Trending Post-Quantum, PQC Posts

    All Post-Quantum, PQC Posts

    • Quantum Computing Qubit Bloch Sphere

      Qubits: A Brief Introduction for Cybersecurity Professionals

      A qubit is the quantum analog of a classical bit – it’s the basic unit of quantum information. However, unlike a classical bit that can only be 0 or 1 at any given time, a qubit can exist in a combination of both 0 and 1 states simultaneously. This property is called superposition.

      Read More »
    • Quantum Computing Bell States

      Bell States: An Introduction for Cybersecurity Professionals

      Bell states are a set of four specific quantum states of two qubits (quantum bits) that are entangled. In simple terms, an entangled pair of qubits behaves as one system, no matter how far apart they are. Bell states are the simplest and most extreme examples of this phenomenon​. They are fundamental to quantum mechanics because they exhibit correlations between particles that have no classical…

      Read More »
    • Post-Quantum Kuperberg's Algorithm PQC

      Kuperberg’s Algorithm and its Impact on Post-Quantum Cryptography (PQC)

      Kuperberg’s algorithm is an impressive quantum algorithmic achievement that expands the boundary of what quantum computers might do beyond the original realm of Shor’s algorithm. It demonstrates that even some non-trivial group problems (like the dihedral hidden subgroup problem) are easier for quantum computers than for classical ones, albeit not easy in an absolute sense. In the context of cryptography, Kuperberg’s result serves as a…

      Read More »
    • Quantum Computing Quantum Computing Hype Hope

      Balancing Quantum Computing Hype and Hope

      Quantum computing stands at the intersection of immense promise and intense hype. As someone who had led cybersecurity teams (including serving as an interim CISO for Fortune 500 companies) and was now investing in a quantum computing startup, I found myself navigating two contrasting narratives. On one hand, I am bullish on the future of quantum technology - convinced that within 15-20 years we’d see…

      Read More »
    • Quantum Computing Quantum Computer Hype

      Quantum Computing Hype and Fear: Same Song, New Verse

      Another year, another wave of "quantum computers are about to crack all our encryption" fear-mongering. It’s 2012, and I’m getting déjà vu reading headlines proclaiming the imminent doom of RSA and other cryptography. I've been writing about this for at least 10 years. Ever since Peter Shor unveiled an algorithm for factoring large numbers on a quantum computer back in 1994, the tech world has…

      Read More »
    • Quantum Computing Quantum Computers Intro

      Quantum Computers Intro

      I remember the first time I heard the phrase “quantum computer” about a ten years ago. I pictured something out of a sci-fi movie - maybe a glowing box humming with mystical power. As a techie who spends a lot of time worrying about encryption and security, my skeptical eyebrow immediately went up. Quantum anything has a way of making people lose their minds a…

      Read More »
    • Quantum Computing Quantum Decryption

      Are Quantum Computers a Real Threat?

      Our conclusion is that quantum computers are not an imminent threat to cybersecurity. They are a fascinating technology and potential threat in the long term, but certainly not something that keeps me awake at night today. For our clients such as governments and critical infrastructure operators, the prudent advice is to stay informed and begin long-range planning, but there’s no need to panic or overhaul…

      Read More »
    • Quantum Computing Quantum Snake Oil

      Quantum Snake Oil

      Don’t get me wrong - as a techno-geek at heart, I love the science of quantum computing. One day, it will upend cryptography as we know it. We’ll have to transition to new algorithms. That day will come - but it’s not here yet. It’s not even peeking over the horizon. Chasing every quantum-proof snake oil cure now is not just silly - it’s a…

      Read More »