TechnologyNews

Quantum computing startup wants enterprises running quantum applications before hardware arrives

·2 min read
Illustration depicting classical binary bit and quantum qubit states in superposition and binary.

SEALSQ CEO Carlos Moreira tells executives at Cantor's Quantum Security Event in New York that organizations must deploy post-quantum cryptography (PQC) now to protect high-value systems before quantum computers break current encryption. NIST finalized the first PQC standards in August 2024 and is urging immediate transition. Moreira argues the strategy isn't predicting 'Q-Day' perfectly, but removing quantum-vulnerable cryptography before it matters.

Why it matters

Quantum computers will eventually break today's public-key encryption, exposing sensitive data and critical infrastructure across enterprises. Organizations that wait risk catastrophic security breaches when quantum capability arrives, while early adopters can methodically transition systems using NIST-approved standards already available. The window to act proactively is closing as quantum computing advances accelerate.

What to do

Inventory your systems using public-key cryptography and prioritize migrating high-value assets to NIST's PQC standards immediately. Consider layering Secure Key Agreement protocols as complementary protection during the transition period.

AI Infrastructure