🔐Word o’ the Day | Year | Decade: Crypto-agility, Baby! Yesterday morning, I did a fun fireside chat with Bethany Gadfield - Netzel at the FIA, Inc. Expo in Chicago. We talked about cyber resilience, artificial intelligence, Rubik’s cubes, and that thing called quantum! A question came up at the end, “What can firms actually do today to begin transitioning to post-quantum cryptography?” So thought I would take the opportunity to share my thoughts more broadly on this important, but not super well understood, topic: 1. Don’t wait. The clock for quantum-safe cryptography is already ticking. NIST released its first set of post-quantum standards last year (https://lnkd.in/esTm8uPw) and CISA put out a “Strategy for Migrating to Automated Post-Quantum Discovery and Inventory Tools” last year as part of its broader Post Quantum Cryptography (PQC) Initiative (https://lnkd.in/evpF4umv). h/t Garfield Jones, D.Eng.! 2. Inventory & prioritize. Map all cryptographic usage: what keys, certificates, protocols, and data streams exist today? Which assets hold long-lived value and are at risk of “harvest-now, decrypt-later”? Build a migration roadmap that prioritizes highest-risk systems (e.g., financial settlement platforms, inter-bank links, legacy encryption). 3. Establish crypto-agility. Ensure your architecture supports swapping algorithms, updating certificates, & layering classical + post-quantum primitives without a full system rebuild. This kind of flexibility is key for resilience. 4. Pilot and migrate. Use the new NIST-approved algorithms; experiment first on less time-sensitive systems, validate performance and interoperability, then scale to mission-critical applications. NIST’s IR 8547 report provides a framework for this transition. 5. Vendor & supply-chain alignment. Ask your vendors & service providers: “What’s your PQC transition plan? When will you support NIST-approved post-quantum algorithms? Are your update paths crypto-agile?” If the answer isn’t clear or (as a former boss of mine used to say) they look at you like a “pig at a wristwatch,” you’ve got a potentially serious third-party risk. 6. Board and Exec engagement. Position this not as an IT problem but a fiduciary risk and resilience imperative. The transition to quantum-safe cryptography is multi-year and multi-layered—waiting until it’s urgent means it will be too late.
When to Adopt Quantum-Safe Algorithms in Engineering
Explore top LinkedIn content from expert professionals.
Summary
Quantum-safe algorithms are cryptographic methods designed to withstand attacks from quantum computers, which are expected to break today’s standard encryption within the next decade. Engineers and organizations should start planning now to transition to these new security measures, as quantum advances are accelerating and waiting increases the risk of sensitive data being compromised in the future.
- Assess your assets: Map out where your organization uses encryption and identify which systems and data are most at risk from future quantum threats.
- Start early migration: Begin piloting and integrating quantum-safe algorithms alongside current encryption, especially for critical infrastructure or long-lived sensitive information.
- Engage leadership: Make quantum-safe planning a priority at the executive level, emphasizing the business and security risks of delaying action.
-
-
Quantum computing is moving from "science fiction" to "business reality" faster than most predicted. Two recent papers have fundamentally shifted the timeline for when we need to care about Quantum-Safe security: 1️⃣ The "10,000 Qubits" Milestone: New research shows that we can execute Shor’s algorithm—the math that breaks today’s encryption—with far fewer resources than previously thought. By using reconfigurable atomic qubits, the hardware requirements for cracking RSA-2048 have dropped by nearly 20x. 2️⃣ The "9-Minute" Crypto Warning: Google’s latest whitepaper highlights a terrifying reality for digital assets. Under advanced quantum scenarios, the encryption protecting a cryptocurrency wallet could be cracked in under 10 minutes. This puts billions in "dormant" assets at immediate risk of "at-rest" attacks. The Bottom Line: The "Q-Day" window is shrinking. It’s no longer about if a quantum computer can break your encryption, but when your current migration timeline will run out. How do we respond? We can't just flip a switch on "Q-Day." For many organizations, becoming quantum safe is a multi-year journey. This is where Palo Alto Networks Quantum-Safe Security comes in. Instead of a manual, multi-year overhaul, we provide a path to Agentic Resilience: - Continuous Discovery: It automatically maps your "cryptographic bill of materials" (CBOM), identifying exactly where vulnerable RSA and ECC algorithms are hiding in your network. - Risk Prioritization: It correlates your encryption strength with business criticality, telling you exactly which high-value assets need to move to Post-Quantum Cryptography (PQC) first. - Real-Time Remediation: For legacy systems that can’t be easily upgraded, a "Quantum-Safe Proxy" re-encrypts vulnerable traffic into post-quantum algorithms (like ML-KEM) at the network edge. The transition to a quantum-safe future is a marathon, but the starting gun has already fired. Learn how to take your first steps at the link in the comments.
-
⏳ 𝗤𝘂𝗮𝗻𝘁𝘂𝗺 𝗖𝗼𝗺𝗽𝘂𝘁𝗶𝗻𝗴 𝗮𝗻𝗱 𝗖𝗿𝘆𝗽𝘁𝗼𝗴𝗿𝗮𝗽𝗵𝘆: 𝗧𝗵𝗲 𝗧𝗶𝗺𝗲𝗹𝗶𝗻𝗲 𝗜𝘀 𝗦𝗵𝗿𝗶𝗻𝗸𝗶𝗻𝗴 𝗖𝗹𝗲𝗮𝗿 𝗣𝗮𝘁𝗵 𝘁𝗼 𝗖𝗿𝘆𝗽𝘁𝗮𝗻𝗮𝗹𝘆𝘁𝗶𝗰 𝗥𝗲𝗹𝗲𝘃𝗮𝗻𝗰𝗲 The Bundesamt für Sicherheit in der Informationstechnik (BSI) analysis is clear: Quantum computing is progressing steadily toward cryptanalytic relevance. The technical path is established: fault-tolerant Shor algorithms on superconducting systems with surface codes or ion-based systems with color codes. In 2024, key obstacles were removed. Quantum error correction works. Fault-tolerant computation is real. What remains is large-scale engineering. 𝗪𝗵𝘆 𝘁𝗵𝗲 “𝟮𝟬-𝗬𝗲𝗮𝗿” 𝗡𝗮𝗿𝗿𝗮𝘁𝗶𝘃𝗲 𝗜𝘀 𝗪𝗿𝗼𝗻𝗴 Error-correction break-even across several platforms in 2024–2025 invalidates the claim that relevant quantum computers are always decades away. A conservative estimate now points to around 15 years. This matches observed qubit growth and implies that systems with roughly one million qubits could be available in that timeframe, which is sufficient for cryptographic attacks. 𝗔 𝗦𝘁𝗿𝗮𝗶𝗴𝗵𝘁𝗳𝗼𝗿𝘄𝗮𝗿𝗱 𝗦𝗰𝗮𝗹𝗶𝗻𝗴 𝗧𝗶𝗺𝗲𝗹𝗶𝗻𝗲 The same result emerges from a modular view. Five years to design a scalable platform. Five years to produce and integrate modules. Five years to operate at full scale and quality. This is a scaling problem, not a scientific unknown. 𝗪𝗵𝗮𝘁 𝗖𝗼𝘂𝗹𝗱 𝗦𝗵𝗼𝗿𝘁𝗲𝗻 𝘁𝗵𝗲 𝗧𝗶𝗺𝗲𝗹𝗶𝗻𝗲 Advances in qLDPC codes, error mitigation, and neutral-atom platforms could reduce the horizon further. Ten years is no longer unrealistic. 𝗨𝗻𝗰𝗲𝗿𝘁𝗮𝗶𝗻𝘁𝘆 𝗜𝘀 𝗦𝘁𝗿𝘂𝗰𝘁𝘂𝗿𝗮𝗹 Multiple hardware platforms progress in parallel. Companies protect core technology. Some work happens in stealth mode. National security plays a role. A hidden qualitative leap seems unlikely today, but cannot be excluded. 𝗤-𝗗𝗮𝘆 𝗮𝗻𝗱 𝘁𝗵𝗲 𝗛𝗡𝗗𝗟 𝗥𝗶𝘀𝗸 To stay on the safe side, Q-Day planning should assume a horizon of no more than 10 years, especially for nation-state actors and cyber agencies. AI will accelerate engineering, scaling, and cryptanalysis. This increases the risk that Q-Day arrives earlier than expected. The HNDL threat—harvest now, decrypt later—is already active. Sensitive data intercepted today can be decrypted in the future. This affects critical infrastructure, government systems, and industrial communication with long confidentiality lifetimes. Protection must start now. This requires crypto-agile architectures and the early deployment of hybrid schemes combining classical and post-quantum cryptography. 𝗜𝗺𝗽𝗹𝗶𝗰𝗮𝘁𝗶𝗼𝗻𝘀 𝗳𝗼𝗿 𝗖𝗿𝘆𝗽𝘁𝗼𝗴𝗿𝗮𝗽𝗵𝗶𝗰 𝗜𝗻𝗳𝗿𝗮𝘀𝘁𝗿𝘂𝗰𝘁𝘂𝗿𝗲 Post-quantum migration is no longer optional. Waiting increases risk. 𝗢𝘂𝗿 𝗔𝗻𝗮𝗹𝘆𝘀𝗶𝘀 𝗳𝗼𝗿 𝘁𝗵𝗲 𝗗-𝗦𝘁𝗮𝗰𝗸 We at Spherity assessed these risks and transition paths for the German D-Stack, with a focus on crypto agility and long-term resilience: https://lnkd.in/eTJT4erD
-
As we close out 2024, it’s natural to think about what’s next. For me, one trend stands out above the rest: the urgency of preparing for a post-quantum world. Google's recent Willow chip announcement is yet another indicator that quantum computing is advancing rapidly, and the cryptographic algorithms we rely on to secure digital identities and critical systems are nearing their expiration date. This isn’t just a security concern—it’s a business imperative that impacts trust, continuity, and resilience. Just last month, the National Institute of Standards and Technology (NIST) released its roadmap for transitioning to post-quantum cryptography (PQC). The timeline is clear: by 2030, organizations must be quantum-ready. For business leaders, 2025 will be a pivotal year to take action. Forward-thinking leaders will elevate PQC from an IT initiative to a boardroom priority. Here’s how to lead the charge: 🔑 Understand the risk: Identify which systems, identities, and sensitive data are vulnerable to the quantum threat. 🔑 Educate your board: Build awareness with your leadership team about why quantum-safe cryptography matters—and why it matters NOW. 🔑 Take inventory: Pinpoint where your cryptographic assets live and assess what needs to evolve. 🔑 Develop your roadmap: Create a strategic plan to transition to PQC before the window of opportunity closes. 2025 isn’t the year to react—it’s the year to prepare. The shift to quantum-safe cryptography is inevitable. The question is: Will your organization be ahead of the curve or playing catch-up? I’d love to hear from other leaders—how are you bringing this critical conversation into your boardroom? Let’s share strategies and lessons to ensure we’re all ready for what’s next. #PostQuantum #PQC #CybersecurityLearders #DigitalTrust #Leadership
-
The era of quantum computing is closer than we think, and it’s going to change the foundations of digital security. NIST’s recent draft publication, NIST IR 8547 (link in 1st comment), outlines critical steps organizations must take to transition to post-quantum cryptography (PQC). Why This Matters Now ⏩ Quantum computers will eventually break traditional encryption algorithms like RSA and ECC. While secure today, these systems won’t be once quantum systems mature. NIST’s Post-Quantum Standards ⏩ NIST has selected algorithms like CRYSTALS-Kyber (for key establishment) and CRYSTALS-Dilithium (for digital signatures) to lead the transition. What Organizations Should Do ⏩ Inventory Cryptography: Assess where and how cryptographic algorithms are used. ⏩ Test PQC Algorithms: Experiment with hybrid solutions combining classical and quantum-safe algorithms. ⏩ Engage with Vendors: Ensure tech partners are preparing for PQC compatibility. Challenges Ahead ⏩ Performance trade-offs: Some PQC algorithms require more computational resources. ⏩ Interoperability: Integrating new cryptographic methods into legacy systems isn’t trivial. ⏩ Timeline pressure: The longer you delay, the harder it will be to catch up. The message is clear: preparation can’t wait. The organizations that start now will be in a much better position when the quantum era fully arrives.
-
IS YOUR ENTERPRISE READY FOR "Q-DAY"? "Q-day" (or Quantum Day) is the point in time when quantum computers become powerful enough to break the public-key encryption (like RSA or ECC) that currently secures global digital, financial, and government infrastructure. Our current best estimates is that Q-Day will happen by 2029! Huge thanks to Dr. Rob Campbell, FBBA. , IBM Global Quantum-Safe Executive and IBM Quantum Ambassador, for guest lecturing to our University of Arkansas - Sam M. Walton College of Business EMBA students. His insights into the "Quantum-Safe" transition provided a crucial roadmap for how leadership must navigate the next few years of cybersecurity. Here's what we learned: Adversaries are currently collecting encrypted data to store and decrypt once quantum computers are powerful enough to calculate private keys—a strategy known as "Harvest now, decrypt Later". Because enterprise cryptographic migrations can take 5 to 15+ years, many large organizations will still be in transition when quantum computers become capable of breaking current encryption. What enterprises can do NOW: Dr. Campbell emphasized that Post-Quantum Cryptography (PQC) is a leadership issue, not just a technical one. To preserve trust and resilience, leaders should authorize these "low-regret" actions immediately: - Inventory cryptographic dependencies: identify what you have before you plan what to change. - Prioritize high-value data: Focus on data with the longest confidentiality horizons, not just the most "critical" systems. - Invest in crypto-agility: Design systems for the permanent ability to swap algorithms without rebuilding the entire architecture. - Pilot PQC today in non-mission critical systems: PQC standards were finalized by NIST in 2024 and are ready for deployment on classical computers now. Enterprises can learn in these lower risk systems. - Communicate metrics to boards in non-technical jargon. Dr. Campbell noted, the question is whether we manage this change deliberately now or inherit it under pressure later. He stressed the importance of wide-spread education. To that end, Professor Daniel Conway will be offering the Walton College's first Quantum Computing class this fall! Adam Stoverink, Ph.D.; Shaila Miranda; Brian Fugate; Brent D. Williams; James Allen Regenor, Col USAF(ret) #QuantumSafe #PQC #CyberSecurity #Leadership #EMBA #DigitalTransformation #RiskManagement
Explore categories
- Hospitality & Tourism
- Productivity
- Finance
- Soft Skills & Emotional Intelligence
- Project Management
- Education
- Leadership
- Ecommerce
- User Experience
- Recruitment & HR
- Customer Experience
- Real Estate
- Marketing
- Sales
- Retail & Merchandising
- Science
- Supply Chain Management
- Future Of Work
- Consulting
- Writing
- Economics
- Artificial Intelligence
- Employee Experience
- Healthcare
- Workplace Trends
- Fundraising
- Networking
- Corporate Social Responsibility
- Negotiation
- Communication
- Engineering
- Career
- Business Strategy
- Change Management
- Organizational Culture
- Design
- Innovation
- Event Planning
- Training & Development