Trending Post-Quantum, PQC Posts

    All Post-Quantum, PQC Posts

    • Q-Day Q-Day CRQC Quantum

      Q-Day Predictions: Anticipating the Arrival of CRQC

      While CRQCs capable of breaking current public key encryption algorithms have not yet materialized, technological advancements are pushing us towards what is ominously dubbed 'Q-Day'—the day a CRQC becomes operational. Many experts believe that Q-Day, or Y2Q as it's sometimes called, is just around the corner, suggesting it could occur by 2030 or even sooner; some speculate it may already exist within secret government laboratories.

      Read More »
    • Post-Quantum Quantum Mission-Critical Communications MCC Networks

      Quantum Readiness for Mission-Critical Communications (MCC)

      Mission-critical communications (MCC) networks are the specialized communication systems used by “blue light” emergency and disaster response services (police, fire, EMS), military units, utilities, and other critical operators to relay vital information when lives or infrastructure are at stake. These networks prioritize reliability, availability, and resilience – they must remain operational even during disasters or infrastructure outages. For example, in a hurricane that knocks out…

      Read More »
    • Post-Quantum Harvest Now Decrypt Later HNDL

      Harvest Now, Decrypt Later (HNDL) Risk

      "Harvest Now, Decrypt Later" (HNDL), also known as "Store Now, Decrypt Later" (SNDL), is a concerning risk where adversaries collect encrypted data with the intent to decrypt it once quantum computing becomes capable of breaking current encryption methods. This is the quantum computing's ticking time bomb, with potential implications for every encrypted byte of data currently considered secure.

      Read More »
    • Post-Quantum Post Quantum Cryptography PQC Challenges

      Post-Quantum Cryptography PQC Challenges

      The transition to post-quantum cryptography is a complex, multi-faceted process that requires careful planning, significant investment, and a proactive, adaptable approach. By addressing these challenges head-on and preparing for the dynamic cryptographic landscape of the future, organizations can achieve crypto-agility and secure their digital assets against the emerging quantum threat.

      Read More »
    • Post-Quantum Quantum Resistance Enterprise Changes

      Quantum Era Demands Changes to ALL Enterprise Systems

      In my work with various clients, I frequently encounter a significant misunderstanding about the scope of preparations required to become quantum ready. Many assume that the transition to a post-quantum world will be straightforward, involving only minor patches to a few systems or simple upgrades to hardware security modules (HSMs). Unfortunately, this is a dangerous misconception. Preparing for this seismic shift is far more complex…

      Read More »
    • Post-Quantum Bill of Materials BOM

      Bills of Materials for Quantum Readiness: SBOM, CBOM, and Beyond

      Quantum computing threat is forcing organizations to inventory their digital assets like never before. With powerful quantum attacks on the horizon, businesses must identify what they have - software, cryptography, sensitive data, hardware - before they can secure it. Security standards and government directives now urge a comprehensive cryptographic inventory as the first step toward quantum readiness. In practice, compiling these inventories is daunting. Modern…

      Read More »
    • Post-Quantum NIST PQC Technical

      Inside NIST’s PQC: Kyber, Dilithium, and SPHINCS+

      In 2022, after a multi-year evaluation, NIST selected CRYSTALS-Kyber, CRYSTALS-Dilithium, and SPHINCS+ as the first algorithms for standardization in public-key encryption (key encapsulation) and digital signatures. Kyber is an encryption/key-establishment scheme (a Key Encapsulation Mechanism, KEM) based on lattice problems, while Dilithium (also lattice-based) and SPHINCS+ (hash-based) are digital signature schemes.

      Read More »
    • Post-Quantum Post Quantum Digital Signatures

      The Future of Digital Signatures in a Post-Quantum World

      The world of digital signatures is at an inflection point. We’re moving from the familiar terrain of RSA and ECC into the new territory of lattices and hashes. It’s an exciting time for cryptography, and a critical time for security practitioners. Authentication, integrity, and non-repudiation are security properties we must preserve at all costs, even in the face of revolutionary computing technologies. With careful preparation,…

      Read More »