Skip to content
Tiatra, LLCTiatra, LLC
Tiatra, LLC
Information Technology Solutions for Washington, DC Government Agencies
  • Home
  • About Us
  • Services
    • IT Engineering and Support
    • Software Development
    • Information Assurance and Testing
    • Project and Program Management
  • Clients & Partners
  • Careers
  • News
  • Contact
 
  • Home
  • About Us
  • Services
    • IT Engineering and Support
    • Software Development
    • Information Assurance and Testing
    • Project and Program Management
  • Clients & Partners
  • Careers
  • News
  • Contact

3 steps to prepare for a post-quantum cryptography world

The conversation around post-quantum cryptography (PQC) has shifted as we move into 2026. What once seemed a distant concern is now quite real, as experts are actively highlighting crypto hygiene problems. In short, it’s time to get your PQC act together.

The good news is we are also seeing early implementations of post-quantum solutions, including PQC-safe code signing for firmware and software, hybrid public key infrastructure certificates, and various PQC algorithm replacements in critical applications.

The quantum problem

Briefly stated, the problem at hand is that quantum computers promise to be powerful enough to crack the algorithmic keys used in today’s PKI systems. The only question is when these quantum computers will be available, to bad actors and the industry at large.

Gartner estimates that by 2029, advances in quantum computing will make standard asymmetric cryptography unsafe and by 2034, fully breakable. “Harvest-now, decrypt-later” attacks may already exist, Gartner says.1

Reasonable people can disagree on the timeline, but even if there’s a 10% chance that cryptographically relevant quantum computers (CRQC) are available in the next 3-5 years, that’s a risk few can afford to take, says Blair Canavan, Director of Alliances for the PKI & PQC Portfolio with the cybersecurity solution provider Thales Group. “It warrants action now,” he says.

Standards bodies are on board with that assessment. In the US, the National Institute of Standards and Technology (NIST) has approved four PQC algorithms for standardization2, along with a fifth just in case its first choice for the main algorithm doesn’t pan out.3

3 steps to prepare for PQC

Thales recommends enterprises take three specific actions to prepare for a PQC future.

1 – Assess your landscape. Cryptography is literally everywhere in today’s enterprises, including in servers, applications, APIs, network infrastructure, internet of things (IoT) components, and various types of hardware, including mobile devices. Then you’ve got the myriad components of your cryptography systems, including certificates and identities, encryption keys, ciphers, algorithms, libraries, and protocols.

“It’s like needles in a haystack and now you need to make them glow,” Canavan says. “Then you need to determine the scope and priority in which you’re going to address them.”

2 – Assess solutions. As vendors introduce solutions, enterprises must focus on the ability to abstract cryptography from underlying applications and devices.

Whereas today an application developer would specify which algorithm to employ for a given application, abstraction removes that obligation. Instead, the ultimate goal is to have the decision driven by cryptographically agile policy, on a dynamic basis. “Depending on the sensitivity of the application, you apply whatever algorithm policy is most appropriate,” Canavan says. “That’s what we’re aspiring to.”

3 – Focus on a NIST hybrid approach. A policy-driven approach to crypto also delivers the ability to swap out one algorithm for another. That makes it easier for organizations to comply with the hybrid approach NIST recommends.

“Nobody is going to flip a switch from classical to post-quantum overnight.” Canavan says. “You’re hedging bets. The idea is to use both and wean from one to another over time.”

That’s especially important given that all the NIST algorithms are new. As NIST’s choice of a fifth, “just in case” algorithm suggests, nobody is yet 100% sure which PQC algorithms will prove most effective.

“You’re being realistic,” Canavan says. “The pragmatic approach is to use both classic and PQC algorithms.”

It’s also pragmatic to acknowledge you’re likely to need guidance with the PQC transition. As Canavan explains, companies like Thales Group –– along with its extensive, experienced stable of ecosystem technology and delivery partners –– are ready to help.

There’s no time to waste. To learn more, visit the Thales Post-Quantum Cryptography Solutions page.


1 “Begin Transitioning to Post-Quantum Cryptography Now,” Sept. 30, 2024, Gartner.com.

2 “NIST Releases Four PQC Algorithms for Standardization,” April 13, 2024, Quantum Insider.

3 “NIST Selects HQC as Fifth Algorithm for Post-Quantum Encryption,” March 11, 2025, NIST.



Read More from This Article:
3 steps to prepare for a post-quantum cryptography world
Source: News

Category: NewsJanuary 14, 2026
Tags: art

Post navigation

PreviousPrevious post:From backup to business resilience: Inside Cognizant and Rubrik’s new BRaaS modelNextNext post:What you need to know — and do — about AI inferencing

Related posts

Architecting the AI backbone of intelligent insurance: How to engineer a scalable and performant enterprise AI platform
April 14, 2026
Nvidia announces quantum AI models
April 14, 2026
AI strategy theater: Why CIOs are performing innovation instead of leading it
April 14, 2026
Why CIOs are moving away from legacy consulting in the AI era
April 14, 2026
Corporate memory loss: How the global memory shortage is reshaping device planning
April 14, 2026
The IT Leader’s AI PC Planning Guide: Key Considerations and HP Device Recommendations
April 14, 2026
Recent Posts
  • Architecting the AI backbone of intelligent insurance: How to engineer a scalable and performant enterprise AI platform
  • Nvidia announces quantum AI models
  • AI strategy theater: Why CIOs are performing innovation instead of leading it
  • Why CIOs are moving away from legacy consulting in the AI era
  • Corporate memory loss: How the global memory shortage is reshaping device planning
Recent Comments
    Archives
    • April 2026
    • March 2026
    • February 2026
    • January 2026
    • December 2025
    • November 2025
    • October 2025
    • September 2025
    • August 2025
    • July 2025
    • June 2025
    • May 2025
    • April 2025
    • March 2025
    • February 2025
    • January 2025
    • December 2024
    • November 2024
    • October 2024
    • September 2024
    • August 2024
    • July 2024
    • June 2024
    • May 2024
    • April 2024
    • March 2024
    • February 2024
    • January 2024
    • December 2023
    • November 2023
    • October 2023
    • September 2023
    • August 2023
    • July 2023
    • June 2023
    • May 2023
    • April 2023
    • March 2023
    • February 2023
    • January 2023
    • December 2022
    • November 2022
    • October 2022
    • September 2022
    • August 2022
    • July 2022
    • June 2022
    • May 2022
    • April 2022
    • March 2022
    • February 2022
    • January 2022
    • December 2021
    • November 2021
    • October 2021
    • September 2021
    • August 2021
    • July 2021
    • June 2021
    • May 2021
    • April 2021
    • March 2021
    • February 2021
    • January 2021
    • December 2020
    • November 2020
    • October 2020
    • September 2020
    • August 2020
    • July 2020
    • June 2020
    • May 2020
    • April 2020
    • January 2020
    • December 2019
    • November 2019
    • October 2019
    • September 2019
    • August 2019
    • July 2019
    • June 2019
    • May 2019
    • April 2019
    • March 2019
    • February 2019
    • January 2019
    • December 2018
    • November 2018
    • October 2018
    • September 2018
    • August 2018
    • July 2018
    • June 2018
    • May 2018
    • April 2018
    • March 2018
    • February 2018
    • January 2018
    • December 2017
    • November 2017
    • October 2017
    • September 2017
    • August 2017
    • July 2017
    • June 2017
    • May 2017
    • April 2017
    • March 2017
    • February 2017
    • January 2017
    Categories
    • News
    Meta
    • Log in
    • Entries feed
    • Comments feed
    • WordPress.org
    Tiatra LLC.

    Tiatra, LLC, based in the Washington, DC metropolitan area, proudly serves federal government agencies, organizations that work with the government and other commercial businesses and organizations. Tiatra specializes in a broad range of information technology (IT) development and management services incorporating solid engineering, attention to client needs, and meeting or exceeding any security parameters required. Our small yet innovative company is structured with a full complement of the necessary technical experts, working with hands-on management, to provide a high level of service and competitive pricing for your systems and engineering requirements.

    Find us on:

    FacebookTwitterLinkedin

    Submitclear

    Tiatra, LLC
    Copyright 2016. All rights reserved.