TESTIMONIALS

โ€œReceived the latest edition of Professional Security Magazine, once again a very enjoyable magazine to read, interesting content keeps me reading from front to back. Keep up the good work on such an informative magazine.โ€

Graham Penn
ALL TESTIMONIALS
FIND A BUSINESS

Would you like your business to be added to this list?

ADD LISTING
FEATURED COMPANY
Cyber

Bumpy road to quantum-safe

by Mark Rowe

Who’s ready for the identity challenge arising from quantum computing, asks Suman Sharma, Head of PAM Engineering at Ping Identity.

Breakthroughs that once lived in research papers now appear on corporate roadmaps, and with every gain in qubit count and error correction, we edge closer to a world where encryption can no longer keep secrets safe. Thatโ€™s why the UKโ€™s National Cyber Security Centre (NCSC) has set 2035 as the target date for moving to post-quantum cryptography (PQC), a new class of encryption designed to resist quantum attack. A decade to prepare defences and protect data and digital identities might sound manageable, until you consider whatโ€™s needed: rebuilding how organisations issue digital certificates, replacing hardware that canโ€™t run new algorithms, renewing millions of keys and upskilling entire teams.

If organisations miss a couple of planning cycles, theyโ€™ll meet the future running uphill. Attackers know this. Their tactic is blunt but effective: steal encrypted data now and store it until quantum machines can break it. Personally identifiable information like health records, intellectual property and long-term financial transactions will retain value for decades, which is exactly why attackers are stealing them today, even if they canโ€™t decrypt them yet. This approach, known as โ€œharvest now, decrypt later,โ€ assumes that future quantum systems will be able to break todayโ€™s encryption with ease. So, a breach that seems dormant in 2025 could suddenly expose sensitive data in 2030, or sooner.

The question is no longer if current identity infrastructures will be broken, but when. Patience, not skill, is now the attackerโ€™s greatest asset. Every data still protected by outdated encryption is a ticking clock, therefore itโ€™s critical organisations design infrastructure with quantum resilience baked in.

Identityโ€™s Achillesโ€™ heel

Digital identity systems are especially vulnerable to quantum threats. Thatโ€™s because most authentication systems, from online banking apps to hospital smartcards, rely on public-key cryptography. This approach uses two mathematically linked keys: one public, one private. The security relies on solving problems so difficult they would take classical computers millions of years. A quantum computer could do it in hours.

If attackers extract a private key, they can impersonate legitimate users or systems. They could forge digital signatures to authorise fraudulent transactions, push malware through fake software updates, or pose as trusted certificate authorities, all without triggering password checks or multi-factor alerts.

The consequences ripple fast. In finance, a forged signature could green-light a million-pound transfer. In healthcare, a fake clinicianโ€™s ID might unlock confidential patient records. In government, spoofed credentials could allow malware to pass unnoticed through software supply chains. Because trust radiates from a handful of โ€œrootโ€ keys, compromising just one can silently undermine everything downstream, but how is this risk being handled by institutions and how effectively?

On paper, we already have replacement tools. The US National Institute of Standards and Technology (NIST) has selected algorithms like Kyber and Dilithium, specifically designed to resist quantum attacks. But adoption is slow.

Senior leaders often see quantum risk as distant, underestimating the time required to upgrade systems once budgets, vendor contracts and staff training are taken into account. With limited awareness and urgency, security funds tend to flow towards more immediate threats like ransomware and quantum projects slip down the roadmap.

Technical hurdles add more friction. Legacy hardware security modules canโ€™t handle larger key sizes, mobile devices have limited memory and many cloud platforms lock in which cipher suites they support. Even locating all the cryptographic keys across an organisation is tough; some are embedded in build pipelines, others in dusty admin portals or devices running decades-old firmware.

Until organisations surface these blind spots and modernise their infrastructure, the window of vulnerability remains wide open. The longer migration is delayed, the more data is exposed to โ€œharvest now, decrypt laterโ€ tactics, and the harder it becomes to mount a coordinated response. Whatโ€™s needed is a practical roadmap for quantum resilience: not just theory, but architecture, culture and planning that can survive the transition.

From principles to progress: building quantum resilience

Designing for quantum resilience means baking in flexibility before systems are stress-tested by real-world attacks. That starts with rethinking how encryption is applied, where trust resides and how upgrades are deployed.

1. First, build crypto-agility in by design: Treat cryptography modules like a plug-in, not hard-wired logic. Store clear labels with each key, the algorithm used, expiry date, usage context, so mass updates can be scripted, not rolled out by hand.
2. Second, layer your defences: Pair strong symmetric ciphers like AES-256 with quantum-safe asymmetric algorithms (e.g. ML-KEM), and use protocols that support hybrid handshakes. If one layer fails, another keeps data secure.
3. Third, decentralise trust: Emerging models such as decentralised identifiers, soon to be formalised under the EUโ€™s eIDAS 2.0 regulation, reduce dependence on a single certificate authority. Each party in a transaction can upgrade at its own pace, allowing the ecosystem to evolve without bottlenecks.
4. Fourth, make it cultural: Security champions should embed quantum topics into developer onboarding. Product teams should treat post-quantum readiness like performance or accessibility, a non-negotiable. Procurement should press vendors for public plans and timelines for quantum-safe cryptography support.

Then, you should turn theory into practice. Every programme must start with visibility. Security teams need to audit the estate, physical and virtual, to identify every certificate authority, signing key and cryptographic library. Capturing this in a live registry transforms an abstract risk into concrete tasks.

Finally, once a year, run a โ€œcrypto rotation dayโ€, regenerating and redeploying all identity keys. It tests which systems fail, how recovery scripts behave and whether alerts fire as intended, giving you the evidence to shape resourcing and timelines.

The clock is ticking

Quantum computing is a long-fuse, high-impact risk, but the fuse is already burning. For identity systems built on public-key cryptography, the danger is no longer theoretical. The maths that once secured our logins, signatures and digital certificates is now on borrowed time.

Whatโ€™s needed is not panic, but preparation. By redesigning identity infrastructure to be crypto-agile, layering protections and decentralising trust, organisations can reduce exposure before the threat arrives. The quantum problem may be complex, but the response doesnโ€™t have to be, provided it starts now. Finally, once a year, run a โ€œcrypto rotation dayโ€, regenerating and redeploying all identity keys. It tests which systems fail, how recovery scripts behave and whether alerts fire as intended, giving you the evidence to shape resourcing and timelines.

Related News

  • Cyber

    Essential IT

    by Mark Rowe

    Organisations should revisit security responsibilities, writes Daniel Lattimer, Vice President UK & Ireland, at Semperis, which offers Active Directory protection. In the…

  • Cyber

    Digital watershed in 2026

    by Mark Rowe

    Ben Schilz, CEO at Wire, predicts for 2026 movements towards a sovereign Europe, quantum-ready encryption and a slow goodbye to Big Tech.…

  • Cyber

    Overconnectivity invites breaches

    by Mark Rowe

    Is overconnectivity putting your business at risk? asks Michael Vallas, Global Technical Principal at Goldilock Secure.   Over the last twenty years,…