{"id":51491,"date":"2023-04-13T20:59:00","date_gmt":"2023-04-13T20:59:00","guid":{"rendered":"https:\/\/www.darkreading.com\/dr-tech\/why-the-us-needs-quantum-safe-cryptography-deployed-now"},"modified":"2023-04-13T20:59:00","modified_gmt":"2023-04-13T20:59:00","slug":"why-the-us-needs-quantum-safe-cryptography-deployed-now","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/why-the-us-needs-quantum-safe-cryptography-deployed-now\/","title":{"rendered":"Why the US Needs Quantum-Safe Cryptography Deployed Now"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/bltefb5842e849149e9\/64386cd38bcd3d645efaf03a\/quantumcomputergermany-mauritius_images_GmbH-alamy.jpg\" class=\"ff-og-image-inserted\"><\/div>\n<p>While it&#8217;s not easy to predict the next breakthrough, most experts estimate quantum computers with tens of thousands of qubits that can crack current encryption will be developed by the mid-2030s.<\/p>\n<p>The challenge is not solely technical, and coordination across government and industry will be required to implement and deploy solutions. Aware of the impending threat, the US government is setting plans in motion. Last year the National Institute of Standards and Technology (NIST) announced <a href=\"https:\/\/www.darkreading.com\/emerging-tech\/nist-picks-four-quantum-resistant-cryptographic-algorithms\" target=\"_blank\" rel=\"noopener\">four quantum-resistant cryptographic (PQC)<\/a> algorithms it will develop into standards by 2024. The National Security Agency (NSA) set a <a href=\"https:\/\/fedscoop.com\/nsa-sets-2035-deadline-for-adoption-of-post-quantum-cryptography-across-natsec-systems\/\" target=\"_blank\" rel=\"noopener\">2035 deadline<\/a> for national security systems to implement PQC. And late last year Congress passed the <a href=\"https:\/\/www.congress.gov\/bill\/117th-congress\/house-bill\/7535\" target=\"_blank\" rel=\"noopener\">Quantum Computing Cybersecurity Preparedness Act<\/a>, which addresses the migration of all other federal government IT systems to PQC along the same timeline as the NSA.<\/p>\n<p>Why the urgency if the so-called &#8220;Q-Day&#8221; is likely <a href=\"https:\/\/www.forbes.com\/sites\/qai\/2023\/01\/24\/quantum-computing-is-coming-and-its-reinventing-the-tech-industry\/?sh=160800f014de\" target=\"_blank\" rel=\"noopener\">a decade away<\/a>? First, because US adversaries can record encrypted Internet traffic today, store it indefinitely, and then decrypt it once they have a capable quantum computer, known as <a href=\"https:\/\/www.darkreading.com\/edge-articles\/keep-today-s-encrypted-data-from-becoming-tomorrow-s-treasure\" target=\"_blank\" rel=\"noopener\">harvest now, decrypt later (HNDL)<\/a> schemes.<\/p>\n<p>Second, the process of cryptographic migration could take more than a decade to complete depending on the size and complexity of an organization and its IT architecture. The Internet has become so complex and dependent on infrastructure from different organizations that one weak link can undo all of the preparation by the others. And that decade lines up with the timeline for quantum computers that can break current cryptography.<\/p>\n<h2 class=\"regular-text\">Protecting All the Things<\/h2>\n<p>The tech industry will update a myriad of security standards to incorporate PQC algorithms to protect their intellectual property and other valuable data assets. Open source software needs to integrate these algorithms and standards. Major operating systems need to incorporate them as well, from Windows to Apple and Android.<\/p>\n<p>Beyond software, we also need hardware chips to implement these algorithms \u2014 especially hardware security modules that manage encryption keys in an extremely secure manner.<\/p>\n<p>Devices including smartphones, cars, industrial systems, and network infrastructure will also require upgrading. They all rely on cryptography to securely connect to the Internet and cloud-based control systems. We need to <a href=\"https:\/\/www.darkreading.com\/iot\/securing-the-internet-of-things-in-the-age-of-quantum-computing\" target=\"_blank\" rel=\"noopener\">protect the Internet of Things<\/a> from widespread hacking. These upgrades may be more difficult because they could rely on hardware encryption devices, such as SIM cards in smartphones.<\/p>\n<p>Last, and perhaps most importantly, the <a href=\"https:\/\/www.darkreading.com\/application-security\/nist-4-crypto-algorithms-post-quantum-world\" target=\"_blank\" rel=\"noopener\">public key infrastructure<\/a> that cryptography currently depends on needs to be upgraded to support PQC algorithms.<\/p>\n<h2 class=\"regular-text\">Making PQC Happen in the Real World<\/h2>\n<p>Cryptography on the Internet works because of trusted third parties known as <a href=\"https:\/\/www.darkreading.com\/dr-tech\/google-proposes-reducing-tls-cert-lifespan-to-90-days\" target=\"_blank\" rel=\"noopener\">certificate authorities<\/a>. Their job is to certify the authenticity of encryption keys. When you visit your bank&#8217;s website, a certificate authority is vouching for your bank&#8217;s encryption keys, allowing you to trust them. These authorities need to be upgraded to support PQC as well.<\/p>\n<p>Among the most important use cases is code signing. Every time your computer downloads a software update from the Internet, it verifies a digital signature that guarantees its authenticity and asserts that it hasn&#8217;t been modified by a hacker. This is extremely important because a malicious software update could effectively take control of your device and its data.<\/p>\n<p>PQC migration will begin with developing a <a href=\"https:\/\/www.darkreading.com\/dr-tech\/now-is-the-time-to-plan-for-post-quantum-cryptography\" target=\"_blank\" rel=\"noopener\">cryptographic inventory<\/a> that maps all of the cryptography deployed in an organization to identify potential vulnerabilities. A comprehensive cryptographic inventory will also help to create a migration road map and projected costs before analysis, remediation, and management begins.<\/p>\n<p>A hybrid approach to cryptography will also be required for some time, when both old and new encryption keys are simultaneously supported. With that infrastructure in place, enterprisewide upgrades can be implemented. <a href=\"https:\/\/www.darkreading.com\/vulnerabilities-threats\/crypto-agility-solving-for-the-inevitable\" target=\"_blank\" rel=\"noopener\">Cryptographic agility<\/a> will be essential to respond to evolving cybersecurity compliance requirements and threats, without requiring significant infrastructure changes, to ensure organizations maintain mission continuity.<\/p>\n<p>Efforts are already underway to bring visibility and acceleration to PQC adoption. NIST has industry collaborators working with it on a <a href=\"https:\/\/www.nccoe.nist.gov\/news-insights\/nccoe-announces-technology-collaborators-migration-post-quantum-cryptography-project\" target=\"_blank\" rel=\"noopener\">Migration to Post-Quantum Cryptography project<\/a>. The wireless industry has created a <a href=\"https:\/\/www.gsma.com\/newsroom\/press-release\/gsma-ibm-and-vodafone-establish-post-quantum-telco-network-taskforce\/\" target=\"_blank\" rel=\"noopener\">task force exploring standardization<\/a>. Workshops like <a href=\"https:\/\/rwpqc.org\/\" target=\"_blank\" rel=\"noopener\">Real World PQC<\/a> are bringing together global stakeholders.<\/p>\n<p>But the entire tech industry needs to move together with urgency to meet a threat that is already present. Regardless of whether <a href=\"https:\/\/www.darkreading.com\/edge-articles\/backward-compatible-post-quantum-communications-is-a-matter-of-national-security\" target=\"_blank\" rel=\"noopener\">Q-Day<\/a> is five or 50 years away, sensitive data and communications are vulnerable to exposure in the future without immediate, comprehensive action.<\/p>\n<p>Read More <a href=\"https:\/\/www.darkreading.com\/dr-tech\/why-the-us-needs-quantum-safe-cryptography-deployed-now\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Quantum computers might be a decade away, but guess how long it will take to switch systems over to post-quantum cryptography?Read More <a href=\"https:\/\/www.darkreading.com\/dr-tech\/why-the-us-needs-quantum-safe-cryptography-deployed-now\">HERE<\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[151],"tags":[],"class_list":["post-51491","post","type-post","status-publish","format-standard","hentry","category-darkreading-ti"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Why the US Needs Quantum-Safe Cryptography Deployed Now 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/why-the-us-needs-quantum-safe-cryptography-deployed-now\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Why the US Needs Quantum-Safe Cryptography Deployed Now 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/why-the-us-needs-quantum-safe-cryptography-deployed-now\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2023-04-13T20:59:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/bltefb5842e849149e9\/64386cd38bcd3d645efaf03a\/quantumcomputergermany-mauritius_images_GmbH-alamy.jpg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/why-the-us-needs-quantum-safe-cryptography-deployed-now\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/why-the-us-needs-quantum-safe-cryptography-deployed-now\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Why the US Needs Quantum-Safe Cryptography Deployed Now\",\"datePublished\":\"2023-04-13T20:59:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/why-the-us-needs-quantum-safe-cryptography-deployed-now\/\"},\"wordCount\":732,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/why-the-us-needs-quantum-safe-cryptography-deployed-now\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/bltefb5842e849149e9\/64386cd38bcd3d645efaf03a\/quantumcomputergermany-mauritius_images_GmbH-alamy.jpg\",\"articleSection\":[\"DarkReading |TI\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.threatshub.org\/blog\/why-the-us-needs-quantum-safe-cryptography-deployed-now\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/why-the-us-needs-quantum-safe-cryptography-deployed-now\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/why-the-us-needs-quantum-safe-cryptography-deployed-now\/\",\"name\":\"Why the US Needs Quantum-Safe Cryptography Deployed Now 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/why-the-us-needs-quantum-safe-cryptography-deployed-now\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/why-the-us-needs-quantum-safe-cryptography-deployed-now\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/bltefb5842e849149e9\/64386cd38bcd3d645efaf03a\/quantumcomputergermany-mauritius_images_GmbH-alamy.jpg\",\"datePublished\":\"2023-04-13T20:59:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/why-the-us-needs-quantum-safe-cryptography-deployed-now\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.threatshub.org\/blog\/why-the-us-needs-quantum-safe-cryptography-deployed-now\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/why-the-us-needs-quantum-safe-cryptography-deployed-now\/#primaryimage\",\"url\":\"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/bltefb5842e849149e9\/64386cd38bcd3d645efaf03a\/quantumcomputergermany-mauritius_images_GmbH-alamy.jpg\",\"contentUrl\":\"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/bltefb5842e849149e9\/64386cd38bcd3d645efaf03a\/quantumcomputergermany-mauritius_images_GmbH-alamy.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/why-the-us-needs-quantum-safe-cryptography-deployed-now\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.threatshub.org\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Why the US Needs Quantum-Safe Cryptography Deployed Now\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Why the US Needs Quantum-Safe Cryptography Deployed Now 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/why-the-us-needs-quantum-safe-cryptography-deployed-now\/","og_locale":"en_US","og_type":"article","og_title":"Why the US Needs Quantum-Safe Cryptography Deployed Now 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/why-the-us-needs-quantum-safe-cryptography-deployed-now\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2023-04-13T20:59:00+00:00","og_image":[{"url":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/bltefb5842e849149e9\/64386cd38bcd3d645efaf03a\/quantumcomputergermany-mauritius_images_GmbH-alamy.jpg","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/why-the-us-needs-quantum-safe-cryptography-deployed-now\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/why-the-us-needs-quantum-safe-cryptography-deployed-now\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Why the US Needs Quantum-Safe Cryptography Deployed Now","datePublished":"2023-04-13T20:59:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/why-the-us-needs-quantum-safe-cryptography-deployed-now\/"},"wordCount":732,"commentCount":0,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/why-the-us-needs-quantum-safe-cryptography-deployed-now\/#primaryimage"},"thumbnailUrl":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/bltefb5842e849149e9\/64386cd38bcd3d645efaf03a\/quantumcomputergermany-mauritius_images_GmbH-alamy.jpg","articleSection":["DarkReading |TI"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.threatshub.org\/blog\/why-the-us-needs-quantum-safe-cryptography-deployed-now\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/why-the-us-needs-quantum-safe-cryptography-deployed-now\/","url":"https:\/\/www.threatshub.org\/blog\/why-the-us-needs-quantum-safe-cryptography-deployed-now\/","name":"Why the US Needs Quantum-Safe Cryptography Deployed Now 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/why-the-us-needs-quantum-safe-cryptography-deployed-now\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/why-the-us-needs-quantum-safe-cryptography-deployed-now\/#primaryimage"},"thumbnailUrl":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/bltefb5842e849149e9\/64386cd38bcd3d645efaf03a\/quantumcomputergermany-mauritius_images_GmbH-alamy.jpg","datePublished":"2023-04-13T20:59:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/why-the-us-needs-quantum-safe-cryptography-deployed-now\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/why-the-us-needs-quantum-safe-cryptography-deployed-now\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/why-the-us-needs-quantum-safe-cryptography-deployed-now\/#primaryimage","url":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/bltefb5842e849149e9\/64386cd38bcd3d645efaf03a\/quantumcomputergermany-mauritius_images_GmbH-alamy.jpg","contentUrl":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/bltefb5842e849149e9\/64386cd38bcd3d645efaf03a\/quantumcomputergermany-mauritius_images_GmbH-alamy.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/why-the-us-needs-quantum-safe-cryptography-deployed-now\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Why the US Needs Quantum-Safe Cryptography Deployed Now"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/51491","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=51491"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/51491\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=51491"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=51491"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=51491"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}