Quantum computing at industrial scale remains far ahead, and we’re still years (or decades) away from traditional cryptographic algorithms being broken in practice. However, thanks to advance in post-quantum cryptographic algorithms and due to increasing regulatory pressure, it is time to start planning post-quantum cryptography migration.
After a brief reminder about quantum cryptography and how it impacts various classes of cryptographic primitives, we’ll dive into practical risks, regulatory expectations, and what to watch out for when planning or experimenting with Post-Quantum Cryptography. We will include practical examples, as well as how to convey these challenges to your Board or executive committees, beyond the “fear, uncertainty and doubt” cultivated during the past years.
