Prepare yourself for PQC and protect your data
Computers that exploit quantum mechanical properties offer the promise of (supposedly) unbreakable cryptography and other exciting applications, but they will also cause a huge, immediate problem: the day a large, practical quantum computer is developed, all existing widely-used asymmetric cryptography will be broken.
Post-Quantum Cryptography involves algorithms that run on classical computers, but are resistant to attack both by classical and quantum ones. A process is underway at NIST to standardise these algorithms so that the transition can start before large quantum computers become available. Here you can find links to our resources on post-quantum crypto, and how to start preparing by building your cryptographic inventory.
The advent of quantum computing makes cracking public key encryption entirely possible. What does this mean for the security of our existing data? How do we prepare ourselves to live in the post-quantum age?
At Cryptosense, we have followed several of our customers as they create or upgrade their cryptography inventory. We have seen that in practice, every organization’s cryptography inventory will be a little different, depending on how and where cryptography is used relative to the business-critical functions of the organization. Indeed, successful cryptography inventory projects typically apply a different methodology to different parts of the application estate or infrastructure, in order to prioritize resources to the most important areas.
In this whitepaper, we will discuss the lessons learned from these projects and the best practice approaches that will enable you to guide your own cryptography inventory project.