Understanding Post-Quantum
Post-Quantum Security
Quantum computing is advancing, and while experts are not sure when there will be a quantum computer powerful enough to break the RSA and ECC cryptographic algorithms that are currently in use, many are operating under the assumption that this can happen within a 10- to 15-year timeframe. This is a general timeline because there is no way to know when this will occur – it could happen sooner, or it could happen later.
Frequently Asked Quantum Questions
Are you struggling with knowing where to start in your post-quantum preparedness journey? Do you want to learn more about quantum computing, and how it will affect your industry?
View our guide to understanding post-quantum cryptography and encryption and answer your budding questions.
Quantum Threat Timeline
Although the timing of the quantum threat is unknown, it’s top of mind for security-conscious organizations. The Global Risk Institute recently surveyed leaders and experts of quantum science and technology to get their opinions on the likelihood and timing of the quantum threat to public-key cybersecurity. Some patterns emerged from their responses as seen in the illustration below.
Is quantum a threat to public-key cybersecurity?
Knowing the timeline of the threat being realized is within the decade, and knowing the transition to quantum-safe cryptography will take several years, the Global Risk Institute outlines 3 parameters for organizations to better understand their own level of readiness:
- The shelf-life time: the number of years the data should be protected for
- The migration time: the number of years needed to safely migrate the systems protecting that information
- The threat timeline (the focus of this report): the number of years before relevant threat actors can potentially access cryptographically relevant quantum computers
Organizations won’t be able to protect data from quantum attacks if the quantum threat timeline is shorter than the sum of the shelf-life and migration times.
Post-Quantum Resources
Regulations and Standards for Post-Quantum
Webinar Series: What is the State of the Quantum World?
Anyone who manages cybersecurity and wants to learn more about quantum computing will benefit from our webinar series. Watch the webinar recordings now.
Entrust Post-Quantum Solutions
Prepare your cryptographic assets for post-quantum by taking inventory, prioritizing your highest value assets, testing your quantum preparedness, and planning ahead to meet post-quantum cryptography standards. Entrust has a leading role in helping you improve your crypto-agility and creating solutions to support your migration into a post-quantum world.