El lado del mal - Cómo ser Quantum Safe y desplegar Post-Quantum Cryptography (PQC) con Cloudflare https://www.elladodelmal.com/2026/01/como-ser-quantum-safe-y-desplegar-post.html #Quantum #Criptografia #Cifrado #QuantumSafe #PQC #QuantumReadiness #Cloudflare
Cómo ser Quantum Safe y desplegar Post-Quantum Cryptography (PQC) con Cloudflare

Blog personal de Chema Alonso ( https://MyPublicInbox.com/ChemaAlonso ): Ciberseguridad, IA, Innovación, Tecnología, Cómics & Cosas Personasles.

How Quantum Computing Could Change Cybersecurity

1,043 words, 6 minutes read time.

Quantum computing is no longer a distant dream scribbled on whiteboards at research labs; it is a looming reality that promises to disrupt every corner of the digital landscape. For cybersecurity professionals, from the analysts sifting through logs at 2 a.m. to CISOs defending multimillion-dollar digital fortresses, the quantum revolution is both a threat and an opportunity. The very encryption schemes that secure our communications, financial transactions, and sensitive corporate data could be rendered obsolete by the computational power of qubits. This isn’t science fiction—it’s an urgent wake-up call. In this article, I’ll explore how quantum computing could break traditional cryptography, force the adoption of post-quantum defenses, and transform the way we model and respond to cyber threats. Understanding these shifts isn’t optional for security professionals anymore; it’s survival.

Breaking Encryption: The Quantum Threat to Current Security

The first and most immediate concern for anyone in cybersecurity is that quantum computers can render our existing cryptographic systems ineffective. Traditional encryption methods, such as RSA and ECC, rely on mathematical problems that classical computers cannot solve efficiently. RSA, for example, depends on the difficulty of factoring large prime numbers, while ECC leverages complex elliptic curve relationships. These are the foundations of secure communications, e-commerce, and cloud storage, and for decades, they have kept adversaries at bay. Enter quantum computing, armed with Shor’s algorithm—a method capable of factoring these massive numbers exponentially faster than any classical machine. In practical terms, a sufficiently powerful quantum computer could crack RSA-2048 in a matter of hours or even minutes, exposing sensitive data once thought safe. Grover’s algorithm further threatens symmetric encryption by effectively halving key lengths, making AES-128 more vulnerable than security architects might realize. In my years monitoring security incidents, I’ve seen teams underestimate risk, assuming that encryption is invulnerable as long as key lengths are long enough. Quantum computing demolishes that assumption, creating a paradigm where legacy systems and outdated protocols are no longer just inconvenient—they are liabilities waiting to be exploited.

Post-Quantum Cryptography: Building the Defenses of Tomorrow

As frightening as the threat is, the cybersecurity industry isn’t standing still. Post-quantum cryptography (PQC) is already taking shape, spearheaded by NIST’s multi-year standardization process. This isn’t just theoretical work; these cryptosystems are designed to withstand attacks from both classical and quantum computers. Lattice-based cryptography, for example, leverages complex mathematical structures that quantum algorithms struggle to break, while hash-based and code-based schemes offer alternative layers of protection for digital signatures and authentication. Transitioning to post-quantum algorithms is far from trivial, especially for large enterprises with sprawling IT infrastructures, legacy systems, and regulatory compliance requirements. Yet the work begins today, not tomorrow. From a practical standpoint, I’ve advised organizations to start by mapping cryptographic inventories, identifying where RSA or ECC keys are in use, and simulating migrations to PQC algorithms in controlled environments. The key takeaway is that the shift to quantum-resistant cryptography isn’t an optional upgrade—it’s a strategic imperative. Companies that delay this transition risk catastrophic exposure, particularly as nation-state actors and well-funded cybercriminal groups begin experimenting with quantum technologies in secret labs.

Quantum Computing and Threat Modeling: A Strategic Shift

Beyond encryption, quantum computing will fundamentally alter threat modeling and incident response. Current cybersecurity frameworks and MITRE ATT&CK mappings are built around adversaries constrained by classical computing limits. Quantum technology changes the playing field, allowing attackers to solve previously intractable problems, reverse-engineer cryptographic keys, and potentially breach systems thought secure for decades. From a SOC analyst’s perspective, this requires a mindset shift: monitoring, detection, and response strategies must anticipate capabilities that don’t yet exist outside of labs. For CISOs, the challenge is even greater—aligning board-level risk discussions with the abstract, probabilistic threats posed by quantum computing. I’ve observed that many security leaders struggle to communicate emerging threats without causing panic, but quantum computing isn’t hypothetical anymore. It demands proactive investment in R&D, participation in standardization efforts, and real-world testing of quantum-safe protocols. In the trenches, threat hunters will need to refine anomaly detection models, factoring in the possibility of attackers leveraging quantum-powered cryptanalysis or accelerating attacks that once required months of computation. The long-term winners in cybersecurity will be those who can integrate quantum risk into their operational and strategic planning today.

Conclusion: Preparing for the Quantum Era

Quantum computing promises to be the most disruptive force in cybersecurity since the advent of the internet itself. The risks are tangible: encryption once considered unbreakable may crumble, exposing sensitive data; organizations that ignore post-quantum cryptography will face immense vulnerabilities; and threat modeling will require a fundamental reevaluation of attacker capabilities. But this is not a reason for despair—it is a call to action. Security professionals who begin preparing now, by inventorying cryptographic assets, adopting post-quantum strategies, and updating threat models, will turn the quantum challenge into a competitive advantage. In my years in the field, I’ve learned that the edge in cybersecurity always belongs to those who anticipate the next wave rather than react to it. Quantum computing is that next wave, and the time to surf it—or be crushed—is now. For analysts, architects, and CISOs alike, embracing this reality is the only way to ensure our digital fortresses remain unbreachable in a world that quantum computing is poised to redefine.

Call to Action

If this breakdown helped you think a little clearer about the threats out there, don’t just click away. Subscribe for more no-nonsense security insights, drop a comment with your thoughts or questions, or reach out if there’s a topic you want me to tackle next. Stay sharp out there.

D. Bryan King

Sources

NIST: Post-Quantum Cryptography Standardization
NISTIR 8105: Report on Post-Quantum Cryptography
CISA Cybersecurity Advisories
Mandiant Annual Threat Report
MITRE ATT&CK Framework
Schneier on Security Blog
KrebsOnSecurity
Verizon Data Breach Investigations Report
Shor, Peter W. (1994) Algorithms for Quantum Computation: Discrete Logarithms and Factoring
Grover, Lov K. (1996) A Fast Quantum Mechanical Algorithm for Database Search
Black Hat Conference Materials
DEF CON Conference Archives

Disclaimer:

The views and opinions expressed in this post are solely those of the author. The information provided is based on personal research, experience, and understanding of the subject matter at the time of writing. Readers should consult relevant experts or authorities for specific guidance related to their unique situations.

#advancedPersistentThreat #AES #boardLevelCybersecurity #CISO #cloudSecurity #codeBasedCryptography #cryptanalysis #cryptographyMigration #cyberAwareness #cyberDefense #cyberDefenseStrategy #cyberInnovation #cyberPreparedness #cyberResilience #cyberRisk #cyberStrategy #cyberattack #cybersecurity #cybersecurityChallenges #cybersecurityFrameworks #cybersecurityTrends #dataProtection #digitalFortresses #digitalSecurity #ECC #emergingThreats #encryption #encryptionKeys #futureProofSecurity #GroverSAlgorithm #hashingAlgorithms #incidentResponse #ITSecurityLeadership #latticeBasedCryptography #legacySystems #MITREATTCK #nationStateThreat #networkSecurity #NISTPQC #postQuantumCryptography #quantumComputing #quantumComputingImpact #quantumEraSecurity #quantumReadiness #quantumRevolution #quantumThreat #quantumResistantCryptography #quantumSafeAlgorithms #quantumSafeProtocols #RSA #secureCommunications #securityBestPractices #securityPlanning #ShorSAlgorithm #SOCAnalyst #threatHunting #threatIntelligence #ThreatModeling #zeroTrust

My blog PostQuantum.com just went over 1M unique visitors in 30 days. 37K in the last day.

The message is clear: Quantum security is no longer niche - and people are trying to cut through the hype, confusion, and pseudo-expert noise.

If you need well-researched, cited guidance: https://postquantum.com

#QuantumSecurity #PQC #PostQuantum #QuantumReadiness

A single day with 4 breakthrough quantum tech developments - each with the potential to accelerate the arrival of Q-Day.

That’s exactly what happened on Sept 24–25.
I break it all down in the first issue of The Quantum Observer: https://quantumobserver.com/p/quantums-wild-week

#QuantumComputing #PQC #QDay #PostQuantum #QuantumReadiness #QuantumResilience

Quantum’s Wild Week

The week quantum research smashed timelines and regulators and industry organizations yelled “Move faster!”

The Quantum Observer
The debate on “when will quantum break encryption” has extremes: some claim it’s imminent, others say it’s decades away. The truth is likely in the middle. This analysis cuts through hype: Q-Day isn’t tomorrow, but it’s no longer on a distant horizon either. 2030 now looks like a real possibility (the author even moved their prediction up from 2032). The takeaway: prepare now, don’t panic later. #QuantumReadiness https://postquantum.com/post-quantum/q-day-y2q-rsa-broken-2030/
Q-Day Revisited – RSA-2048 Broken by 2030: Detailed Analysis

It’s time to mark a controversial date on the calendar: 2030 is the year RSA-2048 will be broken by a quantum computer. That’s my bold prediction, and I don’t make it lightly. In cybersecurity circles, the countdown to “Q-Day” or Y2Q (the day a cryptographically relevant quantum computer cracks our public-key encryption) has been a topic of intense debate. Lately, the noise has become deafening: some doom-and-gloom reports insist the quantum cryptopocalypse is just a year or two away, while hardened skeptics claim it’s so distant as to never happen. The truth lies between these extremes. A sober analysis of

PostQuantum - Quantum Computing, Quantum Security, PQC
Step 1 for #QuantumReadiness: inventory ALL your cryptography. Sounds simple, but in practice it’s a massive undertaking. This article makes it clear: cryptography is deeply embedded and often hidden in hardware, firmware, software layers. Identifying every algorithm, library, and key in use is hard – but it’s mandatory to know where you’re vulnerable to quantum. Many orgs are shocked at how many places crypto lurks once they look. #PQC https://postquantum.com/post-quantum/quantum-cryptographic-inventory/
How to Perform a Comprehensive Quantum Readiness Cryptographic Inventory

A cryptographic inventory is essentially a complete map of all cryptography used in an organization’s systems – and it is vital for understanding quantum-vulnerable assets and planning remediation. In theory it sounds straightforward: “list all your cryptography.” In practice, however, building a full cryptographic inventory is an extremely complex, lengthy endeavor. Many enterprises find that even identifying all their IT assets is challenging, let alone uncovering every cryptographic component hidden within those assets. Cryptography often lurks in multiple layers of hardware, software, and firmware, making it difficult to spot. Despite the difficulty, performing a thorough inventory is strongly recommended (or

PostQuantum - Quantum Computing, Quantum Security, PQC
Is there evidence of HNDL happening? It’s likely but classified. The concept is well-known in intel circles. The article suggests that even though specific cases aren’t public (for obvious reasons), it’s prudent to assume that eavesdroppers are stockpiling encrypted traffic. So, organizations should prioritize encrypting data with algorithms that won’t be toast on Q-Day. If you have data that needs to stay secret into the 2030s, act now to protect it. #QuantumReadiness https://postquantum.com/post-quantum/harvest-now-decrypt-later-hndl/
Harvest Now, Decrypt Later (HNDL) Risk

'Harvest Now, Decrypt Later' (HNDL), also known as 'Store Now, Decrypt Later' (SNDL), is a concerning risk where adversaries collect encrypted data with the intent to decrypt it once quantum computing becomes capable of breaking current encryption methods. This is the quantum computing's ticking time bomb, with potential implications for every encrypted byte of data currently considered secure.

PostQuantum - Quantum Computing, Quantum Security, PQC
Upgrading to quantum-safe encryption will be the biggest digital overhaul in history – bigger than Y2K – because every device and system using crypto must be discovered and upgraded. From servers to that smart thermostat in HQ, nothing is exempt. If you haven’t started your #PQC migration, you’re already late. This is the Mount Everest of IT projects. #QuantumReadiness https://postquantum.com/post-quantum/quantum-readiness-pqc-migration/
Quantum Readiness / PQC Migration Is The Largest, Most Complex IT/OT Overhaul Ever – So Why Wait?

Preparing for the quantum era is arguably the largest and most complicated digital infrastructure overhaul in history. Yes, far bigger than Y2K, because back in 1999 we didn’t have millions of network-connected “things” to worry about. Yet despite clear warnings and rapidly approaching milestones, far too many organizations still treat quantum readiness as something to punt into next year – or worse, as a simple one-click software update. It won’t be that simple. Not by a long shot. If you haven’t already started planning your post-quantum migration, you’re not just behind schedule – you may already be late.

PostQuantum - Quantum Computing, Quantum Security, PQC
Canada’s PQC roadmap means business: by 2026 every federal agency must inventory its crypto use and designate a lead for the transition. Annual progress reports will be mandated, backed by Treasury Board policy. Essentially, they’re baking #QuantumReadiness accountability into government operations – no more “we’ll deal with it later.” #PQC https://postquantum.com/industry-news/canada-pqc-roadmap/
Government of Canada Launches Post-Quantum Cryptography (PQC) Migration Roadmap

On June 23, 2025 The Canadian Centre for Cyber Security (Cyber Centre) has issued a new roadmap for migrating the Government of Canada’s IT systems to post-quantum cryptography (PQC). Effective June 23, 2025, this guidance, 'Roadmap for the migration to post-quantum cryptography for the Government of Canada (ITSM.40.001)' lays out clear deadlines and expectations for all federal departments and agencies to transition their cryptographic systems to quantum-safe standards. It applies across non-classified federal IT systems, covering all Government of Canada networks handling UNCLASSIFIED, Protected A, and Protected B information (systems managing classified or Protected C data are addressed separately). The goal

PostQuantum - Quantum Computing, Quantum Security, PQC
The clock is ticking on current encryption. Experts estimate we may be ~5 years away from quantum machines that threaten common cryptography  – and maybe ~2030 for the “Q-Day” when quantum code-breaking becomes reality. Whether it’s 5 or 15 years, organizations must start migrating to quantum-resistant defenses now. #QuantumReadiness #QuantumComputing https://postquantum.com/post-quantum/quantum-threat-executives-board/
What is the Quantum Threat? A Guide for C‑Suite Executives and Boards

Boards do not need to dive into the scientific intricacies of qubits and algorithms, but they do need to recognize that this is a strategically important risk – one that can’t be simply delegated away. It requires the same level of governance attention as other enterprise-level risks like financial compliance, geopolitical factors, or pandemic preparedness. The comforting news is that if organizations act early, the quantum threat can be managed. Think of the proactive stance many companies took with Y2K in the late 1990s – those who started early averted disaster. Similarly here, those who begin preparing for quantum now

PostQuantum - Quantum Computing, Quantum Security, PQC