioned to protect their infrastructure, data, and customers tomorrow. The transition to post-quantum security is one of the most complex challenges in cybersecurity history. The threat is real, the timeline is short, and the industry must act before it’s too late.

The GSMA Post Quantum Telco Network Task Force will continue to work with its members to help resolve the Post-quantum cryptography implementation challenges faced by the mobile industry.

Please click here to download the presentation of the 6th Post Quantum Network Seminar.

Watch on-demand