🚨 New OMB Report on Post-Quantum Cryptography (PQC)🚨 The Office of Management and Budget (OMB) has released a critical report detailing the strategy for migrating federal information systems to Post-Quantum Cryptography. This report is in response to the growing threat posed by the potential future capabilities of quantum computers to break existing cryptographic systems. **Key Points from the Report:** 🔑 **Start Migration Early**: The report emphasizes the need to begin migration to PQC before quantum computers capable of breaking current encryption become operational. This proactive approach is essential to mitigate risks associated with "record-now-decrypt-later" attacks. 🔑 **Focus on High-Impact Systems**: Priority should be given to high-impact systems and high-value assets. Ensuring these critical components are secure is paramount. 🔑 **Identify Early**: It's crucial to identify systems that cannot support PQC early in the process. This allows for timely planning and avoids migration delays. 🔑 **Cost Estimates**: The estimated cost for this transition is approximately $7.1 billion over the period from 2025 to 2035. This significant investment underscores the scale and importance of the task. 🔑 **Cryptographic Module Validation Program (CMVP)**: To ensure the proper implementation of PQC, the CMVP will play a vital role. This program will validate that the new cryptographic modules meet the necessary standards. The full report outlines a comprehensive strategy and underscores the federal government’s commitment to maintaining robust cybersecurity in the quantum computing era. This is a critical step in safeguarding our digital infrastructure against future threats. #Cybersecurity #PQC #QuantumComputing #FederalGovernment #Cryptography #DigitalSecurity #OMB #NIST
Addressing Federal Quantum Technology Readiness Challenges
Explore top LinkedIn content from expert professionals.
Summary
Addressing federal quantum technology readiness challenges means preparing government systems to withstand threats posed by powerful future quantum computers, which could break today’s encryption and compromise sensitive data. This process involves transitioning to post-quantum cryptography, a new generation of security measures that can protect information even when quantum computers mature.
- Inventory cryptographic assets: Take stock of all encryption methods in use throughout your organization to pinpoint which systems are at risk and need updating.
- Adopt hybrid encryption: Combine classical and post-quantum cryptographic techniques during the transition to maintain security and compatibility across legacy systems.
- Prioritize high-impact systems: Focus your migration efforts on the most critical and sensitive systems first to ensure vital information is safeguarded against future quantum threats.
-
-
A recent comprehensive study, issued by Federal Office for Information Security (BSI) on the Status of #Quantum #Computer #Development provides a sober, evidence-based assessment of progress, risks, and timelines, particularly relevant for #cryptography, #cybersecurity, and strategic planning, with a focus on applications in #cryptanalysis. Key takeaways: • Quantum advantage is real, but still narrow Quantum computers have demonstrated advantage only on highly specialized benchmark problems. Broad, application-relevant superiority remains out of reach. • Cryptography is the primary strategic risk driver Shor’s algorithm continues to pose a credible long-term threat to RSA and elliptic-curve cryptography, while symmetric cryptography (e.g. AES) remains comparatively resilient with appropriate key lengths. • Fault tolerance is the true bottleneck Error rates not qubit counts are the dominant constraint. Scalable, fault-tolerant quantum computing requires massive overheads in error correction and infrastructure. • Leading hardware platforms are converging Superconducting qubits, trapped ions, and neutral atoms (Rydberg) currently lead the field, with rapid progress but no clear single winner. • #NISQ systems are not a near-term cryptographic threat Noisy Intermediate-Scale Quantum (NISQ) devices lack the depth and reliability needed for meaningful cryptanalysis, despite frequent hype. • A realistic timeline is emerging Based on verified advances in error correction, a cryptographically relevant quantum computer may be achievable in ~10–15 years—not decades, but not imminent either. • “Harvest now, decrypt later” remains a credible risk Sensitive data encrypted today may be vulnerable in the future, reinforcing the urgency of post-quantum cryptography migration. • Security preparedness must start now Transition planning, crypto-agility, standards development, and quantum-readiness assessments are no longer optional for governments and critical sectors. 👉 Bottom line: quantum computing is progressing steadily, not explosively, but its long-term implications for cybersecurity and digital trust demand early, structured, and risk-based action today. https://lnkd.in/eMui-D_W
-
🔑"𝐇𝐚𝐫𝐯𝐞𝐬𝐭 𝐍𝐨𝐰, 𝐃𝐞𝐜𝐫𝐲𝐩𝐭 𝐋𝐚𝐭𝐞𝐫" (𝐇𝐍𝐃𝐋) attacks intercept RSA-2048 or ECC-encrypted files, stockpiling them for future decryption. Once a powerful quantum computer comes online, they can unlock those archives in hours, exposing years’ worth of secrets. This silent threat targets everything from personal records to diplomatic communications. 🔐 📌 HOW CAN CYBERSECURITY LEADERS AND EXECUTIVES PREPARE? 🎯🎯𝐁𝐮𝐢𝐥𝐝 𝐂𝐫𝐲𝐩𝐭𝐨𝐠𝐫𝐚𝐩𝐡𝐢𝐜 𝐀𝐠𝐢𝐥𝐢𝐭𝐲: Ensure your systems can swiftly swap out cryptographic algorithms without extensive re-engineering. 𝐂𝐫𝐲𝐩𝐭𝐨-𝐚𝐠𝐢𝐥𝐢𝐭𝐲 𝐢𝐬 𝐭𝐡𝐞 𝐚𝐛𝐢𝐥𝐢𝐭𝐲 𝐭𝐨 𝐫𝐚𝐩𝐢𝐝𝐥𝐲 𝐭𝐫𝐚𝐧𝐬𝐢𝐭𝐢𝐨𝐧 𝐭𝐨 𝐮𝐩𝐝𝐚𝐭𝐞𝐝 𝐞𝐧𝐜𝐫𝐲𝐩𝐭𝐢𝐨𝐧 𝐬𝐭𝐚𝐧𝐝𝐚𝐫𝐝𝐬 𝐚𝐬 𝐭𝐡𝐞𝐲 𝐛𝐞𝐜𝐨𝐦𝐞 𝐚𝐯𝐚𝐢𝐥𝐚𝐛𝐥𝐞. Designing for agility now will let you plug in PQC algorithms (or other replacements) with minimal disruption later. 🎯𝐈𝐦𝐩𝐥𝐞𝐦𝐞𝐧𝐭 𝐇𝐲𝐛𝐫𝐢𝐝 𝐂𝐫𝐲𝐩𝐭𝐨𝐠𝐫𝐚𝐩𝐡𝐲: Do not wait for the full PQC rollout. 👉 𝐒𝐭𝐚𝐫𝐭 𝐮𝐬𝐢𝐧𝐠 𝐡𝐲𝐛𝐫𝐢𝐝 𝐞𝐧𝐜𝐫𝐲𝐩𝐭𝐢𝐨𝐧 𝐍𝐎𝐖! Combine classic schemes like ECDH or RSA with a post-quantum algorithm (e.g. a dual key exchange using ECDH + Kyber). 🎯𝐌𝐚𝐢𝐧𝐭𝐚𝐢𝐧 𝐚 𝐂𝐫𝐲𝐩𝐭𝐨𝐠𝐫𝐚𝐩𝐡𝐢𝐜 𝐁𝐢𝐥𝐥 𝐨𝐟 𝐌𝐚𝐭𝐞𝐫𝐢𝐚𝐥𝐬 (𝐂𝐁𝐎𝐌): 👉𝐈𝐧𝐯𝐞𝐧𝐭𝐨𝐫𝐲 𝐚𝐥𝐥 𝐜𝐫𝐲𝐩𝐭𝐨𝐠𝐫𝐚𝐩𝐡𝐢𝐜 𝐚𝐬𝐬𝐞𝐭𝐬 𝐢𝐧 𝐲𝐨𝐮𝐫 𝐨𝐫𝐠𝐚𝐧𝐢𝐳𝐚𝐭𝐢𝐨𝐧: algorithms, key lengths, libraries, certificates, and protocols. A CBOM provides visibility into where vulnerable algorithms (like RSA/ECC) are used and helps prioritize what to fix. 🎯🎯𝐀𝐥𝐢𝐠𝐧 𝐰𝐢𝐭𝐡 𝐍𝐈𝐒𝐓’𝐬 𝐐𝐮𝐚𝐧𝐭𝐮𝐦 𝐌𝐢𝐠𝐫𝐚𝐭𝐢𝐨𝐧 𝐑𝐨𝐚𝐝𝐦𝐚𝐩: Follow expert guidance for a structured transition. 𝐓𝐡𝐞 𝐔.𝐒. 𝐠𝐨𝐯𝐞𝐫𝐧𝐦𝐞𝐧𝐭 (𝐂𝐈𝐒𝐀, 𝐍𝐒𝐀, 𝐚𝐧𝐝 𝐍𝐈𝐒𝐓) 𝐚𝐝𝐯𝐢𝐬𝐞𝐬 𝐞𝐬𝐭𝐚𝐛𝐥𝐢𝐬𝐡𝐢𝐧𝐠 𝐚 𝐪𝐮𝐚𝐧𝐭𝐮𝐦-𝐫𝐞𝐚𝐝𝐢𝐧𝐞𝐬𝐬 𝐫𝐨𝐚𝐝𝐦𝐚𝐩, starting with a thorough cryptographic inventory and risk assessment. Keep abreast of NIST’s PQC standards timeline and recommendations. National Institute of Standards and Technology (NIST) #𝐇𝐍𝐃𝐋 Cyber Security Forum Initiative #CSFI 🗝️ Now is the time to future-proof your encryption! 🗝️ 𝑌𝑜𝑢 𝑠ℎ𝑜𝑢𝑙𝑑𝑛'𝑡 𝑎𝑠𝑠𝑢𝑚𝑒 𝑡ℎ𝑎𝑡 𝑦𝑜𝑢𝑟 𝑑𝑎𝑡𝑎 𝑖𝑠 𝑠𝑒𝑐𝑢𝑟𝑒 𝑗𝑢𝑠𝑡 𝑏𝑒𝑐𝑎𝑢𝑠𝑒 𝑖𝑡 𝑖𝑠 𝑒𝑛𝑐𝑟𝑦𝑝𝑡𝑒𝑑...
-
NIST – Migration to Post-Quantum Cryptography Quantum Readiness outlines a comprehensive framework for transitioning cryptographic systems to post-quantum cryptography (PQC) in response to the emerging threat of quantum computers. Quantum technology is advancing rapidly and poses a significant risk to current public-key cryptographic methods like RSA, ECC, and DSA. This guide aims to assist organizations in preparing for and implementing PQC to safeguard sensitive data and critical systems. Key Points The Quantum Threat Quantum computers are expected to disrupt cryptography by efficiently solving mathematical problems that underpin widely used encryption and key exchange methods. This would render current public-key systems ineffective in protecting sensitive data, emphasizing the need for cryptographic agility. NIST PQC Standards NIST is spearheading efforts to standardize quantum-resistant algorithms through an open competition and evaluation process. These algorithms, designed to withstand quantum attacks, focus on two primary areas: 1. Key Establishment: Protecting methods like Diffie-Hellman and RSA key exchange. 2. Digital Signatures: Securing authentication processes. Migration Framework The document provides a phased approach to migrating cryptographic systems to PQC: 1. Assessment Phase: - Inventory cryptographic dependencies in current systems. - Evaluate systems at risk from quantum threats based on sensitivity and lifespan. 2. Preparation Phase: - Conduct pilot testing of candidate PQC algorithms in existing infrastructure. - Develop a hybrid approach that combines classical and post-quantum algorithms to ensure interoperability during transition. 3. Implementation Phase: - Replace vulnerable cryptographic methods with PQC in a phased manner. - Ensure scalability, performance, and compatibility with existing systems. 4. Monitoring and Updates: - Continuously monitor the effectiveness of implemented solutions. Challenges in PQC Migration - Performance Impact: PQC algorithms often have larger key sizes, increased latency, and greater computational demands compared to classical algorithms. - Interoperability: Ensuring smooth integration with legacy systems poses significant technical challenges. Best Practices - Use hybrid encryption to maintain compatibility while testing PQC algorithms. - Engage in collaboration with vendors, industry groups, and government initiatives to align with best practices and standards. Conclusion The transition to post-quantum cryptography is a proactive measure to secure data and communications against future threats. NIST emphasizes the importance of starting preparations immediately to mitigate risks and ensure a smooth, efficient migration process. Organizations should focus on inventorying dependencies, piloting PQC solutions, and developing cryptographic agility to adapt to this transformative technological shift.
-
Reading A Practitioner’s Guide to Post-Quantum Cryptography from the Cloud Security Alliance made me pause. It highlights something many organizations still underestimate very often: modern cryptography was not designed for a future with cryptographically relevant quantum computers (CRQCs). This threat is also not theoretical. The risk comes from Store Now, Decrypt Later attacks, where encrypted data can be harvested today and broken once quantum capabilities mature. Time, not just technology, becomes the critical risk factor. Key highlights from the guide • Shor’s and Grover’s quantum algorithms threaten most public-key cryptography in use today, including RSA, Diffie-Hellman, and elliptic-curve algorithms • CRQCs may emerge by the early 2030s, putting long-term-value data at risk even if systems are secure today • Data confidentiality and integrity are both impacted by Store Now, Decrypt Later attacks • NIST published post-quantum cryptography standards in 2024 (FIPS-203, FIPS-204, FIPS-205), but enterprise adoption will take time and investment • Risk assessment must begin by identifying which data assets still hold value at “Q-Day,” not by blanket cryptographic replacement Who should take note • Security leaders responsible for long-term data protection strategies • Architects managing encryption for data at rest, data in transit, and non-repudiation • Compliance and governance teams evaluating regulatory and sector-specific quantum readiness requirements • Engineering teams responsible for cryptographic libraries, TLS, VPNs, KMS, and certificate management Why this matters Unlike most cyber threats, quantum risk is driven by time. Data intercepted today may be compromised years later. If enterprises wait until CRQCs arrive, it will already be too late for data with long-term value. At the same time, mitigation is costly, complex, and not yet fully supported by mainstream products. The path forward The guide emphasizes starting with disciplined risk assessment, identifying vulnerable cryptographic functions, and mapping technology components before committing to mitigation. Enterprises should periodically reassess risk, track technology maturity, and align mitigation efforts with CSA Cloud Controls Matrix guidance rather than rushing into premature or unnecessary changes.
-
Deloitte’s Global Quantum Cyber Readiness News & Insights hub consolidates thought #leadership, frameworks, and practical guidance to help organizations prepare for the disruptive #cybersecurity implications of quantum computing. At its core, the content emphasizes that while #quantum technologies unlock transformative capabilities, they also pose a systemic threat to current cryptographic systems, making proactive preparation imperative. A central theme is “quantum #risk”—the likelihood that future quantum computers could break widely used encryption, exposing sensitive #data. Deloitte highlights that this risk is not theoretical; adversaries may already be harvesting encrypted data today for future decryption (“harvest now, decrypt later”). The hub outlines a structured approach to readiness. Organizations are encouraged to begin with cryptographic discovery and inventory, identifying where #encryption is used and assessing vulnerabilities. This is followed by developing a migration roadmap toward post-quantum cryptography (PQC) and embedding crypto-agility, enabling systems to adapt quickly as standards evolve. Deloitte also stresses the importance of #governance and enterprise-wide #transformation. Quantum readiness is not solely a technical issue; it requires leadership awareness, cross-functional coordination, regulatory alignment, and continuous monitoring of emerging standards (e.g., National Institute of Standards and Technology (NIST) A key contribution is the Quantum Readiness Toolkit, developed with the World Economic Forum, which provides guiding principles and actionable steps. These include integrating quantum risk into enterprise risk management, educating stakeholders, prioritizing investments, and collaborating across ecosystems to address systemic vulnerabilities. Deloitte frames quantum cyber readiness as a strategic imperative. Early adopters can enhance #trust, #resilience, and market positioning, while delayed action increases exposure to significant operational, financial, and reputational risks in the emerging quantum era.
-
Quantum readiness is less about sudden disruption and more about cultivating skills, forging collaborations, and aligning strategies with evolving standards, so that businesses can gradually integrate these technologies into their long-term transformation paths. We should see quantum computing as a journey that requires methodical preparation. Finance, logistics, chemistry, and cybersecurity are already experimenting with hybrid models that combine classical and quantum systems. These early steps show that the transition will not happen overnight, but through structured phases of learning and integration. The priority for leaders is to identify processes where quantum can create measurable improvements. This means feasibility studies, pilots, and a roadmap that integrates quantum into IT environments in a sustainable way. At the same time, teams need training in principles, tools, and algorithms, because without this foundation, the technology remains an abstract concept. Collaboration is another essential layer. Partnerships with research hubs, vendors, and cloud providers open access to quantum resources that would otherwise remain out of reach. Alongside this, governance and security must advance with post-quantum standards, ensuring compliance and ethics are never secondary. The real challenge is continuous adaptation. Regulations and technologies will evolve, and strategies must remain flexible. This long-term perspective will define the organizations that are prepared to grow with the next wave of innovation. #QuantumComputing #DigitalTransformation #FutureOfWork
-
I’ve been getting invited to more and more board briefings lately to help unpack the growing quantum threat. It’s clear that awareness is rising at the top. But so is confusion. In many of those awareness efforts, board members are flooded with confusing or even conflicting messages. Some invited experts dive deep into algorithmic details or lose the room in acronyms. Others focus entirely on guessing if and when quantum computers will arrive - as if that’s still the right question. So I wanted to cut through the noise. In the linked article, I’ve tried to distill the core issues boards need to understand. Based on lessons learned from many such discussions. Just the strategic context, the governance implications, and the questions directors should be asking their CIOs, CISOs, and CROs right now. Because here’s the bottom line: the entire ecosystem is already moving towards proactive preparation against the quantum threat. Regulators are issuing quantum-aware cyber guidances and requirements. Insurers are reassessing risk models. Clients are evaluating vendors’ quantum readiness. And yes, shareholders and analysts have started asking about quantum risk readiness in earnings calls. At this point, debating when quantum computers will actually arrive is beside the point. The governance and risk management response needs to start now whether quantum computers arrive in five or in fifteen years. This one’s for board members and senior executives looking to lead, not follow. #quantum #quantumcomputing #quantumthreat #quantumreadiness #pqc #quantumresilience #quantumresistance #cyber #cyberrisk
-
Most encryption standards today weren’t designed with quantum in mind. That’s a problem. Because quantum computing isn’t decades away anymore—it's advancing faster than most CISOs are prepared for. RSA-2048 and ECC, the backbone of digital security, will crumble under quantum algorithms like Shor’s. Even a moderately capable quantum computer could decrypt what would take classical systems thousands of years—in minutes. In 2022, a Chinese team used a 62-qubit quantum computer to complete in 1.2 hours what would’ve taken a supercomputer over 8 years. We’re no longer speculating. We’re racing. The real threat is 𝐇𝐚𝐫𝐯𝐞𝐬𝐭-𝐧𝐨𝐰, 𝐝𝐞𝐜𝐫𝐲𝐩𝐭-𝐥𝐚𝐭𝐞𝐫. Nation-states are already collecting encrypted data today, waiting for quantum maturity to crack it open. So, what should forward-looking CISOs prioritize? → Map all legacy cryptographic assets—SSL/TLS, VPNs, PKI, certificates, blockchains. → Begin pilot programs with NIST-approved post-quantum algorithms (Kyber, Dilithium, Falcon). → Engage vendors about hybrid encryption adoption. → Build executive-level awareness around long-term data protection risks. Quantum isn’t just another infosec challenge—it’s a paradigm shift. By the time the threat becomes real-time, it’ll already be too late to react. #CyberSecurity #InfoSec #CISO #DataSecurity #QuantumComputing
-
As we enter the International Year of Quantum Science and Technology, we speak passionately—and rightly so—about the need to transcend borders and promote knowledge-sharing. While these principles hold immense value, we cannot overlook national security and intellectual property protection. As with most things, the answer is not black and white—it requires a delicate balance. The duty remains for us to: ⚇ promote open access to knowledge as a fundamental human right ⚇ focus on initiatives with societal impact, especially those aligned with the United Nations' SDGs ⚇ ensure preparedness by implementing security safeguards, such as those outlined by National Institute of Standards and Technology (NIST) The Center for a New American Security (CNAS) report, written by Dr. Constanza M. Vidal Bustamante, Ph.D., lays out this challenge clearly. U.S. quantum leadership depends on balancing openness with security. The report calls for: ⚇ reauthorizing the National Quantum Initiative Act ⚇ accelerating quantum sensor deployment for national security ⚇ addressing export control gaps to safeguard IP from strategic competitors Yet, U.S. deep tech investment remains volatile. While new quantum funding is being proposed, other critical research areas—such as biomedical science—face budget cuts, as seen with the recent NIH funding reduction. However, the recently announced U.S. Department of Energy (DOE) Quantum Leadership Act of 2025, though awaiting congressional approval, could help stabilize funding—if passed. Yet, the fate of this bill highlights a larger issue: without sustained legislative commitment, quantum investment remains at the mercy of political cycles. If passed, the bill would: ⚇ authorize $2.5 billion+ in quantum research funding over five years ⚇ expand DoE r&d programs through 2030 ⚇ address supply chain challenges ⚇ support workforce development ⚇ strengthen interagency coordination Zooming out, the real challenge isn’t just whether we invest in quantum—it’s how we build a cohesive, long-term strategy that: ⚇ promotes scientific discovery ⚇ develops talent ⚇ ensures research translates into real-world impact Without this, the U.S. risks short-term funding cycles that stifle innovation, rather than reinforcing technological leadership. The International Year of Quantum is a call to act with foresight. We must prioritize open-access initiatives that drive meaningful global impact, while proactively implementing security measures to move forward with preparedness, not just ambition. #QuantumTechnology #DeepTech #Innovation #Policy #OpenScience #NationalSecurity
Explore categories
- Hospitality & Tourism
- Productivity
- Finance
- Soft Skills & Emotional Intelligence
- Project Management
- Education
- Leadership
- Ecommerce
- User Experience
- Recruitment & HR
- Customer Experience
- Real Estate
- Marketing
- Sales
- Retail & Merchandising
- Science
- Supply Chain Management
- Future Of Work
- Consulting
- Writing
- Economics
- Artificial Intelligence
- Employee Experience
- Healthcare
- Workplace Trends
- Fundraising
- Networking
- Corporate Social Responsibility
- Negotiation
- Communication
- Engineering
- Career
- Business Strategy
- Change Management
- Organizational Culture
- Design
- Innovation
- Event Planning
- Training & Development