from Hacker News

CISOs urged to push vendors for roadmaps on post-quantum cryptography readiness

by westurner on 6/9/25, 4:57 PM with 5 comments

  • by Bender on 6/9/25, 4:59 PM

    How do people test post-quantum cryptography? How do they verify their encryption can not be defeated by quantum computing without having access to real world quantum computing? Are they basing everything off theories?
  • by westurner on 6/9/25, 5:16 PM

    Best be ready, for Q-day:

    > The looming ‘Q-Day’ should also be used as the stick to get approval to carry out a cryptographic inventory and roll out projects that foster cryptographic agility more generally.

    > Q-Day will not be announced and businesses need to take action now in the face of a growing threat.

    [...]

    > “An orderly transition will cost less than emergency planning,” Holmqvist said. “It’s like Y2K but without an actual date.”