Feature series – PQC

Group of people in front of a whiteboard - lanning for PQC

Part 5 – Implementing Quantum-Resistant Encryption

Practical advice for choosing solutions, avoiding pitfalls, and future-proofing your systems Earlier articles looked at the quantum threat to current encryption, some of the myths and misconceptions that come up in discussion of the risks and solutions, and how to start planning your response. This article moves on to look at executing on your plan – in particular how to choose […]

Part 5 – Implementing Quantum-Resistant Encryption Read More »

Feature series - PQC
Two people in front of a whiteboard planning quantum risk mitigation

Part 4 – A practical guide to start planning your transition to post-quantum cryptography

Although a “cryptographically relevant quantum computer” may be several years away, you really should start now to understand and plan what you need to do to be ready.
This article reviews some of the potential challenges to getting started, and then walk through some simple suggestions to help you to understand, prioritise and plan the work you need to do.

Part 4 – A practical guide to start planning your transition to post-quantum cryptography Read More »

Feature series - PQC

Part 3: Busting myths about solutions for the quantum threats to encryption

There is also confusion about the solutions for the challenges to encryption, creating myths that can lead to poor decisions. Hopefully this will help you to identify which sources you can trust, and which ones are selling snake oil.

Myth 1 – Quantum random number generators will make you quantum safe

Part 3: Busting myths about solutions for the quantum threats to encryption Read More »

Feature series - PQC Myth busters
Group of people discussing quantum and security matters

The basics about quantum computing, encryption and cyber security

Quantum computing has transformative potential. In particular, certain calculations that are just impossible to do with current “classical” computers may become feasible with quantum computers. This capability can also create a cyber security threat, in particular to some of the modern encryption that we rely on. But what really is the threat, and what should we be doing?

The basics about quantum computing, encryption and cyber security Read More »

Explainers Feature series - PQC