🚨 NEW PEER-REVIEWED RESEARCH: PQC Migration Timelines Excited to share my latest paper published in MDPI Computers: "Enterprise Migration to Post-Quantum Cryptography: Timeline Analysis and Strategic Frameworks." The transition to Post-Quantum Cryptography (PQC) represents a watershed moment in the history of our digital civilization. Organizations planning for a 3-5 year "upgrade" will fail. The reality is a 10-15-year systemic transformation. Key Contributions: 📊 Realistic Timeline Estimates by Enterprise Size: Small (≤500 employees): 5-7 years Medium (500-5K): 8-12 years Large (>5K): 12-15+ years ⚠️ Critical Finding: With FTQC expected 2028-2033, large enterprises face a 3-5 year vulnerability window—migration may not complete before quantum computers break RSA/ECC. 🔬 Novel Framework Analysis: Causal dependency mapping (HSM certification, partner coordination as critical paths) "Zombie algorithm" maintenance overhead quantified (20-40%) Zero Trust Architecture implications for PQC 💡 Practical Guidance: Crypto-agility frameworks and phased migration strategies for immediate action. Strategic Recommendations for Leadership: 1. Prioritize by Data Value, Not System Criticality: Invert the traditional triage model. Systems protecting long-lived data (IP, PII, Secrets) must migrate first, regardless of their operational uptime criticality, to mitigate SNDL. 2. Fund the "Invisible" Infrastructure: Budget immediately for the expansion of PKI repositories, bandwidth upgrades, and HSM replacements. These are long-lead items that cannot be rushed. 3. Establish a Crypto-Competency Center: Do not rely solely on generalist security staff. Invest in specialized training or retain dedicated PQC counsel to navigate the mathematical and implementation nuances. The talent shortage will only worsen. 4. Demand Vendor Roadmaps: Contractual language must shift. Procurement should require vendors to provide binding roadmaps for PQC support. "We are working on it" is no longer an acceptable answer for critical supply chain partners. 5. Embrace Hybridity: Accept that the future is hybrid. Design architectures that can support dual-stack cryptography indefinitely, viewing it not as a temporary bridge but as a long-term operational state. 6. Implement Automated Discovery: You cannot migrate what you cannot see. Deploy automated cryptographic discovery tools to continuously map the cryptographic posture of the estate, identifying shadow IT and legacy instances that manual surveys miss. The quantum clock is ticking. Start planning NOW. https://lnkd.in/eHZBD-5Y 📄 DOI: https://lnkd.in/ejA9YpsG #PostQuantumCryptography #Cybersecurity #QuantumComputing #PQC #InfoSec #NIST #CryptoAgility
Timeline for Quantum-Safe Cryptography Adoption
Explore top LinkedIn content from expert professionals.
Summary
The timeline for quantum-safe cryptography adoption refers to the years-long process organizations must undertake to replace current encryption methods with new systems resistant to quantum computer attacks. This transition is urgent because, once quantum computers are powerful enough, they could break the cryptography protecting sensitive data, making today’s encrypted information vulnerable in the future.
- Start early planning: Begin mapping out all cryptographic dependencies in your organization now, so you’re ready to transition when new standards are required.
- Prioritize long-lived data: Focus migration efforts first on data that needs to remain confidential for a decade or more, since attackers can harvest it today and decrypt it later.
- Embrace hybrid solutions: Build systems that support both classical and quantum-safe encryption, allowing for a gradual migration and stronger protection during the transition.
-
-
A recent FS-ISAC position paper on Post-Quantum Cryptography timelines reinforces a hard truth many security teams are still underestimating: The biggest risk is not quantum computers. It’s crypto procrastination. The paper (link in comments) lays it out clearly. Migration timelines for cryptography are measured in years, data shelf life is measured in decades, and waiting for “perfect clarity” on PQC algorithms compresses everything into an unworkable window. A few key takeaways every security and risk team should internalize: 1️⃣ Crypto agility is the real control The paper is explicit: organizations need architectures that can change algorithms without rewriting applications or redeploying systems. Waiting for final PQC standards is a losing strategy. 2️⃣ 2030–2031 is not far away RSA-2048 deprecation is coming. Regulators expect critical use cases to be migrated or actively transitioning by then. 3️⃣ 2035 is the hard stop Most global regulators align on disallowing classical public-key cryptography by 2035. This is no longer speculative. 4️⃣ Dependencies will slow everyone down Vendors, financial market infrastructure, standards bodies, and “slow movers” all introduce drag. Firms that aren’t agile will be gated by the least-prepared link in the chain. What’s notable is that FS-ISAC frames crypto agility not as a future capability, but as a current risk management requirement. This applies not just to TLS and certificates, but to data itself. If your most sensitive data needs to remain confidential for 10–20 years, you cannot afford a protection model that assumes one algorithm, one migration, or one big-bang re-encryption event. At Ubiq, this is exactly the problem we designed for (blog in comments): - Cryptography is policy-driven, not hardcoded - Algorithms and keys can evolve without application or system changes - Data can be re-protected incrementally, not all at once - Multiple generations of crypto can safely coexist during long transitions Post-quantum resilience is not about betting on the right algorithm today. It’s about making sure you can change tomorrow. And the clock is already running.
-
𝗪𝗵𝗶𝗹𝗲 𝘄𝗲'𝗿𝗲 𝗮𝗹𝗹 𝘁𝗮𝗹𝗸𝗶𝗻𝗴 𝗮𝗯𝗼𝘂𝘁 𝗔𝗜... Two research papers published last week put the quantum threat timeline closer than anyone planned for. Specifically, Google has set a 2029 target for migrating its systems to post-quantum cryptography, ahead of NIST's 2035 deadline. The prior industry assumption was ten years, minimum. Google and a startup called Oratomic published separate analyses pointing to a much shorter window. Cloudflare said publicly it was "very concerned" and still working through the findings. This isn't a defense contractor problem or a cryptocurrency problem. The encryption protecting your data in transit, your authentication systems, your stored credentials: it's built on RSA and elliptic curve. The same math these papers say is breakable. Post-quantum cryptography standards exist. NIST finalized them. Still, most organizations haven't even started migration planning. For most mid-market security programs, the fact is you don't know where all your cryptographic dependencies are. You haven't inventoried which systems rely on which algorithms. And "we'll deal with that when it's closer" got a lot less defensible last week. Crypto agility is what separates organizations that will handle this transition from ones that won't. Not a full migration right now, but rather the ability to swap algorithms without rebuilding your infrastructure from scratch. The first step is the inventory. Know what you're running. Nothing else matters until that work is done. https://lnkd.in/g7msPXBP
-
🛡️ The Quantum Clock is Ticking quietly: Is Your Financial Infrastructure Ready? The financial industry is built on a foundation of digital trust, currently secured by #cryptographic standards like RSA and ECC. However, the rise of Cryptographically Relevant Quantum Computers (CRQC) poses an existential threat to this foundation. As we navigate this transition, here are 3 key pillars from the latest Mastercard R&D white paper that every financial leader must prioritize: 1. Addressing the 'Harvest Now, Decrypt Later' (HNDL) Threat 📥 Malicious actors are already intercepting and storing sensitive #encrypted data today, intending to decrypt it once powerful quantum computers are available. Financial Use Case: Protecting long-term assets such as credit histories, investment records, and loan documents. Unlike transient transaction data (which uses dynamic cryptograms), this "shelf-life" data requires immediate risk analysis and the adoption of quantum-safe encryption for back-end systems. 2. Quantum Resource Estimation & The 10-Year Horizon ⏳ While a CRQC capable of breaking RSA-2048 in hours might be 10 to 20 years away, the migration process itself will take years. Financial Use Case: Developing Agile Cryptography Plans. Financial institutions should set "action alarms" for instance, once a quantum computer reaches 10,000 qubits, a pre-prepared 10-year migration plan must be triggered to ensure infrastructure is updated before the "meteor strike" occurs. 3. Hybrid Implementations: The Bridge to Security 🌉 The transition won't happen overnight. The paper highlights the importance of Hybrid Key Encapsulation Mechanisms (KEM), which combine classical security with PQC. Financial Use Case: Enhancing TLS 1.3 and OpenSSL 3.5 protocols. By implementing hybrid models now, banks can protect against current quantum threats (like HNDL) while maintaining compatibility with existing classical systems, ensuring a smooth and safe transition. The Bottom Line: A reactive approach is no longer an option. Early adopters who evaluate their data's "time value" and begin the migration today will be the ones to maintain resilience and protect global financial assets tomorrow. #QuantumComputing #PostQuantumCryptography #FinTech #CyberSecurity #DigitalTrust #MastercardResearch
-
Google is issuing a call to action: the quantum era will break the digital locks we rely on, and the window to get ahead of it is closing rapidly. This is a signal leaders should not ignore. Quantum’s promise, drug discovery, materials science, energy, comes with a brutal side effect: a cryptographically relevant quantum computer could unravel the public-key cryptosystems protecting bank transfers, private chats, trade secrets, and classified systems. And the most dangerous part is timing. Attackers don’t need quantum to arrive to start winning. They can harvest encrypted data now and decrypt it later. The breach happens in slow motion, then shows up all at once, helped by AI to find patterns and insights in the data. I’ve been saying this for years: if the last few years belonged to AI, the rest of this decade increasingly belongs to quantum, and the world is not ready for quantum’s “ChatGPT moment.” Standards are no longer the excuse. National Institute of Standards and Technology (NIST) finalized the first post-quantum cryptography standards in August 2024. This is the most underpriced risk in modern leadership. The “we’re waiting” era is over. Y2K was a $100B inconvenience. Quantum migration is a civil-engineering project for the digital world. Imagine a an airplane swapping engines mid-flight without crashing. That’s what “crypto agility” demands: replacing the cryptography under your entire business while customers keep booking, checking-in, boarding, and trusting the system. And the time to start working is today, because when one of the companies building toward this future tells the market to move, you move. Google has been working on post-quantum cryptography since 2016, and it’s now publicly warning that a large-scale quantum computer could break today’s public-key cryptography. That combination, deep capability plus an explicit call to action, isn’t PR. It’s a timeline a signal you should not ignore. This decade rewards leaders who modernize trust before trust collapses. Is your organization preparing itself for what is to come?
-
Today, Google Quantum AI published a research paper that might boost the post-quantum migration. Their team has tailored Shor’s algorithm to solve the 256-bit Elliptic Curve Discrete Logarithm Problem. ECDLP is the hard mathematical problem that secures ECDSA: the signature scheme underpinning most blockchains, TLS certificates, and countless authentication systems, using fewer than 1,200 logical qubits and 90 million Toffoli gates. Translated to hardware: fewer than 500,000 physical qubits, executing in a few minutes. A few minutes. Less than a Bitcoin block time. Less than two Ethereum epochs. The long-standing argument that public keys can simply remain hidden is now moot. What exactly changed Shor's algorithm has been known since 1994 as a generic quantum approach to factoring integers and computing discrete logarithms. But "known" and "practical" are very different things. The real progress is in the engineering: how many qubits and gates you actually need once you compile the algorithm into a fault-tolerant quantum circuit. The recent algorithmic trendline is clear: every 12-18 months, the resource estimates drop significantly. And these are pure algorithmic gains: they compound on top of hardware improvements, which remain a major challenge. However, as of today, we're still far from having such a quantum computer. This didn't change. Zero Knowledge Proof Here's where it gets interesting. Google chose not to publish their optimized circuits. Instead, they released a zero-knowledge proof that their circuits achieve the claimed resource counts. We have no doubt they know how to do it, but no clue how. The reasons are likely multiple: competitive advantage, national security implications... Regardless, it establishes a powerful (and elegant) precedent. What’s ironic: Google's ZK proof is not itself post-quantum secure. What’s next? The good news is that we already have the tools: Post Quantum Cryptography, now we need to migrate. A few days ago, Google announced it is targeting 2029 for full post-quantum readiness. NIST plans to deprecate RSA signatures by 2030 and disallow all legacy algorithms by 2035. Cryptography exists to create mathematical trust in the security of systems. That trust is now being eroded, not by a working attack, but by the increasingly credible prospect of one. In security, the moment you start doubting the foundation is the moment you should be rebuilding it. What this means for blockchains For blockchain ecosystems specifically, the threat is central. ECDSA on secp256k1 (Bitcoin) and P-256 curves is the cornerstone of security. Unlike traditional systems where you can rotate certificates behind a corporate firewall, blockchain migration requires coordination across decentralized, permissionless networks. This process will likely take time. I'll be diving deeper into the concrete challenges and strategies for PQC migration on blockchains and secure systems at my keynote this Thursday at EthCC conference.
-
The EU published its Post-Quantum Cryptography (PQC) Roadmap in June 2025, setting out fairly aggressive target dates for migration. But without introducing any explicit enforcement mechanisms. That has led many to conclude that the roadmap lacks enforcement power and is therefore “just a non-binding recommendation.” It’s a very common misconception. The roadmap expects all EU Member States to begin transitioning to PQC by launching national strategies and taking concrete “first steps” in the migration process. In practical terms, this means starting assessments, awareness campaigns, and cryptographic inventories no later than 2026. I’m increasingly involved in conversations around these topics. So I tried to clarify how EU recommendations typically operate in conjunction with binding regulations. The roadmap is more than a polite suggestion. While non-binding on its own, it aligns closely with enforceable frameworks such as NIS2 and DORA, effectively creating indirect mandates through risk-based compliance requirements. The EU does not need a standalone PQC regulation for the roadmap to matter. It functions more like a lens through which regulators and auditors will interpret what “appropriate,” “proportionate,” and “state-of-the-art” cryptography means under existing law. NIS2 already requires entities to maintain policies and procedures on the use of cryptography. DORA goes further, explicitly requiring financial entities to track the evolving cryptographic threat landscape - including “threats from quantum advancements.” And the Commission is not presenting this as permanently voluntary. It has made clear that it will monitor progress and may take additional steps, including proposing binding acts of Union law, if necessary. I tried to summarize this “roadmap + binding law” logic here: https://lnkd.in/dcf4bsht #PQC #PostQuantum #QuantumSecurity #Cybersecurity #Cyber #NIS2 #DORA
-
🛑 Google did NOT say quantum computers will break all encryption by 2029. But that's the version 500,000 people shared this week. What Google actually announced: a 2029 deadline to migrate their own systems to post-quantum cryptography. A self-imposed engineering target. Ahead of the NSA's 2031 goal. Ahead of the US government's 2035 benchmark. That's leadership, not a warning label. Here's the part the viral post conveniently skipped: • Current quantum computers can't break encryption. Period. They're still battling fundamental physics problems with qubit stability. • NIST published post-quantum cryptography standards in 2024. The defense is already being built. • Google, Apple, Microsoft, and AWS are actively deploying quantum-resistant encryption today. Now here's the part that actually matters — and nobody's talking about: The "store now, decrypt later" threat. Nation-state actors and advanced threat groups are harvesting encrypted traffic right now. Government secrets. Corporate IP. Health records. Financial data. All of it sitting in storage, waiting for the day a quantum machine can open it. That's not a 2029 problem. That's a today problem. If you're a CISO or security leader, the move isn't panic. It's inventory. Where does RSA live in your stack? Where's ECC? What's your cryptographic migration plan? Do you even have one? The quantum threat is real. The timeline is compressing. But your threat model should come from Google's actual blog post — not from a screenshot with a red siren emoji. Read the source. Do the work. #CyberSecurity #QuantumComputing #ThreatIntelligence #PQC #CISO
-
The UK’s National Cyber Security Centre just issued a quiet but critical wake-up call: quantum computing isn’t science fiction anymore — it’s a looming reality with the power to break today’s encryption standards. As someone who follows cybersecurity and tech trends closely, this stood out to me. The NCSC is urging large organisations — especially in energy, transport, and other critical sectors — to start preparing now to migrate to post-quantum cryptography. Why the urgency? Because once quantum machines mature, they’ll be able to crack public key encryption at a speed today’s systems aren’t built to defend against. Their guidance outlines a 10-year roadmap, with milestones in 2028, 2031, and full readiness by 2035. That sounds far off — until you consider how long it takes to upgrade legacy infrastructure and secure bespoke IT systems. We don’t know the exact timeline for a quantum breakthrough, but waiting for it to happen before acting would be a mistake. Is your org already thinking about this shift? How are you preparing for a post-quantum world? #cybersecurity #quantum #technology https://lnkd.in/d-jUCRPS
-
Quantum computing will break the encryption protecting our digital world, and it's arriving sooner than most business leaders realize. I spoke with Anand Oswal, EVP of Network Security at Palo Alto Networks, to discuss the practical steps organizations must take now to become quantum-ready, on CXOTalk episode 904. The timeline is aggressive: RSA encryption will be deprecated by 2030 and disallowed by 2035. Large-scale cryptographic migrations take 5-10 years to complete, meaning companies that start today barely have enough time to meet these deadlines. Key takeaways for business and security leaders: -- The "harvest now, decrypt later" threat is already active. Nation-states are systematically collecting encrypted data today, betting they'll be able to decrypt it once quantum computers arrive. Organizations handling long-term sensitive information, such as financial records, health data, and intellectual property, face immediate risk, not a future one. -- Cryptographic failure means operational collapse, not data breach. Supply chain management, financial transactions, and remote access all depend on encryption. When algorithms become compromised, these systems stop functioning entirely. This business continuity risk surpasses traditional security concerns. -- Start with visibility before protection. A complete cryptographic inventory takes over a year to compile. Security teams need real-time dashboards showing where legacy encryption exists across cloud workloads, APIs, and network connections before they prioritize remediation efforts. -- Legacy systems require translation, not replacement. Cipher translation technology enables organizations to secure communications to and from older applications at the network layer without costly architectural changes, turning the quantum transition from a disruptive big-bang project into a phased, controlled process. To learn more about quantum security, check out the entire conversation: https://lnkd.in/ebX3EtYP #QuantumComputing #Cybersecurity #QuantumSecurity #CXOTalk #NetworkSecurity
Explore categories
- Hospitality & Tourism
- Productivity
- Finance
- Soft Skills & Emotional Intelligence
- Project Management
- Education
- Leadership
- Ecommerce
- User Experience
- Recruitment & HR
- Customer Experience
- Real Estate
- Marketing
- Sales
- Retail & Merchandising
- Science
- Supply Chain Management
- Future Of Work
- Consulting
- Writing
- Economics
- Artificial Intelligence
- Employee Experience
- Healthcare
- Workplace Trends
- Fundraising
- Networking
- Corporate Social Responsibility
- Negotiation
- Communication
- Engineering
- Career
- Business Strategy
- Change Management
- Organizational Culture
- Design
- Innovation
- Event Planning
- Training & Development