Post-Quantum, PQC, Quantum Security

PostQuantum.com – Industry news and blog on Quantum Computing, Quantum Security, PQC, Post-Quantum, AI Security

  • Post-Quantum Cryptograpy PQC

    Post-Quantum Cryptography (PQC) Introduction

    Post-Quantum Cryptography (PQC) refers to cryptographic algorithms (primarily public-key algorithms) designed to be secure against an attack by a future quantum computer. The motivation for PQC is the threat that large-scale quantum computers pose to current cryptographic systems. Today’s widely used public-key schemes – RSA, Diffie-Hellman, and elliptic-curve cryptography –…

    Read More »
  • Failures Quantum Readiness

    Common Failures in a Quantum Readiness Program

    Even well-run quantum readiness programs can stumble. Here are some common pitfalls in crypto-agility/PQC efforts and how to avoid them: Treating PQC as a simple library or drop-in swap. Perhaps the biggest mistake is underestimating the ecosystem changes required. Simply implementing a PQC algorithm in code but ignoring the surrounding…

    Read More »
  • Manual Cryptographic Inventory

    Dos & Don’ts of Crypto Inventories for Quantum Readiness

    Relying on asset owners, developers or IT personnel to identify and report in interviews or survey responses every instance of cryptographic usage is not just impractical; it simply does not work...

    Read More »
  • Plan Quantum Readiness

    Planning the First Year of a Quantum Readiness Program

    Embarking on a quantum readiness program can be daunting, so it’s helpful to break it into phases with concrete goals. Below is a pragmatic 12-month plan (roughly divided into phases) that a CISO-led team could follow. Based on a medium-size financial services company. This assumes you’re starting from little/no quantum…

    Read More »
  • Glossary Quantum Computing Cybersecurity

    Glossary of Quantum Computing Terms

    Glossary of Quantum Computing, Quantum Networks, Quantum Mechanics, and Quantum Physics Terms for Cybersecurity Professionals.

    Read More »
  • Telecommunications 5G Cryptography Quantum

    Cryptography in a Modern 5G Call: A Step-by-Step Breakdown

    Modern telecommunications networks rely on multiple layers of cryptography at every step of a call or data session. Understanding the complexity of the process and the amount of cryptography involved is critical for post-quantum migration planning - an initiative some of my advanced telecommunications clients are kicking off these days.…

    Read More »
  • Ready for Quantum

    Ready for Quantum: Practical Steps for Cybersecurity Teams

    “How do we actually get started and secure the budget for this, now?”. This comprehensive guide is the answer: a practical, step-by-step playbook for launching and running a quantum security program, updated with the latest lessons on budgeting, cryptographic inventory, risk mitigation workarounds, challenges of post-quantum migration, and achieving crypto-agility…

    Read More »
  • Next-Gen QKD

    Next-Generation QKD Protocols: A Cybersecurity Perspective

    Traditional QKD implementations have demonstrated provably secure key exchange, but they come with practical limitations. To address these limitations, researchers have developed next-generation QKD protocols. These advanced protocols improve security by reducing trust assumptions and mitigating device vulnerabilities, and they enhance performance (key rate, distance) through novel techniques. The article…

    Read More »
  • Tokenization Quantum

    Evaluating Tokenization in the Context of Quantum Readiness

    As the quantum era approaches, organizations face the daunting task of protecting their sensitive data from the looming threat of quantum computers. These powerful machines have the potential to render traditional cryptographic methods obsolete, making it imperative to explore innovative strategies for quantum readiness. One often overlooked yet highly promising…

    Read More »
  • Quantum Telecommunications Security

    Quantum Computing – Looming Threat to Telecom Security

    Since the early 2000s, the field of quantum computing has seen significant advancements, both in technological development and in commercialization efforts. The experimental demonstration of Shor's algorithm in 2001 proved to be one of the key catalyzing events, spurring increased interest and investment from both the public and private sectors.

    Read More »
  • D-Wave Dilution Refrigerator Quantum Annealer

    Adiabatic Quantum Computing (AQC) and Impact on Cyber

    Adiabatic Quantum Computing (AQC), and its variant Quantum Annealing, are another model for quantum computation. It's a specialized subset of quantum computing focused on solving optimization problems by finding the minimum (or maximum) of a given function over a set of possible solutions. For problems that can be presented as…

    Read More »
  • CRQC Readiness Benchmark Proposal

    CRQC Readiness Index Proposal

    This proposal outlines a composite, vendor‑neutral “CRQC Readiness” indicator. It intentionally avoids one‑number vanity metrics (like only counting qubits) and instead triangulates from three ingredients that actually matter for breaking today’s crypto: usable (logical) qubits, error‑tolerant algorithm depth, and sustained error‑corrected operations per second.

    Read More »
  • FIPS 140 Cryptography

    Understanding FIPS 140: A Cornerstone of Cryptographic Security

    FIPS 140 (Federal Information Processing Standard 140) is a U.S. government computer security standard that specifies security requirements for cryptographic modules - the hardware or software components that perform encryption and other cryptographic functions. In simpler terms, FIPS 140 sets the ground rules for how encryption engines (in everything from…

    Read More »
  • Vendor Quantum Fear-Mongering

    Stop the Quantum Fear-Mongering – It Helps No One

    Fear sells - or so some vendors seem to think. For decades, a steady drumbeat of ominous warnings has proclaimed that a cryptography-breaking quantum computer is just around the corner. At security conferences and in sales pitches, I’ve had vendors lean in and whisper dramatic claims: “A friend at Fort…

    Read More »
  • Entanglement-Based QKD

    Entanglement-Based QKD Protocols: E91 and BBM92

    While prepare-and-measure QKD currently leads the market due to simplicity and higher key rates, entanglement-based QKD protocols like E91 and BBM92 are at the heart of next-generation quantum communications. Ongoing improvements in photonic technology are steadily closing the gap in performance. The additional security guarantees (e.g., tolerance of untrusted devices)…

    Read More »