Close Menu
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    • Blogging
    • SEO & Digital Marketing
    • WiFi / Internet & Networking
    • Cybersecurity
    • Tech Tools & Mobile / Apps
    • Privacy & Online Earning
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    Home»WiFi / Internet & Networking»Quantum computing is getting closer, but quantum-proof encryption remains elusive
    WiFi / Internet & Networking

    Quantum computing is getting closer, but quantum-proof encryption remains elusive

    adminBy adminFebruary 2, 2026No Comments4 Mins Read
    Facebook Twitter LinkedIn Telegram Pinterest Tumblr Reddit WhatsApp Email
    From false alarms to real threats: Protecting cryptography against quantum
    Share
    Facebook Twitter LinkedIn Pinterest Email

    Meanwhile, some people are still unconvinced of the urgency.

    Somebody else’s problem

    Quantum computing has been ten to twenty years away for decades. Is today any different? I wouldn’t blame someone if they thought that way.

    And, according to ICASA’s recent survey of more than 2,600 security and privacy professionals, only 5% say that PQC is a high business priority for the near future.

    There’s a lot happening in the business world right now and by the time quantum computers arrive, someone else will be in charge and they can deal with it. Twenty years, ten years, even five years seems like a lifetime right now. Who knows what the world will even look like then or if jobs will even exist?

    Plus, who does their own encryption these days, anyway? According to the IBM survey, 62% of executives believe that vendors will handle the PQC transition. And that might move the needle for some organizations, says Thales’ Canavan, but organizations with highly sensitive data, like large financial institutions, aren’t going to rely on blind faith. “Trust but verify is absolutely essential,” he says.

    HSBC, for example, brought in a big chunk of its vendor community, he says. “All of us are part of their cryptographic center of excellence,” he says. “And are verifying all the scenarios.”

    Signs of progress

    In an October report, content delivery network Cloudflare announced that a major milestone had just been passed: More than half of human-initiated traffic on the network is now using post-quantum encryption.

    In other news, symmetric encryption is already quantum safe. Symmetric encryption is when the same key is used to both encrypt and decrypt data, and it’s commonly used by organizations when they store their data.

    It’s asymmetric encryption, the kind used for public communications, online purchases, and banking transactions, that is most at risk.

    Fortunately, TLS 1.3 is here, says CyberArk’s Bocek, and it’s ready for PQC. “We have the ability to perform post-quantum safe key exchange,” he says. “Which is, right out, our best protection against harvest-now, decrypt-later on the network.”

    Speaking of TLS, another pressing concern is that starting next year, Microsoft, Google, and Apple will enforce certificate lifecycles. “It will go from over a year validity to 200 days in March, and all the way down to 47 days in 2029,” says Bocek.

    This is actually an opportunity for PQC, he says. If a company modernizes its TLS certificate management process today for PQC, it will also be ready to handle the new certificate lifecycles. “That’s an immediate collateral benefit and a business case that I can make immediately — and making the business case for post-quantum encryption is difficult.”

    Still, despite the difficulty, companies are beginning to put money towards PQC efforts. Forrester predicts that quantum security spending will exceed 5% of the overall IT security budget next year.

    “Leaders increasingly understand that the quantum threat is not a distant possibility but a foreseeable event,” says Chris Hickman, CSO at Keyfactor. “Discussions have moved from awareness to action, focusing on how to gain full visibility into cryptographic assets and prepare for a transition to post-quantum cryptography. This marks a significant change in mindset. The question is no longer ‘Will quantum computing be a threat?’ but rather, ‘How do we prepare our systems, data, and governance now to stay secure in a post-quantum world?’”

    Elements of a cryptographic inventory

    When identifying areas of concern for post-quantum encryption, enterprises should start with the following:

    • Operational cryptography: This includes all the cryptography running on-premises or in the cloud, including key exchange, message authentication codes, cryptographic keys, tokens, and other secrets, private and public keys used for TLS and client authentication, and certificates including end-entity certificates, root certificate authorities and trust stores for used for TLS, signing, and other purposes.
    • Software cryptography: Applications created by internal development teams also use cryptography. For example, applications can use cryptography to protect sensitive assets via digital signatures or encryption. This might involve the use of cryptographic libraries.
    • Network cryptography: Communications are heavily dependent on cryptography, including SSH, TLS, IPsec, and more.
    • Managed cryptography: Hardware security modules, key management systems and certificate lifecycle management tools all handle some aspects of the management of cryptographic material.
    • Hardware cryptography: Cryptography is also used to secure IoT and edge devices, embedded trust modules, cryptographic chips, industrial controllers, and more.

    Source: HSBC

    closer computing elusive encryption Quantum quantumproof remains
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Telegram Email
    Previous ArticleCyber Insights 2026: Malware and Cyberattacks in the Age of AI
    Next Article Why your wiped drive is still full of data
    admin
    • Website

    Related Posts

    Nvidia partners with optics technology vendors Lumentum and Coherent to enhance AI infrastructure

    March 3, 2026

    Intel aims advanced Xeon 6+ at AI edge computing

    March 3, 2026

    Nvidia partners with telecom providers for open 6G networks

    March 2, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Search Blog
    About
    About

    At WifiPortal.tech, we share simple, easy-to-follow guides on cybersecurity, online privacy, and digital opportunities. Our goal is to help everyday users browse safely, protect personal data, and explore smart ways to earn online. Whether you’re new to the digital world or looking to strengthen your online knowledge, our content is here to keep you informed and secure.

    Trending Blogs

    How Microsoft, partners are tackling ‘huge, huge task’ of making security software safer

    March 3, 2026

    Building a competitive PPC defense

    March 3, 2026

    Amazon Prime Members Can Get Two of These E-Books Free in March 2026

    March 3, 2026

    CyberStrikeAI tool adopted by hackers for AI-powered attacks

    March 3, 2026
    Categories
    • Blogging (32)
    • Cybersecurity (570)
    • Privacy & Online Earning (79)
    • SEO & Digital Marketing (356)
    • Tech Tools & Mobile / Apps (706)
    • WiFi / Internet & Networking (103)

    Subscribe to Updates

    Stay updated with the latest tips on cybersecurity, online privacy, and digital opportunities straight to your inbox.

    WifiPortal.tech is a blogging platform focused on cybersecurity, online privacy, and digital opportunities. We share easy-to-follow guides, tips, and resources to help you stay safe online and explore new ways of working in the digital world.

    Our Picks

    How Microsoft, partners are tackling ‘huge, huge task’ of making security software safer

    March 3, 2026

    Building a competitive PPC defense

    March 3, 2026

    Amazon Prime Members Can Get Two of These E-Books Free in March 2026

    March 3, 2026
    Most Popular
    • How Microsoft, partners are tackling ‘huge, huge task’ of making security software safer
    • Building a competitive PPC defense
    • Amazon Prime Members Can Get Two of These E-Books Free in March 2026
    • CyberStrikeAI tool adopted by hackers for AI-powered attacks
    • 16 Best Checking Accounts of March 2026
    • 3 great Paramount+ movies you’ll want to watch this week (March 2
    • Nvidia partners with optics technology vendors Lumentum and Coherent to enhance AI infrastructure
    • Madison Square Garden Data Breach Confirmed Months After Hacker Attack
    © 2026 WifiPortal.tech. Designed by WifiPortal.tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms and Conditions
    • Disclaimer

    Type above and press Enter to search. Press Esc to cancel.