{"id":169721,"date":"2025-09-20T13:01:12","date_gmt":"2025-09-20T13:01:12","guid":{"rendered":"https:\/\/www.newsbeep.com\/us\/169721\/"},"modified":"2025-09-20T13:01:12","modified_gmt":"2025-09-20T13:01:12","slug":"you-dont-need-quantum-hardware-for-post-quantum-security","status":"publish","type":"post","link":"https:\/\/www.newsbeep.com\/us\/169721\/","title":{"rendered":"You don\u2019t need quantum hardware for post-quantum security"},"content":{"rendered":"<p>Organizations have finite resources available to combat threats, both by the adversaries of today and those in the not-so-distant future that are armed with quantum computers. In this post, we provide guidance on what to prioritize to best prepare for the future, when quantum computers become powerful enough to break the conventional cryptography that underpins the security of modern computing systems. \u00a0We describe how <a href=\"https:\/\/www.cloudflare.com\/learning\/ssl\/quantum\/what-is-post-quantum-cryptography\/\" rel=\"nofollow noopener\" target=\"_blank\">post-quantum cryptography (PQC)<\/a> can be deployed on your existing hardware to protect from threats posed by <a href=\"https:\/\/www.cloudflare.com\/learning\/ssl\/quantum\/what-is-quantum-computing\/\" rel=\"nofollow noopener\" target=\"_blank\">quantum computing<\/a>, and explain why quantum key distribution (QKD) and quantum random number generation (QRNG) are neither necessary nor sufficient for security in the quantum age.<\/p>\n<p>\u201cQuantum\u201d is becoming one of the most heavily used buzzwords in the tech industry. What does it actually mean, and why should you care?<\/p>\n<p>At its core, \u201cquantum\u201d refers to technologies that harness principles of quantum mechanics to perform tasks that are not feasible with classical computers. Quantum computers have exciting potential to unlock advancements in <a href=\"https:\/\/pubs.aip.org\/aip\/jap\/article\/133\/22\/221102\/2896017\/Quantum-computing-and-materials-science-A\" rel=\"nofollow noopener\" target=\"_blank\">materials science<\/a> and <a href=\"https:\/\/www.weforum.org\/stories\/2025\/01\/quantum-computing-drug-development\/\" rel=\"nofollow noopener\" target=\"_blank\">medicine<\/a>, but also pose a <a href=\"https:\/\/blog.cloudflare.com\/the-quantum-menace\/\" rel=\"nofollow noopener\" target=\"_blank\">threat<\/a> to computer security systems. The term Q-day refers to the day that adversaries possess quantum computers that are large and stable enough to break the conventional <a href=\"https:\/\/www.cloudflare.com\/learning\/ssl\/how-does-public-key-encryption-work\/\" rel=\"nofollow noopener\" target=\"_blank\">public-key cryptography<\/a> that secures much of today\u2019s data and communications. Recent <a href=\"https:\/\/sam-jaques.appspot.com\/quantum_landscape\" rel=\"nofollow noopener\" target=\"_blank\">advances in quantum computing<\/a> have made it clear that it is no longer a question of if Q-day will arrive, but when.<\/p>\n<p>What does it mean, then, for your organization to be <a href=\"https:\/\/www.cloudflare.com\/the-net\/top-of-mind-technology\/post-quantum-security\/\" rel=\"nofollow noopener\" target=\"_blank\">quantum ready<\/a>? At Cloudflare, our definition is simple: your systems and communications should be secure even after Q-day.\u00a0<\/p>\n<p>However, this definition often gets muddied by vendors insisting that products built using quantum technology are required in order to secure an organization against quantum adversaries. In this blog post we explain why quantum technologies are neither necessary nor sufficient to <a href=\"https:\/\/www.cloudflare.com\/the-net\/security-signals\/post-quantum-era\/\" rel=\"nofollow noopener\" target=\"_blank\">protect against attacks by a quantum adversary<\/a>.<\/p>\n<p>The good news is that there is already a solution: <a href=\"https:\/\/www.cloudflare.com\/learning\/ssl\/quantum\/what-is-post-quantum-cryptography\/\" rel=\"nofollow noopener\" target=\"_blank\">post-quantum cryptography (PQC)<\/a>. PQC protects against attacks by quantum adversaries, but PQC is not a quantum technology \u2014 it runs on conventional computers without specialized hardware. You can use PQC today on the computers you already have, without buying expensive new hardware.<\/p>\n<p>      Post-quantum cryptography<br \/>\n      <a href=\"#post-quantum-cryptography\" aria-hidden=\"true\" class=\"relative sm:absolute sm:-left-5\"><\/p>\n<p>      <\/a><\/p>\n<p>We\u2019ve written <a href=\"https:\/\/blog.cloudflare.com\/tag\/post-quantum\/\" rel=\"nofollow noopener\" target=\"_blank\">quite a few blog posts<\/a> on post-quantum cryptography already, so we will keep this section brief.<\/p>\n<p>The <a href=\"https:\/\/en.wikipedia.org\/wiki\/Public-key_cryptography\" rel=\"nofollow noopener\" target=\"_blank\">public-key cryptography<\/a> that we\u2019ve used for decades to secure our data and communications is based on math problems (like <a href=\"https:\/\/en.wikipedia.org\/wiki\/RSA_cryptosystem\" rel=\"nofollow noopener\" target=\"_blank\">factoring large numbers<\/a>) that are believed to be <a href=\"https:\/\/en.wikipedia.org\/wiki\/Computational_hardness_assumption\" rel=\"nofollow noopener\" target=\"_blank\">computationally hard<\/a> to solve on conventional computers. If you can efficiently solve the underlying math problem, you can efficiently break the cryptography and the systems that depend on it. As it turns out, the math problems underlying much of today\u2019s public-key cryptography can be efficiently solved by specialized algorithms, like <a href=\"https:\/\/en.wikipedia.org\/wiki\/Shor%27s_algorithm\" rel=\"nofollow noopener\" target=\"_blank\">Shor\u2019s algorithm<\/a>, on large-scale quantum computers.\u00a0<\/p>\n<p>The solution? Pick new hard math problems (like finding <a href=\"https:\/\/blog.cloudflare.com\/lattice-crypto-primer\/\" rel=\"nofollow noopener\" target=\"_blank\">\u201cshort\u201d vectors in algebraic lattices<\/a>) that are no easier to solve with a quantum computer than with a conventional computer. Then, build new cryptographic systems around them. The <a href=\"https:\/\/www.nist.gov\/\" rel=\"nofollow noopener\" target=\"_blank\">US National Institute of Standards and Technologies (NIST)<\/a> launched an <a href=\"https:\/\/csrc.nist.gov\/projects\/post-quantum-cryptography\/post-quantum-cryptography-standardization\" rel=\"nofollow noopener\" target=\"_blank\">international competition<\/a> in 2016 to identify and standardize such cryptographic systems, which resulted in several new standards for post-quantum cryptography being published in 2024, and <a href=\"https:\/\/blog.cloudflare.com\/another-look-at-pq-signatures\/\" rel=\"nofollow noopener\" target=\"_blank\">several more under consideration<\/a> for future standardization.<\/p>\n<p>Post-quantum cryptography (PQC) runs on your existing phones, laptops, and servers. PQC runs at <a href=\"https:\/\/radar.cloudflare.com\/adoption-and-usage#post-quantum-encryption-adoption\" rel=\"nofollow noopener\" target=\"_blank\">Internet scale<\/a> and can even be <a href=\"https:\/\/blog.cloudflare.com\/pq-2024\/#ml-kem-versus-x25519\" rel=\"nofollow noopener\" target=\"_blank\">more performant<\/a> than classical cryptography. Except in rare cases, like when you need additional hardware acceleration in cheap smartcards or to replace legacy systems that lack <a href=\"https:\/\/en.wikipedia.org\/wiki\/Cryptographic_agility\" rel=\"nofollow noopener\" target=\"_blank\">cryptographic agility<\/a>, there is no need to purchase new hardware to migrate to PQC.<\/p>\n<p>If you want to know how to protect your organization from security threats posed by quantum computers, you can stop reading now. Post-quantum cryptography is the solution.\u00a0<\/p>\n<p>Alternatively, you can read below for our perspective on hardware-based quantum security technologies that are sometimes marketed as security solutions.<\/p>\n<p>      Quantum security technologies<br \/>\n      <a href=\"#quantum-security-technologies\" aria-hidden=\"true\" class=\"relative sm:absolute sm:-left-5\"><\/p>\n<p>      <\/a><\/p>\n<p>Quantum technologies capture the imagination. <a href=\"https:\/\/en.wikipedia.org\/wiki\/Quantum_computing\" rel=\"nofollow noopener\" target=\"_blank\">Quantum computers<\/a> (possibly linked together in a <a href=\"https:\/\/en.wikipedia.org\/wiki\/Quantum_network\" rel=\"nofollow noopener\" target=\"_blank\">quantum Internet<\/a>) promise to deliver breakthroughs in <a href=\"https:\/\/www.weforum.org\/stories\/2025\/01\/quantum-computing-drug-development\/\" rel=\"nofollow noopener\" target=\"_blank\">drug discovery<\/a> and <a href=\"https:\/\/pubs.aip.org\/aip\/jap\/article\/133\/22\/221102\/2896017\/Quantum-computing-and-materials-science-A\" rel=\"nofollow noopener\" target=\"_blank\">materials science<\/a> via advanced molecular simulation. Measurement of physical <a href=\"https:\/\/en.wikipedia.org\/wiki\/Hardware_random_number_generator\" rel=\"nofollow noopener\" target=\"_blank\">quantum processes<\/a> can be used to generate <a href=\"https:\/\/en.wikipedia.org\/wiki\/Entropy\" rel=\"nofollow noopener\" target=\"_blank\">entropy<\/a> with mathematically <a href=\"https:\/\/www.nature.com\/articles\/s41467-022-35556-z\" rel=\"nofollow noopener\" target=\"_blank\">provable properties<\/a>.<\/p>\n<p>This is exciting technology and fundamental scientific research. But this technology is not required to secure data and communications against quantum attackers.<\/p>\n<p>In this section, we\u2019ll explain why quantum security technologies do not need to be part of your quantum readiness strategy, and any decision to invest in quantum technology should not be based on a desire to defend data and communications systems against the threat of quantum adversaries. Instead, investments should be based on a desire to improve quantum technologies in their own right, for example to help with applications like <a href=\"https:\/\/pubs.acs.org\/doi\/10.1021\/acs.chemrev.4c00678\" rel=\"nofollow noopener\" target=\"_blank\">chemistry<\/a>, <a href=\"https:\/\/www.cloudflare.com\/learning\/ai\/what-is-machine-learning\/\" rel=\"nofollow noopener\" target=\"_blank\">machine learning<\/a>, and <a href=\"https:\/\/pmc.ncbi.nlm.nih.gov\/articles\/PMC11257328\/\" rel=\"nofollow noopener\" target=\"_blank\">financial modeling<\/a>.<\/p>\n<p>Our position here is largely in agreement with the strategies towards quantum security technologies of the <a href=\"https:\/\/www.nsa.gov\/Cybersecurity\/Post-Quantum-Cybersecurity-Resources\/\" rel=\"nofollow noopener\" target=\"_blank\">US National Security Agency (NSA)<\/a>, <a href=\"https:\/\/www.ncsc.gov.uk\/whitepaper\/quantum-networking-technologies\" rel=\"nofollow noopener\" target=\"_blank\">UK National Cyber Security Centre (NCSC)<\/a>, <a href=\"https:\/\/english.ncsc.nl\/binaries\/ncsc-en\/documenten\/publications\/2024\/march\/25\/quantum-secure\/Make+your+organization+quantum+secure.pdf\" rel=\"nofollow noopener\" target=\"_blank\">NL Nationaal Cyber Security Centrum (NCSC)<\/a>, and <a href=\"https:\/\/www.bsi.bund.de\/EN\/Themen\/Unternehmen-und-Organisationen\/Informationen-und-Empfehlungen\/Quantentechnologien-und-Post-Quanten-Kryptografie\/quantentechnologien-und-post-quanten-kryptografie_node.html\" rel=\"nofollow noopener\" target=\"_blank\">DE Federal Office for Information Security (BSI)<\/a>. We\u2019ll focus on two quantum technologies widely marketed as security products: quantum key distribution (QKD) and quantum random number generation (QRNG).<\/p>\n<p>Quantum key distribution (QKD) is a hardware-based solution to secure communications across point-to-point links. Rather than relying on hard mathematical problems, QKD relies on principles of quantum physics to establish a shared symmetric secret between two parties, while ensuring that eavesdropping can be detected. QKD provides security guarantees that are based on physical properties of the communication channel. Once a shared secret is established, parties can switch to traditional symmetric-key cryptography for secure communication. QKD is the first step towards a futuristic \u201cquantum Internet.\u201d However, there are some fundamental reasons why QKD cannot be a general replacement for classical cryptography running on conventional hardware.<\/p>\n<p>Most importantly, QKD does not operate at Internet scale. QKD is used to establish an unauthenticated secret between pairs of parties with a direct physical link between them. The parties can then use an authentication mechanism based on conventional cryptography to bootstrap a secure communication channel over that link. While building dedicated physical links may be feasible for cross-datacenter communication or across major Internet backbones, it is not possible for most pairs of parties on the Internet. In particular, deploying QKD for the \u201clast-mile\u201d connection to end-user devices would require that each device has a direct physical connection to every server or device it needs to securely communicate with.<\/p>\n<p>Connectivity aside, there&#8217;s a good reason why the Internet doesn&#8217;t rely on secure point-to-point links: they do not scale (or rather, they scale exponentially). Bringing a new device online would require a change to every other device it needs to communicate with, a massive operational burden on everyone. Fortunately, there\u2019s a better way. The <a href=\"https:\/\/www.cloudflare.com\/learning\/ddos\/glossary\/open-systems-interconnection-model-osi\/\" rel=\"nofollow noopener\" target=\"_blank\">OSI model<\/a> for networking provides an abstraction such that two parties can communicate even if they don\u2019t share a direct physical link, so long as some chain of physical links exists between them. Public-key cryptography, invented in the seminal \u201c<a href=\"https:\/\/www-ee.stanford.edu\/~hellman\/publications\/24.pdf\" rel=\"nofollow noopener\" target=\"_blank\">New Directions in Cryptography<\/a>\u201d paper in 1976, allows two parties participating in the same <a href=\"https:\/\/en.wikipedia.org\/wiki\/Public_key_infrastructure\" rel=\"nofollow noopener\" target=\"_blank\">public-key infrastructure<\/a> to establish a secure <a href=\"https:\/\/en.wikipedia.org\/wiki\/End-to-end_encryption\" rel=\"nofollow noopener\" target=\"_blank\">end-to-end encrypted<\/a> communication channel, without requiring any prior setup between them. The massive scaling enabled by these technologies is why the secure Internet exists as we know it. Secure point-to-point links are not part of the solution.<\/p>\n<p>Lack of scalability is enough for us to disqualify QKD outright: if a technology can\u2019t bring security to the whole Internet, we\u2019re not going to spend much time on it.<\/p>\n<p>The challenges with QKD don\u2019t stop there though.<\/p>\n<p>QKD touts theoretical security guarantees, but achieving security in practice is not so simple. QKD systems have been <a href=\"https:\/\/www.bsi.bund.de\/SharedDocs\/Downloads\/EN\/BSI\/Publications\/Studies\/QKD-Systems\/QKD-Systems.pdf?__blob=publicationFile&amp;v=3\" rel=\"nofollow noopener\" target=\"_blank\">plagued by implementation attacks<\/a>, both classical <a href=\"https:\/\/en.wikipedia.org\/wiki\/Side-channel_attack\" rel=\"nofollow noopener\" target=\"_blank\">sidechannel attacks<\/a> and <a href=\"https:\/\/www.bsi.bund.de\/SharedDocs\/Downloads\/EN\/BSI\/Publications\/Studies\/QKD-Systems\/QKD-Systems.pdf?__blob=publicationFile&amp;v=3\" rel=\"nofollow noopener\" target=\"_blank\">new ones<\/a> specific to the technology. Further, QKD works best over a special medium: either <a href=\"https:\/\/pmc.ncbi.nlm.nih.gov\/articles\/PMC4646568\/\" rel=\"nofollow noopener\" target=\"_blank\">fiber<\/a> or a <a href=\"https:\/\/journals.aps.org\/prapplied\/abstract\/10.1103\/PhysRevApplied.19.064003\" rel=\"nofollow noopener\" target=\"_blank\">vacuum<\/a>. QKD has been demonstrated <a href=\"https:\/\/iopscience.iop.org\/article\/10.1088\/1367-2630\/16\/4\/043003\" rel=\"nofollow noopener\" target=\"_blank\">over the air<\/a>, but performance and the implementation security mentioned before suffers. We still have not seen QKD work on a mobile phone or over Wi-Fi networks.<\/p>\n<p>Further, neither QKD nor any other quantum technologies provide authentication to prove that the party on the other end of the key exchange is who you think they are. This opens the door for a classic <a href=\"https:\/\/blog.cloudflare.com\/monsters-in-the-middleboxes\/\" rel=\"nofollow noopener\" target=\"_blank\">monster in the middle (MITM)<\/a> attack, where an adversary intercepts your connection, establishes a separate secure QKD link to you and your intended destination, and then sits in the middle reading and relaying all traffic. To prevent this, you must authenticate the identity of the party you are connecting to, using either <a href=\"https:\/\/en.wikipedia.org\/wiki\/Pre-shared_key\" rel=\"nofollow noopener\" target=\"_blank\">pre-shared keys<\/a> or conventional public-key cryptography. The bottom line is, whether or not you invest in QKD, you still need a solution for authentication to protect against active attackers armed with quantum computers. Practically speaking, that means you need PQC, but PQC is already a standalone solution that provides both authentication and key agreement, which leads to questions of why use QKD in the first place.<\/p>\n<p>Some <a href=\"https:\/\/www.amazon.science\/blog\/qkd-and-authentication-separating-facts-from-myths\" rel=\"nofollow noopener\" target=\"_blank\">proponents<\/a> <a href=\"https:\/\/www.bluequbit.io\/quantum-internet\" rel=\"nofollow noopener\" target=\"_blank\">argue<\/a> that QKD should be integrated into existing systems as an extra security layer. The value proposition of QKD relates to the \u201c<a href=\"https:\/\/en.wikipedia.org\/wiki\/Harvest_now,_decrypt_later\" rel=\"nofollow noopener\" target=\"_blank\">harvest now, decrypt later<\/a>\u201d threat. In public-key cryptography, the key exchange messages used to set up encryption keys to secure a communication channel are exchanged in full view of a potential adversary. If an adversary records the key exchange messages, they might hope to use improved techniques in the future to solve the hard math problems upon which the security of the key exchange relies, allowing them to recover the encryption keys and decrypt the communication. If encryption keys are exchanged directly via QKD instead, the eavesdropper protections provided by QKD stop an adversary from recording messages that could later allow them to recover the encryption key (e.g. by using a quantum computer or other advances in cryptanalysis). The problem is, however, that this \u201cextra security layer\u201d is brittle, and limited to a single physical link. As soon as the data is transmitted elsewhere \u2014 for instance at an Internet exchange point or to travel to an end-user \u2014 the QKD security ends. For the rest of its journey, the data is protected by standard protocols like <a href=\"https:\/\/www.cloudflare.com\/learning\/ssl\/transport-layer-security-tls\/\" rel=\"nofollow noopener\" target=\"_blank\">TLS<\/a>, making the value of the initial QKD link questionable.<\/p>\n<p>While we hope the technology progresses, QKD is neither necessary nor sufficient for security against a quantum adversary. PQC is sufficient for security against a quantum adversary, already runs on your existing hardware, and works everywhere.<\/p>\n<p>      Quantum random number generators<br \/>\n      <a href=\"#quantum-random-number-generators\" aria-hidden=\"true\" class=\"relative sm:absolute sm:-left-5\"><\/p>\n<p>      <\/a><\/p>\n<p>Quantum random number generators (QRNGs) are a type of<a href=\"https:\/\/en.wikipedia.org\/wiki\/Hardware_random_number_generator\" rel=\"nofollow noopener\" target=\"_blank\"> \u201ctrue\u201d random number generator (TRNG)<\/a> that work by harnessing inherent unpredictability of quantum mechanics, for example by measuring <a href=\"https:\/\/en.wikipedia.org\/wiki\/Radioactive_decay\" rel=\"nofollow noopener\" target=\"_blank\">atomic decay<\/a> or shooting photons at a <a href=\"https:\/\/en.wikipedia.org\/wiki\/Beam_splitter\" rel=\"nofollow noopener\" target=\"_blank\">beam splitter<\/a>. Other types of classical (non-quantum) TRNGs use physical phenomena that exhibit random properties, such as <a href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/982700\" rel=\"nofollow noopener\" target=\"_blank\">thermal noise<\/a> from electrical components, the motion of hot wax in <a href=\"https:\/\/blog.cloudflare.com\/randomness-101-lavarand-in-production\/\" rel=\"nofollow noopener\" target=\"_blank\">lava lamps<\/a>, <a href=\"https:\/\/blog.cloudflare.com\/harnessing-office-chaos\/#londons-unpredictable-pendulums\" rel=\"nofollow noopener\" target=\"_blank\">double pendulums<\/a>, <a href=\"https:\/\/blog.cloudflare.com\/harnessing-office-chaos\/#austins-mesmerizing-mobiles\" rel=\"nofollow noopener\" target=\"_blank\">hanging mobiles<\/a>, or <a href=\"https:\/\/blog.cloudflare.com\/chaos-in-cloudflare-lisbon-office-securing-the-internet-with-wave-motion\/\" rel=\"nofollow noopener\" target=\"_blank\">water wave machines<\/a>.<\/p>\n<p>In cryptography and computer security, the essential property required from a random number generator is that the outputs are unpredictable and unbiased. This can be achieved by taking a small seed (say, 256 bits) of true randomness and feeding it to a cryptographically-secure pseudorandom number generator (CSPRNG) to produce an essentially limitless stream of pseudorandom output indistinguishable from true randomness. The randomness used to seed the CSPRNG can be based on either classical or quantum physical processes, as long as it is not known to the adversary. Whether or not you use a QRNG to generate the seed, a CSPRNG is essential for cryptographic applications.<\/p>\n<p>We are the first to get excited about <a href=\"https:\/\/blog.cloudflare.com\/randomness-101-lavarand-in-production\/\" rel=\"nofollow noopener\" target=\"_blank\">fun<\/a> <a href=\"https:\/\/blog.cloudflare.com\/chaos-in-cloudflare-lisbon-office-securing-the-internet-with-wave-motion\/\" rel=\"nofollow noopener\" target=\"_blank\">new<\/a> <a href=\"https:\/\/blog.cloudflare.com\/harnessing-office-chaos\/\" rel=\"nofollow noopener\" target=\"_blank\">sources<\/a> of <a href=\"https:\/\/blog.cloudflare.com\/league-of-entropy\/\" rel=\"nofollow noopener\" target=\"_blank\">randomness<\/a>. However, we\u2019d like to emphasize that randomness derived from quantum effects is not necessary to combat threats from quantum computers. Quantum computers do not enable any practical new attacks against classical TRNGs in widespread use today. Your decision to invest in QRNGs should be based on a perceived improvement in the quality of randomness they produce and not on a perceived threat to classical TRNGs from quantum computing.<\/p>\n<p>      Post-quantum cryptography at Cloudflare<br \/>\n      <a href=\"#post-quantum-cryptography-at-cloudflare\" aria-hidden=\"true\" class=\"relative sm:absolute sm:-left-5\"><\/p>\n<p>      <\/a><\/p>\n<p>Cloudflare has been at the forefront of developing and deploying PQC, and we are committed to making PQC available <a href=\"https:\/\/blog.cloudflare.com\/post-quantum-crypto-should-be-free\" rel=\"nofollow noopener\" target=\"_blank\">for free and by default<\/a> for all of our products. And we run it at scale \u2014 already <a href=\"https:\/\/radar.cloudflare.com\/explorer?dataSet=http&amp;groupBy=post_quantum&amp;filters=botClass%253DLIKELY_HUMAN&amp;dt=1d\" rel=\"nofollow noopener\" target=\"_blank\">over 40% of the human-generated traffic<\/a> to our network uses PQC.<\/p>\n<p>So what\u2019s in that 40%? PQC is supported for all <a href=\"https:\/\/developers.cloudflare.com\/ssl\/post-quantum-cryptography\/\" rel=\"nofollow noopener\" target=\"_blank\">website and API traffic<\/a> served through Cloudflare, most of Cloudflare\u2019s <a href=\"https:\/\/blog.cloudflare.com\/post-quantum-cryptography-ga\" rel=\"nofollow noopener\" target=\"_blank\">internal network traffic<\/a>, and traffic running over our <a href=\"https:\/\/blog.cloudflare.com\/post-quantum-zero-trust\/\" rel=\"nofollow noopener\" target=\"_blank\">Zero-Trust platform<\/a>. All these connections use post-quantum key agreement to protect against the \u201c<a href=\"https:\/\/en.wikipedia.org\/wiki\/Harvest_now,_decrypt_later\" rel=\"nofollow noopener\" target=\"_blank\">harvest now, decrypt later<\/a>\u201d threat, where an adversary intercepts and stores encrypted data today with the hope of decrypting with a quantum computer or other cryptanalytic advances in the future. Key agreement is an important first step, but there\u2019s still more work to be done. We\u2019re <a href=\"https:\/\/mailarchive.ietf.org\/arch\/msg\/ietf-announce\/OWIjlOTCI_PIO0S2O9NHj8YUY0I\/\" rel=\"nofollow noopener\" target=\"_blank\">actively working<\/a> with stakeholders in the industry to prepare for the upcoming migration to post-quantum signatures to prevent active impersonation attacks from quantum adversaries (after Q-day).<\/p>\n<p>      Quantum readiness strategy<br \/>\n      <a href=\"#quantum-readiness-strategy\" aria-hidden=\"true\" class=\"relative sm:absolute sm:-left-5\"><\/p>\n<p>      <\/a><\/p>\n<p>If purchasing quantum hardware is not necessary, how should organizations <a href=\"https:\/\/www.cloudflare.com\/the-net\/quantum-computing\/\" rel=\"nofollow noopener\" target=\"_blank\">prepare for a quantum future<\/a>? The most effective strategy will depend on your organization\u2019s individual needs, but some general strategies will pay off for most organizations:<\/p>\n<p>Investing in basic security practices is a good start. Hire the right expertise if you don\u2019t already have it. Find vendors that support post-quantum encryption in their offerings today, and whose products are cryptographically agile so you can enjoy a seamless transition to <a href=\"https:\/\/blog.cloudflare.com\/another-look-at-pq-signatures\/\" rel=\"nofollow noopener\" target=\"_blank\">post-quantum signatures<\/a> and certificates when the industry migrates before Q-day. Follow a tunneling strategy: routing application traffic over the Internet via <a href=\"https:\/\/developers.cloudflare.com\/ssl\/post-quantum-cryptography\/pqc-and-zero-trust\/\" rel=\"nofollow noopener\" target=\"_blank\">secure quantum safe tunnels<\/a> allows you to reduce your attack surface area with minimal changes to existing systems. If you\u2019re already a Cloudflare customer (or want to be), our <a href=\"https:\/\/www.cloudflare.com\/application-services\/products\/cdn\/\" rel=\"nofollow noopener\" target=\"_blank\">Content Distribution Network<\/a> and <a href=\"https:\/\/blog.cloudflare.com\/post-quantum-zero-trust\/\" rel=\"nofollow noopener\" target=\"_blank\">Zero Trust platform<\/a> makes this easy. Learn more about how we can help at our <a href=\"https:\/\/www.cloudflare.com\/pqc\" rel=\"nofollow noopener\" target=\"_blank\">Post-Quantum Cryptography<\/a> webpage.<\/p>\n","protected":false},"excerpt":{"rendered":"Organizations have finite resources available to combat threats, both by the adversaries of today and those in the&hellip;\n","protected":false},"author":2,"featured_media":169722,"comment_status":"","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[46],"tags":[191,74],"class_list":{"0":"post-169721","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-computing","8":"tag-computing","9":"tag-technology"},"_links":{"self":[{"href":"https:\/\/www.newsbeep.com\/us\/wp-json\/wp\/v2\/posts\/169721","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.newsbeep.com\/us\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.newsbeep.com\/us\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.newsbeep.com\/us\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.newsbeep.com\/us\/wp-json\/wp\/v2\/comments?post=169721"}],"version-history":[{"count":0,"href":"https:\/\/www.newsbeep.com\/us\/wp-json\/wp\/v2\/posts\/169721\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.newsbeep.com\/us\/wp-json\/wp\/v2\/media\/169722"}],"wp:attachment":[{"href":"https:\/\/www.newsbeep.com\/us\/wp-json\/wp\/v2\/media?parent=169721"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.newsbeep.com\/us\/wp-json\/wp\/v2\/categories?post=169721"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.newsbeep.com\/us\/wp-json\/wp\/v2\/tags?post=169721"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}