About the solution leaflet
Quantum computing will require changes to your cryptographic infrastructure
With the availability of quantum computers, your cryptographic infrastructure will need to be updated. You should evaluate what cryptographic algorithms are used in your systems and whether they could be broken by a quantum computer.
Unfortunately, you cannot simply "replace" an algorithm. It takes time to evaluate and go through all the affected IT and crypto assets, as well as change encryption methods and signature schemes.
To help you get started, we have put together a checklist of things to consider when migrating to post-quantum cryptography.
In the checklist you will find the different steps to consider in the following phases:
- Inspect the status quo
- Define action items
- Think about potential road blockers
- Migration and investments in cybersecurity
Start evaluating your post-quantum cryptography options now and plan your migration.