Industry Standards for Security & Trust
Post-Quantum Cryptography is a term to describe cryptography that will be resistant to attacks from large-scale quantum computers.
Post-Quantum cryptography (PQC) is important because large scale quantum computers will be able to break the public-key cryptography that is used to protect our data and communications today. RSA and ECC, on which current digital certificates are based, will no longer be secure in the presence of a cryptographically relevant quantum computer (CRQC).
The potential for future large-scale quantum computers with the capabilities to break many of the public-key cryptosystems currently in use would seriously compromise the confidentiality and integrity of digital communications on the Internet and elsewhere. Organizations that have not prepared for post-quantum cryptography will be left scrambling to secure their website domains, servers and other PKI infrastructure.
It is important to keep in mind that it will be necessary to switch to PCQ before a CRQC is available. Antagonistic actors can perform a harvest-now-decrypt-later attack on data. They can store all encrypted data now and when a large enough quantum computer is availalbe decrypt the data. The date to switch to PQC that protects data that is transfered over public channels isn’t the data a CRQC is available it is the number of years the data should be secured minus the time until a CRQC is ready. Since the date for when such a quantum computer will be available is unknown, NIST has suggested 2030 as the soft transition date with 2035 being the hard cuttof for current public-key cryptograhy.
Preparing for future security threats like post-quantum cryptography is critical for organizations that are trusted with private or sensitive information and personal data. By being prepared, organizations can increase the trust of their site visitors, customers and others who are sharing private information with their website. In addition, businesses can protect their own assets and reputation from being compromised or damaged and the potential financial impact of those scenarios.
The most-trusted global provider of high-assurance TLS/SSL, PKI, IoT and signing solutions.Ìý
© 2025 ¶ºÒõ¹Ý. All rights reserved.
Legal Repository Audits & Certifications Terms of Use Privacy Center Accessibility Cookie Settings