{"id":47029,"date":"2022-06-08T03:27:23","date_gmt":"2022-06-08T03:27:23","guid":{"rendered":"https:\/\/www.darkreading.com\/dr-tech\/now-is-the-time-to-plan-for-post-quantum-cryptography"},"modified":"2022-06-08T03:27:23","modified_gmt":"2022-06-08T03:27:23","slug":"now-is-the-time-to-plan-for-post-quantum-cryptography","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/now-is-the-time-to-plan-for-post-quantum-cryptography\/","title":{"rendered":"Now Is the Time to Plan for Post-Quantum Cryptography"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt31bd2ace46a45765\/625dba8a5b34626c0e5cf507\/quantum-computer-Bartek-Wr\u00f3blewski-AdobeStock.jpeg\" class=\"ff-og-image-inserted\"><\/div>\n<p>RSA CONFERENCE 2022 \u2014 Even the most future-facing panels at the 2022 RSA Conference in San Francisco are grounded in the lessons of the past. At the post-quantum cryptography keynote &#8220;Wells Fargo PQC Program: The Five Ws,&#8221; the moderator evoked the upheaval from RSAC 1999 when a team from Electronic Frontier Foundation and Distributed.net broke the Data Encryption Standard (DES) in less than a day.<\/p>\n<p>&#8220;We&#8217;re trying to avoid the scramble&#8221; when classical cryptography techniques like <a href=\"https:\/\/www.darkreading.com\/emerging-tech\/qusecure-launches-vision-for-post-rsa-world\" target=\"_blank\" rel=\"noopener\">elliptic curve and the RSA algorithm<\/a> inevitably fall to quantum decrypting, said moderator Sam Phillips, chief architect for information security architecture at Wells Fargo. And he set up the high stakes encryption battles often have: &#8220;Where were all the DES implemented? Hint: ATM machines.&#8221;<\/p>\n<p>&#8220;We had to set up teams to see where-all we were using [DES], and then establish the migration plan based upon using a risk-based approach,&#8221; Phillips said. &#8220;We&#8217;re trying to avoid that by really trying to get ahead of the game and do some planning in this case.&#8221;<\/p>\n<p>Phillips was joined on stage by Dale Miller, chief architect of information security architecture at Wells Fargo, and Richard Toohey, technology analyst at Wells Fargo.<\/p>\n<h2 class=\"regular-text\">A Brief Explanation of Quantum Computing<\/h2>\n<p>Toohey, a doctoral candidate at Cornell University, handled most of the technical aspects of quantum computing during the panel. He explained, &#8220;For most problems, if you have a quantum calculator and a regular calculator, they can add numbers just as well. There&#8217;s a very small subset of problems that are classically very hard, but for a quantum computer, they can solve very efficiently.&#8221;<\/p>\n<p>These problems that quantum computers handle better than conventional computers are called np-hard problems. &#8220;A lot of cryptography, specifically in asymmetric cryptography, relies on these np-hard type problems \u2014 things like elliptic curve cryptography; the RSA algorithm, famously \u2014 and when quantum computers are developed enough, they&#8217;ll be able to <a href=\"https:\/\/www.darkreading.com\/edge-articles\/backward-compatible-post-quantum-communications-is-a-matter-of-national-security\" target=\"_blank\" rel=\"noopener\">brute-force their way through these<\/a>,&#8221; Toohey explained. &#8220;So that breaks a lot of our modern classical cryptography.&#8221;<\/p>\n<p>The reason why we don&#8217;t have crypto-breaking quantum computers today, despite <a href=\"https:\/\/www.darkreading.com\/vulnerabilities-threats\/after-a-year-of-quantum-advances-the-time-to-protect-is-now\" target=\"_blank\" rel=\"noopener\">headline-making offerings from IBM and others<\/a>, is because the technology to reach that level of power has not been accomplished yet. Toohey said, &#8220;To become a cryptographically relevant quantum computer, a quantum computer needs to have about 1-10 million logical qubits, and those logical qubits all need to be made up of about 1,000 physical qubits. Today, right now, the largest quantum computers are somewhere around 120 physical qubits.&#8221; He estimated that to even muster the first logical qubit will take three years, and from there, it&#8217;s got to scale up to &#8220;a million or so logical qubits. So it&#8217;s still quite a few years away.&#8221;<\/p>\n<p>Another of the technical challenges that needs solving before we get these powerful quantum computers is the cooling systems they require. As Toohey said, &#8220;Qubits are incredibly sensitive; most of them have to be held at very low, cryogenic temperatures. So because of that, quantum computing architecture is incredibly expensive right now.&#8221; Other problems include decoherence and error correction. The panel agreed that the combination of these issues means crypto-cracking quantum computers are 8-10 years away. But that doesn&#8217;t mean we have a decade to address PQC.<\/p>\n<h2 class=\"regular-text\">Now Is the Time<\/h2>\n<p>The panel was named for the journalistic model of five questions that start with w, but that didn&#8217;t come up until late in the audience Q&amp;A portion. Miller said, &#8220;Sam was asking the what, the who, the why, the where, and the when. So I think we&#8217;ve covered that in our conversations here.&#8221;<\/p>\n<p>Most of the titular questions were somewhat vague and a matter of judgment. However, on the concept of <a href=\"https:\/\/www.darkreading.com\/vulnerabilities-threats\/after-a-year-of-quantum-advances-the-time-to-protect-is-now\" target=\"_blank\" rel=\"noopener\">when you should start planning<\/a> for the post-quantum future, there was complete agreement: now. Miller said, &#8220;You&#8217;ve gotta start the process now, and you have to move yourself forward so that you are ready when a quantum computer comes along.&#8221;<\/p>\n<p>Phillips concurred, saying &#8220;There is not right now a quantum computer that is commercially viable, but the amount of money and effort going into the work there to move it forward because people recognize the benefits that are there, and we are recognizing the risk. We feel that it&#8217;s an eventuality, that we don&#8217;t know the exact time, and we don&#8217;t know when it&#8217;ll happen.&#8221;<\/p>\n<p>Toohey suggested beginning your preparations with a crypto inventory \u2014 again, <em>now<\/em>. &#8220;Discover where you have instances of certain algorithms or certain types of cryptography, because how many people were <a href=\"https:\/\/www.darkreading.com\/threat-intelligence\/l0g4j-attack-surface-remains-huge\" target=\"_blank\" rel=\"noopener\">using Log4j and had no idea<\/a> because it was buried so deep?&#8221; he said. &#8220;That&#8217;s a big ask, to know every type of cryptography used throughout your business with all your third parties \u2014 that&#8217;s not trivial. That&#8217;s a lot of work, and that&#8217;s going to need to be started now.&#8221;<\/p>\n<p>&#8220;What we&#8217;re trying to do right now is drive ourselves toward a goal: five years&#8221; until Wells Fargo is ready to run post-quantum cryptography, Miller said. &#8220;The key is: large company, five years, is a very aggressive goal. So, the time to start is now, and that&#8217;s one of the most important takeaways from this get-together.&#8221;<\/p>\n<h2 class=\"regular-text\">Crypto Agility Gets You to Quantum Resilience<\/h2>\n<p>Pivoting is a key marker of agility for the panel, and agility is vital for being able to react to not just quantum threats, but whatever comes next. &#8220;The goal here should be crypto agility, where you&#8217;re able to modify your algorithms fairly quickly across your enterprise and be able to counter a quantum-based attack,&#8221; Miller said. &#8220;And I&#8217;m really not thinking on a day-to-day basis about when is the quantum computer going to get here. For us, it&#8217;s more about laying a path and a track for quantum resiliency for the organization.&#8221;<\/p>\n<p>Toomey agreed on the importance of agility. He said, &#8220;Whether it&#8217;s a quantum computer or new developments in classical computing, we don&#8217;t want to be put in a position where it takes us 10 years to do any kind of cryptographic transition. We want to be able to pivot and adapt to the market as new threats come out.&#8221;<\/p>\n<p>Because there will be computers that can break current cryptography techniques, organizations do need to develop <a href=\"https:\/\/www.darkreading.com\/edge-articles\/harnessing-quantum-tech-to-strengthen-internet-security\" target=\"_blank\" rel=\"noopener\">new encryption methods<\/a> that stand up to quantum brute-force attacks. But that&#8217;s only the half of it. Phillips said, &#8220;Don&#8217;t just focus on the algorithms. Start looking at your data. What data are you transiting back and forth? And look at devaluing that data. Where do you need to have that confidential information, and what can you do to remove that from the exposure? It will help a lot not only in the crypto efforts, but in terms of who has access to the data and why they have to have access.&#8221;<\/p>\n<h2 class=\"regular-text\">You&#8217;ve Got to Have Standards<\/h2>\n<p>One open question loomed over the discussion: When would NIST announce its picks for the new standards to develop for post-quantum cryptography? The answer is: not yet.<\/p>\n<p>The lack of certainty is no cause for inaction, Miller said. &#8220;So NIST will continue to work with other vendors and other companies and research groups to look at algorithms that are further out there. Our job is to be able to allow those algorithms to come into place quickly, in a very orderly manner without disrupting business or breaking your business processes and be able to keep things moving along.&#8221;<\/p>\n<p>Phillips agreed. &#8220;That&#8217;s one of the reasons for pushing on plug and play. Because we know that the first set of algorithms that come out may not satisfy the long-term need, and we don&#8217;t want to keep jumping through these hoops every time somebody goes through it.&#8221;<\/p>\n<p>Toohey tied the standards question back into the concept of preparing <em>now<\/em>: &#8220;That way, when NIST finally finish publishing their recommendations, and standards get developed in the coming years, we&#8217;re ready as an industry to be able to take that and tackle it.&#8221;<\/p>\n<p>He added, &#8220;That&#8217;s going back to crypto agility, and this mindset that we need to be able to plug and play, we need to be able to pivot as an industry very quickly to new and developing threats.&#8221;<\/p>\n<p>Read More <a href=\"https:\/\/www.darkreading.com\/dr-tech\/now-is-the-time-to-plan-for-post-quantum-cryptography\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Panelists from an RSA Conference keynote agreed that organizations need to begin work on PQC migration, if they haven&#8217;t already.Read More <a href=\"https:\/\/www.darkreading.com\/dr-tech\/now-is-the-time-to-plan-for-post-quantum-cryptography\">HERE<\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[151],"tags":[],"class_list":["post-47029","post","type-post","status-publish","format-standard","hentry","category-darkreading-ti"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Now Is the Time to Plan for Post-Quantum Cryptography 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/now-is-the-time-to-plan-for-post-quantum-cryptography\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Now Is the Time to Plan for Post-Quantum Cryptography 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/now-is-the-time-to-plan-for-post-quantum-cryptography\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2022-06-08T03:27:23+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"432\" \/>\n\t<meta property=\"og:image:height\" content=\"435\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/now-is-the-time-to-plan-for-post-quantum-cryptography\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/now-is-the-time-to-plan-for-post-quantum-cryptography\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Now Is the Time to Plan for Post-Quantum Cryptography\",\"datePublished\":\"2022-06-08T03:27:23+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/now-is-the-time-to-plan-for-post-quantum-cryptography\\\/\"},\"wordCount\":1386,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"articleSection\":[\"DarkReading |TI\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/now-is-the-time-to-plan-for-post-quantum-cryptography\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/now-is-the-time-to-plan-for-post-quantum-cryptography\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/now-is-the-time-to-plan-for-post-quantum-cryptography\\\/\",\"name\":\"Now Is the Time to Plan for Post-Quantum Cryptography 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"datePublished\":\"2022-06-08T03:27:23+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/now-is-the-time-to-plan-for-post-quantum-cryptography\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/now-is-the-time-to-plan-for-post-quantum-cryptography\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/now-is-the-time-to-plan-for-post-quantum-cryptography\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Now Is the Time to Plan for Post-Quantum Cryptography\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Now Is the Time to Plan for Post-Quantum Cryptography 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/now-is-the-time-to-plan-for-post-quantum-cryptography\/","og_locale":"en_US","og_type":"article","og_title":"Now Is the Time to Plan for Post-Quantum Cryptography 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/now-is-the-time-to-plan-for-post-quantum-cryptography\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2022-06-08T03:27:23+00:00","og_image":[{"width":432,"height":435,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/now-is-the-time-to-plan-for-post-quantum-cryptography\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/now-is-the-time-to-plan-for-post-quantum-cryptography\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Now Is the Time to Plan for Post-Quantum Cryptography","datePublished":"2022-06-08T03:27:23+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/now-is-the-time-to-plan-for-post-quantum-cryptography\/"},"wordCount":1386,"commentCount":0,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"articleSection":["DarkReading |TI"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.threatshub.org\/blog\/now-is-the-time-to-plan-for-post-quantum-cryptography\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/now-is-the-time-to-plan-for-post-quantum-cryptography\/","url":"https:\/\/www.threatshub.org\/blog\/now-is-the-time-to-plan-for-post-quantum-cryptography\/","name":"Now Is the Time to Plan for Post-Quantum Cryptography 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"datePublished":"2022-06-08T03:27:23+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/now-is-the-time-to-plan-for-post-quantum-cryptography\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/now-is-the-time-to-plan-for-post-quantum-cryptography\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/now-is-the-time-to-plan-for-post-quantum-cryptography\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Now Is the Time to Plan for Post-Quantum Cryptography"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/47029","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=47029"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/47029\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=47029"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=47029"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=47029"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}