The Q-PrEP Blog

Detailed Information
on Selected Topics of and around PCQ

In our blogpost we will give you detailed information on selected topics of and around PCQ

Blogpost # 1: Crypto Agility – The How

In the era of evolving cyber threats and quantum computing, Crypto Agility (the ability to swiftly switch between cryptographic algorithms and protocols) has become essential. It is no longer just about compliance. It is a strategic advantage that boosts resilience against cyberattacks, quantum risks, and regulatory demands.

This extensive introduction outlines a structured path to Crypto Agility, starting with cryptographic Asset Management: inventorying artefacts using scanning tools and centralized repositories for visibility and control. It emphasizes assessing and tracking cryptographic use, aligning strategy with priorities, and addressing technical and process constraints. Key steps include defining roles, strategic planning, execution, and continuous improvement.

By embedding agility into cryptographic practices, organizations can future-proof infrastructure, maintain resilience, and mitigate emerging threats.

Please read more in our paper on that topic …


Blogpost # 2: How to Prioritize Systems and Applications for PQC Migration in a Harvest-Now, Decrypt-Later World

The Urgency of the Harvest-Now, Decrypt-Later Threat

When people think of quantum computing and cryptography, the typical mental image is a futuristic computer instantly cracking RSA or ECC keys. While that image is accurate, it belies the real danger that is much more subtile, and is already here. Attackers don’t need a fully capable quantum computer today to put your organization at risk. They only need the foresight to record (targeted) encrypted traffic and archives now, with the expectation that in 5, 10, or 15 years, they will be able to return and decrypt it.

This practice, known as Harvest-Now, Decrypt-Later (HNDL), fundamentally changes how we must think about security.

Please read more in our paper on that topic …