For decades, modern cryptography has quietly done its job. RSA, elliptic curve cryptography (ECC), and trusted hash functions have secured everything from online banking and VPNs to cloud workloads and software updates. Most organisations rarely question these foundations—until now.
Quantum computing changes that assumption.
While large-scale, cryptographically relevant quantum computers are not yet widely available, the threat they pose to today’s encryption is very real and very well understood. In cybersecurity circles, post-quantum cryptography (PQC) is no longer a niche research topic—it’s a strategic planning issue.
In my experience working with enterprise environments, the biggest risk isn’t that quantum computers will suddenly appear tomorrow. It’s that organisations wait too long to prepare, underestimating how long cryptographic migrations actually take.
Why Quantum Computing Is a Security Problem—Not Just a Science Breakthrough
Quantum computing promises enormous benefits: faster drug discovery, advanced material science, and optimisation problems that classical computers struggle with. But that same power breaks assumptions that current cryptography relies on.
Algorithms like RSA and ECC depend on mathematical problems that are hard for classical computers—factoring large integers or solving discrete logarithms. Quantum computers running Shor’s algorithm can solve those problems exponentially faster.
To be clear:
- RSA-2048
- ECDSA
- ECDH
…are all fundamentally broken in a future where large-scale quantum computers exist.
This isn’t speculation. It’s mathematics.
What Is Post-Quantum Cryptography (PQC)?
Post-Quantum Cryptography refers to cryptographic algorithms designed to remain secure even if an attacker has access to a powerful quantum computer.
Unlike Quantum Key Distribution (QKD), which requires specialised quantum hardware and infrastructure, PQC runs on classical systems. That makes it far more practical for global adoption across the internet, cloud platforms, and enterprise networks.
PQC algorithms are based on mathematical problems that are believed to be hard for both classical and quantum computers, such as lattice problems, hash constructions, and error-correcting codes.
The goal isn’t perfection—it’s risk reduction at scale.
NIST and the Reality of Standardisation
One of the most important developments in PQC is the work being done by NIST (National Institute of Standards and Technology).
After years of global research, cryptanalysis, and competition, NIST has begun standardising specific PQC algorithms. This is critical, because organisations cannot responsibly adopt cryptography that hasn’t been rigorously vetted.
From a real-world security perspective, standardisation matters more than novelty. Security teams don’t want experimental crypto—they want stable, reviewed, interoperable standards that vendors will actually support.
NIST’s selections signal where the industry is heading, not just academically, but operationally.
The Real Threat: “Harvest Now, Decrypt Later”
One of the most misunderstood aspects of quantum risk is timing.
Attackers don’t need a quantum computer today to exploit quantum weaknesses tomorrow.
Many adversaries—particularly nation-state actors—are already engaging in “harvest now, decrypt later” attacks. They capture encrypted traffic today with the expectation that it can be decrypted years from now once quantum capabilities mature.
This matters most for data with long-term sensitivity, such as:
- Government communications
- Intellectual property
- Healthcare records
- Financial data
- Legal and contractual information
If that data needs to remain confidential for 10, 20, or 30 years, current encryption may not be enough.
Major Families of Post-Quantum Cryptography Algorithms
From an implementation standpoint, not all PQC algorithms are equal. Each family has trade-offs that matter in production environments.
Lattice-Based Cryptography
This is currently the frontrunner for widespread adoption.
- Strong security assumptions
- Relatively efficient performance
- Supported by NIST selections
Examples:
- CRYSTALS-Kyber (key exchange)
- CRYSTALS-Dilithium (digital signatures)
From a practitioner’s view, lattice-based crypto strikes the best balance between security and deployability.
Hash-Based Signatures
Hash-based schemes rely on well-understood hash functions and offer strong security guarantees.
Pros:
- Extremely robust security assumptions
Cons:
- Often limited to signatures only
- Can be operationally complex at scale
They’re excellent for specific use cases like firmware signing, but less flexible for general-purpose encryption.
Code-Based Cryptography
One of the oldest PQC approaches, with decades of analysis.
Example: Classic McEliece
Its biggest drawback in real environments is very large public key sizes, which can impact performance and storage.
Isogeny-Based Cryptography
Attractive due to compact key sizes, but has faced setbacks and ongoing scrutiny.
From a risk-management standpoint, many organisations are cautious here until the research stabilises.
Practical Challenges with Post-Quantum Cryptography
PQC is not a drop-in replacement. Anyone who tells you otherwise hasn’t tried to deploy it.
1. Performance and Key Size Overhead
Some PQC algorithms use significantly larger keys and signatures. This affects:
- TLS handshakes
- Mobile devices
- Embedded systems
- Network latency
2. Compatibility with Existing Systems
Legacy systems, older hardware, and proprietary protocols may not support PQC without upgrades—or full replacement.
3. Migration Complexity
Cryptography is deeply embedded across systems. Certificates, VPNs, APIs, identity platforms, and software updates all depend on it.
Migrating crypto takes years, not months.
Best Practices for Organisations Preparing for PQC
Based on real-world enterprise security programs, here’s what actually works:
Start with Visibility
Most organisations don’t even know where RSA or ECC is used. Perform a cryptographic inventory before planning anything else.
Use Hybrid Cryptography
Hybrid approaches combine classical and PQC algorithms, offering protection today while preparing for tomorrow.
This is the most realistic near-term strategy.
Protect High-Value Data Now
If data has long-term confidentiality requirements, encrypt it with quantum-resistant methods sooner rather than later.
Follow NIST and Vendor Roadmaps
Avoid experimental implementations. Focus on standards-backed algorithms with vendor support.
Test Early, Not Everywhere
Pilot PQC in non-production environments first. Learn where performance and compatibility issues appear.
Where Post-Quantum Cryptography Will Be Used First
In practice, PQC adoption will happen unevenly.
Early adoption areas include:
- TLS and HTTPS
- Software signing and update mechanisms
- VPNs and secure tunnels
- Government and defence systems
- Financial and critical infrastructure
Consumer systems will follow once tooling, performance, and standards mature.
The Future of Cryptography Is Hybrid—For a While
One hard truth: there will not be a clean switch from classical crypto to PQC.
For the foreseeable future, organisations will run hybrid cryptographic systems, balancing performance, compatibility, and long-term risk. That’s not a failure—it’s how secure transitions actually happen.
The organisations that succeed will be the ones that plan early, test realistically, and avoid panic-driven decisions.
Final Thoughts: Quantum Readiness Is a Leadership Issue
Post-Quantum Cryptography isn’t just a technical upgrade—it’s a strategic decision about data longevity and organisational risk tolerance.
The quantum era won’t arrive overnight. But when it does, the organisations that prepared early won’t be scrambling to protect yesterday’s data.
They’ll already be ready.
The real question isn’t if quantum-safe cryptography becomes necessary—it’s whether your organisation starts preparing before or after it becomes urgent.

From my early days on the helpdesk through roles as a service desk manager, systems administrator, and network engineer, I’ve spent more than 25 years in the IT world. As I transition into cyber security, my goal is to make tech a little less confusing by sharing what I’ve learned and helping others wherever I can.
