Close Menu
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    • Blogging
    • SEO & Digital Marketing
    • WiFi / Internet & Networking
    • Cybersecurity
    • Tech Tools & Mobile / Apps
    • Privacy & Online Earning
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    Home»WiFi / Internet & Networking»Quantum computing is getting closer, but quantum-proof encryption remains elusive
    WiFi / Internet & Networking

    Quantum computing is getting closer, but quantum-proof encryption remains elusive

    adminBy adminFebruary 2, 2026No Comments4 Mins Read
    Facebook Twitter LinkedIn Telegram Pinterest Tumblr Reddit WhatsApp Email
    From false alarms to real threats: Protecting cryptography against quantum
    Share
    Facebook Twitter LinkedIn Pinterest Email

    Meanwhile, some people are still unconvinced of the urgency.

    Somebody else’s problem

    Quantum computing has been ten to twenty years away for decades. Is today any different? I wouldn’t blame someone if they thought that way.

    And, according to ICASA’s recent survey of more than 2,600 security and privacy professionals, only 5% say that PQC is a high business priority for the near future.

    There’s a lot happening in the business world right now and by the time quantum computers arrive, someone else will be in charge and they can deal with it. Twenty years, ten years, even five years seems like a lifetime right now. Who knows what the world will even look like then or if jobs will even exist?

    Plus, who does their own encryption these days, anyway? According to the IBM survey, 62% of executives believe that vendors will handle the PQC transition. And that might move the needle for some organizations, says Thales’ Canavan, but organizations with highly sensitive data, like large financial institutions, aren’t going to rely on blind faith. “Trust but verify is absolutely essential,” he says.

    HSBC, for example, brought in a big chunk of its vendor community, he says. “All of us are part of their cryptographic center of excellence,” he says. “And are verifying all the scenarios.”

    Signs of progress

    In an October report, content delivery network Cloudflare announced that a major milestone had just been passed: More than half of human-initiated traffic on the network is now using post-quantum encryption.

    In other news, symmetric encryption is already quantum safe. Symmetric encryption is when the same key is used to both encrypt and decrypt data, and it’s commonly used by organizations when they store their data.

    It’s asymmetric encryption, the kind used for public communications, online purchases, and banking transactions, that is most at risk.

    Fortunately, TLS 1.3 is here, says CyberArk’s Bocek, and it’s ready for PQC. “We have the ability to perform post-quantum safe key exchange,” he says. “Which is, right out, our best protection against harvest-now, decrypt-later on the network.”

    Speaking of TLS, another pressing concern is that starting next year, Microsoft, Google, and Apple will enforce certificate lifecycles. “It will go from over a year validity to 200 days in March, and all the way down to 47 days in 2029,” says Bocek.

    This is actually an opportunity for PQC, he says. If a company modernizes its TLS certificate management process today for PQC, it will also be ready to handle the new certificate lifecycles. “That’s an immediate collateral benefit and a business case that I can make immediately — and making the business case for post-quantum encryption is difficult.”

    Still, despite the difficulty, companies are beginning to put money towards PQC efforts. Forrester predicts that quantum security spending will exceed 5% of the overall IT security budget next year.

    “Leaders increasingly understand that the quantum threat is not a distant possibility but a foreseeable event,” says Chris Hickman, CSO at Keyfactor. “Discussions have moved from awareness to action, focusing on how to gain full visibility into cryptographic assets and prepare for a transition to post-quantum cryptography. This marks a significant change in mindset. The question is no longer ‘Will quantum computing be a threat?’ but rather, ‘How do we prepare our systems, data, and governance now to stay secure in a post-quantum world?’”

    Elements of a cryptographic inventory

    When identifying areas of concern for post-quantum encryption, enterprises should start with the following:

    • Operational cryptography: This includes all the cryptography running on-premises or in the cloud, including key exchange, message authentication codes, cryptographic keys, tokens, and other secrets, private and public keys used for TLS and client authentication, and certificates including end-entity certificates, root certificate authorities and trust stores for used for TLS, signing, and other purposes.
    • Software cryptography: Applications created by internal development teams also use cryptography. For example, applications can use cryptography to protect sensitive assets via digital signatures or encryption. This might involve the use of cryptographic libraries.
    • Network cryptography: Communications are heavily dependent on cryptography, including SSH, TLS, IPsec, and more.
    • Managed cryptography: Hardware security modules, key management systems and certificate lifecycle management tools all handle some aspects of the management of cryptographic material.
    • Hardware cryptography: Cryptography is also used to secure IoT and edge devices, embedded trust modules, cryptographic chips, industrial controllers, and more.

    Source: HSBC

    closer computing elusive encryption Quantum quantumproof remains
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Telegram Email
    Previous ArticleCyber Insights 2026: Malware and Cyberattacks in the Age of AI
    Next Article Why your wiped drive is still full of data
    admin
    • Website

    Related Posts

    Cisco issues emergency patches for critical firewall vulnerabilities

    March 5, 2026

    Lack of regulatory action on hyperscaler dominance prompts inquiry chair to quit

    March 5, 2026

    Digital sovereignty options for on-prem deployments

    March 5, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Search Blog
    About
    About

    At WifiPortal.tech, we share simple, easy-to-follow guides on cybersecurity, online privacy, and digital opportunities. Our goal is to help everyday users browse safely, protect personal data, and explore smart ways to earn online. Whether you’re new to the digital world or looking to strengthen your online knowledge, our content is here to keep you informed and secure.

    Trending Blogs

    Cisco Drops 48 New Firewall Vulnerabilities, 2 Critical

    March 5, 2026

    What SMEC’s Data Reveals About AI Max Performance

    March 5, 2026

    This Ultra phone first to use Sony’s new 200MP camera sensor

    March 5, 2026

    Cisco Confirms Active Exploitation of Two Catalyst SD-WAN Manager Vulnerabilities

    March 5, 2026
    Categories
    • Blogging (33)
    • Cybersecurity (622)
    • Privacy & Online Earning (92)
    • SEO & Digital Marketing (395)
    • Tech Tools & Mobile / Apps (759)
    • WiFi / Internet & Networking (111)

    Subscribe to Updates

    Stay updated with the latest tips on cybersecurity, online privacy, and digital opportunities straight to your inbox.

    WifiPortal.tech is a blogging platform focused on cybersecurity, online privacy, and digital opportunities. We share easy-to-follow guides, tips, and resources to help you stay safe online and explore new ways of working in the digital world.

    Our Picks

    Cisco Drops 48 New Firewall Vulnerabilities, 2 Critical

    March 5, 2026

    What SMEC’s Data Reveals About AI Max Performance

    March 5, 2026

    This Ultra phone first to use Sony’s new 200MP camera sensor

    March 5, 2026
    Most Popular
    • Cisco Drops 48 New Firewall Vulnerabilities, 2 Critical
    • What SMEC’s Data Reveals About AI Max Performance
    • This Ultra phone first to use Sony’s new 200MP camera sensor
    • Cisco Confirms Active Exploitation of Two Catalyst SD-WAN Manager Vulnerabilities
    • Yep, Amazon Is Down | Lifehacker
    • Fideo Intelligence enhances dark web monitoring capabilities to reduce payment fraud
    • AI Max increases revenue 13% but drives higher CPA: Study
    • Why everyone should use VS Code (even if they aren’t programmers)
    © 2026 WifiPortal.tech. Designed by WifiPortal.tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms and Conditions
    • Disclaimer

    Type above and press Enter to search. Press Esc to cancel.