Think about a future the place immediately’s most safe information, from monetary information to nationwide secrets and techniques, may very well be immediately deciphered. This isn’t science fiction; it’s the rising actuality of quantum computing.
Whereas quantum computer systems promise unprecedented breakthroughs, they additionally threaten the cryptographic basis on which international cybersecurity has been constructed. Highly effective quantum computer systems generally known as cryptographically related quantum computer systems (CRQC) will compromise public-key cryptography, placing encrypted information and safe communications in danger.
We estimate that CRQCs might start to emerge earlier than 2035, if not sooner. Current technical breakthroughs – together with distributed quantum algorithms developed at Oxford, Google’s high-fidelity Willow chip, and extra – present a name to motion to safe cryptography for a post-quantum world. For banks, insurers, and healthcare organizations, quantum computer systems threaten confidentiality and integrity of delicate buyer information. R&D-heavy industries should safe their mental property.
Compounding this threat is the well-documented “Harvest Now, Decrypt Later” (HNDL) tactic, the place adversaries gather encrypted information immediately with the intent to decrypt it as soon as quantum capabilities mature. For enterprises and governments alike, this creates long-term publicity, risking the compromise of delicate credentials, communications, and operational information that adversaries can exploit lengthy after it’s intercepted.
The Hidden Danger: Belief Collapse
Past information confidentiality lies a extra systemic and speedy quantum threat: foundational belief breakdown.
Trendy digital techniques depend upon a shared cryptographic belief layer to operate securely – software program and firmware signing, identification and certificates, safe boot, replace validation, gadget attestation, and integrity checks that forestall tampering. If quantum assaults undermine these integrity mechanisms, techniques can now not reliably confirm what’s reliable.
On this state of affairs, attackers don’t simply learn encrypted information. They will impersonate trusted techniques, push malicious updates, bypass safety controls, and subvert operational decision-making at scale. As soon as integrity protections fail, the belief assumptions that underpin whole environments can unravel concurrently.
Break the integrity layer as soon as, and the results propagate all over the place – throughout units, networks, and purposes – turning remoted cryptographic weaknesses into systemic operational failure. The stakes are clear. Cisco is main the worldwide transition to Publish-Quantum Cryptography (PQC) to ship resilient infrastructure for a quantum-enabled world.
Our Strategic Response: A Two-Pillar PQC Method
Cisco’s PQC technique is constructed to deal with either side of the quantum drawback – confidentiality (defending information in transit from HNDL) and integrity (preserving the belief foundations – together with root-of-trust and safe storage, that merchandise and platforms depend upon). This logic underpins our core pillars:
- Safe Communications
- Safe Merchandise
Collectively, these pillars ship complete, end-to-end safety in opposition to quantum-era threats – securing information in transit whereas reinforcing the integrity of the platforms clients depend on.
From Technique to Execution: Two Pillars, Two Workstreams
The Safe Communications pillar focuses on decreasing quantum threat in data-in-transit, whereas the Safe Merchandise pillar focuses on embedding quantum-resistant belief foundations immediately into Cisco platforms, making certain clients don’t have to decide on between defending community site visitors and defending the infrastructure that enforces it.
Whereas securing community site visitors is paramount, a very quantum-safe posture requires greater than defending information in transit. It calls for that quantum-resistant safety be embedded immediately into the merchandise, platforms, and techniques that kind the spine of recent infrastructure.
In our subsequent weblog, we’ll dive deeper into every pillar, beginning with Safe Communications and turning to Safe Merchandise. To get forward of those rising threats, go to the Belief Heart to study extra at www.cisco.com/go/pqc.
We’d love to listen to what you suppose! Ask a query and keep linked with Cisco Safety on social media.
Cisco Safety Social Media

