top of page
The Quantum Threat is Coming - Andy Richings

The Quantum Threat is Coming - Andy Richings


 

Quantum computing is advancing fast, and Critical National Infrastructure (CNI), including space and defence, must prepare now. The challenge? It’s not just about quantum—it’s about cryptographic resilience.

 

 The Problem? Legacy Security is Not Built for the Future

Many CNI systems rely on RSA, ECC, and other asymmetric encryption methods that will be broken by Shor’s Algorithm once large-scale quantum computers become viable. Even symmetric encryption, while more resistant, is not immune—Grover’s Algorithm weakens AES-128, making AES-256 the minimum recommended standard for future security.

 

The Solution? Quantum-Resistant Cryptographic Agility

Security must be built into system architectures, not bolted on as an afterthought. Cryptographic Agility ensures systems can adapt to evolving cryptographic techniques, including NIST’s post-quantum cryptography (PQC) standards:

  •  Kyber (FIPS 203) – Lattice-based key exchange replacement for RSA/ECC.

  • Dilithium (FIPS 204) & Falcon (FIPS 205) – Post-quantum digital signatures.

  •  AES-256 + SHA-3 – Preferred symmetric cryptography choices to counter quantum brute-force threats.

 

What Can Be Done Now?


Raise Awareness – Many organisations don’t realise how quantum computing threatens current encryption. Educating leadership, security teams, and policymakers is the first step.

 

Assess Cryptographic Dependencies – Organisations must identify where they rely on RSA, ECC, and weak symmetric encryption before migration can begin.

 

Adopt Cryptographic Agility – Systems should be designed with modular, upgradable encryption frameworks that can transition to post-quantum cryptography without a full rebuild.

 

Test Post-Quantum Security Now – Hybrid approaches, such as Kyber + ECDH for key exchange, can help transition securely without breaking compatibility.

 

Act Now—Before It’s Too Late

Dr. Sana Belguith (UoB) is leading critical research on quantum-resistant migration strategies for CNI. While no system can be truly quantum-safe, they can be quantum-resistant—buying crucial time before quantum decryption becomes a real-world threat.

 

The transition to quantum-resistant security cannot wait. Will your systems withstand the future, or will they be left exposed?

 


 

The Quantum Threat is Coming - Andy Richings


 

Quantum computing is advancing fast, and Critical National Infrastructure (CNI), including space and defence, must prepare now. The challenge? It’s not just about quantum—it’s about cryptographic resilience.

 

 The Problem? Legacy Security is Not Built for the Future

Many CNI systems rely on RSA, ECC, and other asymmetric encryption methods that will be broken by Shor’s Algorithm once large-scale quantum computers become viable. Even symmetric encryption, while more resistant, is not immune—Grover’s Algorithm weakens AES-128, making AES-256 the minimum recommended standard for future security.

 

The Solution? Quantum-Resistant Cryptographic Agility

Security must be built into system architectures, not bolted on as an afterthought. Cryptographic Agility ensures systems can adapt to evolving cryptographic techniques, including NIST’s post-quantum cryptography (PQC) standards:

  •  Kyber (FIPS 203) – Lattice-based key exchange replacement for RSA/ECC.

  • Dilithium (FIPS 204) & Falcon (FIPS 205) – Post-quantum digital signatures.

  •  AES-256 + SHA-3 – Preferred symmetric cryptography choices to counter quantum brute-force threats.

 

What Can Be Done Now?


Raise Awareness – Many organisations don’t realise how quantum computing threatens current encryption. Educating leadership, security teams, and policymakers is the first step.

 

Assess Cryptographic Dependencies – Organisations must identify where they rely on RSA, ECC, and weak symmetric encryption before migration can begin.

 

Adopt Cryptographic Agility – Systems should be designed with modular, upgradable encryption frameworks that can transition to post-quantum cryptography without a full rebuild.

 

Test Post-Quantum Security Now – Hybrid approaches, such as Kyber + ECDH for key exchange, can help transition securely without breaking compatibility.

 

Act Now—Before It’s Too Late

Dr. Sana Belguith (UoB) is leading critical research on quantum-resistant migration strategies for CNI. While no system can be truly quantum-safe, they can be quantum-resistant—buying crucial time before quantum decryption becomes a real-world threat.

 

The transition to quantum-resistant security cannot wait. Will your systems withstand the future, or will they be left exposed?

 


 

The Quantum Threat is Coming - Andy Richings


 

Quantum computing is advancing fast, and Critical National Infrastructure (CNI), including space and defence, must prepare now. The challenge? It’s not just about quantum—it’s about cryptographic resilience.

 

 The Problem? Legacy Security is Not Built for the Future

Many CNI systems rely on RSA, ECC, and other asymmetric encryption methods that will be broken by Shor’s Algorithm once large-scale quantum computers become viable. Even symmetric encryption, while more resistant, is not immune—Grover’s Algorithm weakens AES-128, making AES-256 the minimum recommended standard for future security.

 

The Solution? Quantum-Resistant Cryptographic Agility

Security must be built into system architectures, not bolted on as an afterthought. Cryptographic Agility ensures systems can adapt to evolving cryptographic techniques, including NIST’s post-quantum cryptography (PQC) standards:

  •  Kyber (FIPS 203) – Lattice-based key exchange replacement for RSA/ECC.

  • Dilithium (FIPS 204) & Falcon (FIPS 205) – Post-quantum digital signatures.

  •  AES-256 + SHA-3 – Preferred symmetric cryptography choices to counter quantum brute-force threats.

 

What Can Be Done Now?


Raise Awareness – Many organisations don’t realise how quantum computing threatens current encryption. Educating leadership, security teams, and policymakers is the first step.

 

Assess Cryptographic Dependencies – Organisations must identify where they rely on RSA, ECC, and weak symmetric encryption before migration can begin.

 

Adopt Cryptographic Agility – Systems should be designed with modular, upgradable encryption frameworks that can transition to post-quantum cryptography without a full rebuild.

 

Test Post-Quantum Security Now – Hybrid approaches, such as Kyber + ECDH for key exchange, can help transition securely without breaking compatibility.

 

Act Now—Before It’s Too Late

Dr. Sana Belguith (UoB) is leading critical research on quantum-resistant migration strategies for CNI. While no system can be truly quantum-safe, they can be quantum-resistant—buying crucial time before quantum decryption becomes a real-world threat.

 

The transition to quantum-resistant security cannot wait. Will your systems withstand the future, or will they be left exposed?

 


 

bottom of page