Post-Quantum Cryptography (PQC)

Prepare yourself for PQC and protect your data

Computers that exploit quantum mechanical properties offer the promise of (supposedly) unbreakable cryptography and other exciting applications, but they will also cause a huge, immediate problem: the day a large, practical quantum computer is developed, all existing widely-used asymmetric cryptography will be broken.

Post-Quantum Cryptography involves algorithms that run on classical computers, but are resistant to attack both by classical and quantum ones. A process is underway at NIST to standardise these algorithms so that the transition can start before large quantum computers become available. Here you can find links to our resources on post-quantum crypto, and how to start preparing by building your cryptographic inventory.

What is PQC?

The advent of quantum computing makes cracking public key encryption entirely possible. What does this mean for the security of our existing data? How do we prepare ourselves to live in the post-quantum age?

What is the latest PQC news?

Recent reports by ENISA (European equivalent to NIST) and the Cloud Security Alliance provide an interesting insight into the current state of the competition to create a new quantum-resistant algorithm.

Cryptography Inventory White Paper

How to Build and Maintain a Cryptography Inventory

At Cryptosense, we have followed several of our customers as they create or upgrade their cryptography inventory. We have seen that in practice, every organization’s cryptography inventory will be a little different, depending on how and where cryptography is used relative to the business-critical functions of the organization. Indeed, successful cryptography inventory projects typically apply a different methodology to different parts of the application estate or infrastructure, in order to prioritize resources to the most important areas.

In this whitepaper, we will discuss the lessons learned from these projects and the best practice approaches that will enable you to guide your own cryptography inventory project.

Already registered? Log in here.

Welcome!

As a subscriber to our Knowledge Base, you have free access to all of our white papers, on-demand webinars and more.
Download white paper

Register now

Register for free access to all of our white papers, on-demand webinars and more.

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.