Quantum computing has evolved from academic research to having real-world implications for businesses. Enterprise security thrives on a foundation of robust cryptography, which is embedded in the digital infrastructure of organisations and helps them protect sensitive data. However, once quantum computers become viable, they will be able to break existing cryptographic algorithms used in public key encryption methods such as Rivest-Shamir-Adleman (RSA) and elliptic curve cryptography (ECC).
Recent developments in quantum computing are forcing enterprises to take note. There is a sense of urgency reflected in the growing use of the term Y2Q or years to quantum, which refers to the countdown to when quantum computers will become capable of breaking into classical cryptographic encryption. Experts believe that cryptographically relevant quantum computers could become available in the next 5-15 years. However, this does not mean enterprises have time to wait.
Cybercriminals are already engaging in harvest now, decrypt later (HNDL) attacks, where they capture ciphertext and its associated metadata and archive it for long-term storage. Attackers can then use a quantum computer to derive the session or private keys from the recorded data and decrypt the communications.
When quantum computing starts to be implemented on a large scale, it will pose significant challenges to the current cryptographic systems. Shor’s algorithm can rapidly factor large numbers, something that classical algorithms are unable to do. And this gives hackers the upper hand in cracking the RSA and ECC encryption systems. In addition, Grover’s algorithm is a significant improvement over classical search algorithms and has the ability to break traditional encryption methods.
Cryptography is one of the main defences we have against cybercriminals. But quantum computing could pierce through those defences, and as a consequence, there could be a significant breakdown of trust in our current systems. Industries such as banking, healthcare, defence, and energy could be severely impacted. Enterprises that do not take swift action will be at risk of losing customer confidence and of regulatory compliance failures. Therefore, they must develop a roadmap to assess risk, prioritise remediation, and transition to quantum-resilient systems.
The National Institute of Standards and Technology (NIST) has finalised its first set of post-quantum cryptographic algorithms and set timelines to transition to the new standards. Existing algorithms such as elliptic curve digital signature algorithm (ECDSA), Edwards-curve digital signature algorithm (EdDSA), and RSA will be deprecated by 2030 and then disallowed by 2035.
The regulatory body has also formally standardised quantum-safe algorithms. Kyber enables key encapsulation for secure data transmission, while Dilithium and FALCON provide digital signatures for identity verification. And Sphincs+ offers stateless, hash-based signatures for long-term security needs such as secure backup. However, these algorithms are also being tested for inherent security vulnerabilities, and the efforts to strengthen them are evolving constantly.
Adopting NIST standards is an imperative. Enterprises need to secure their digital infrastructure and establish flexibility in their cryptographic infrastructure, apart from ensuring compliance to NIST standards. Crypto agility means that a system can easily switch to a new algorithm if newer standards are established or new threat vectors arise.
Crypto agility is key to resilience, helping organisations protect data, ensure compliance, and maintain business continuity. Those that future-proof their cryptographic systems today will gain a critical competitive advantage tomorrow.
Certain industries are at a higher risk from quantum algorithms as their data has a longer shelf life.
Despite the growing urgency, most organisations are not ready for the transition to post-quantum cryptography. They face several hurdles at each stage in their journey.
Overcoming these challenges calls for an intelligent, adaptable, and enterprise-aligned approach towards migration.
To navigate the complex transition to post-quantum cryptography, enterprises must adopt a strategic approach. We recommend a four-pillar framework that can help translate complex technical requirements into an actionable migration roadmap.
During a migration, enterprises must especially focus on three areas that require complex decision making:
Risk assessment: Enterprises use thousands of applications that are vulnerable to quantum attacks. Their IT landscape is so intricate that humans will not be able to accurately analyse and diagnose risks associated with applications just by analysing their architecture. The application context and metadata, data content, and organisational standards must be considered. Without a clear understanding of the risks, stakeholders cannot prioritise the migration of these applications to a quantum-safe state. Unlike other kinds of risk scoring, quantum threats need a special framework flexible enough to adapt to the technical landscape of an enterprise. It should also provide granular details of each factor’s contribution to the overall risk score to enable the enterprise to make decisions about the mitigation approach.
Recommendation system: After the initial stages of assessing quantum vulnerabilities and conducting a migration prioritisation comes the complex task of migrating the applications to a quantum-safe state. Enterprises must be aware of vulnerabilities that may creep in during the transition, as the underlying system of systems could throw up new threat surfaces. Migrating the applications involves replacing the existing cryptographic APIs with suitable, quantum-safe cryptographic APIs. There is a plethora of quantum-safe libraries with disparate performance characteristics such as memory, storage, and CPU requirements. In general, quantum-safe APIs are performance-intensive, which presents a challenge. Application owners must make informed decisions to select the best option that would have no impact on the non-functional requirements (NFR) of the application. However, this is a complicated process. Enterprises have multiple applications, with different programming languages and architectures. To comply with NIST standards, enterprises must choose the most optimal quantum-safe library, which is a complex problem and is impossible to solve manually in the absence of a robust recommendation engine. PQC recommendation is a complex process as different conflicting objectives (depending on NFRs of applications, performance characteristics of cryptographic libraries, crypto library availability, compliance to standards and interoperability and other factors) must be simultaneously optimised.
Remediation: Remediation is widely recognised as a highly complex phase across both research and enterprise communities. Complete automation is not feasible, and no universal solution exists due to the diversity of application types and dependencies.
To address this variability, applications can be categorised by remediation complexity. Each category would follow a tailored remediation recipe, supported by human-in-the-loop strategies to ensure accuracy and efficiency. An intelligent system would guide developers and engineers through the remediation process, offering contextual recommendations, effort estimations, and validation support, enabling a faster, cost-effective, and reliable migration.
The transition to post-quantum cryptography is more than just a technological reinvention. Enterprises must treat it as a strategic transformation that will have an impact on areas such as data security, compliance with NIST standards, and business resilience. Making applications quantum safe will help businesses minimise threats from business disruption, data breaches, and financial loss. While it may still take take several years, enterprises must treat quantum preparedness as a C-suite imperative, embedding it into digital transformation roadmaps. The winners of tomorrow will be those who act today, establishing resilient, compliant, and secure cryptographic foundations ahead of the curve.