{"id":15882,"date":"2023-07-12T09:59:02","date_gmt":"2023-07-12T07:59:02","guid":{"rendered":"https:\/\/www.thegreenbow.com\/?post_type=resource&#038;p=15882"},"modified":"2023-10-03T16:22:59","modified_gmt":"2023-10-03T14:22:59","slug":"migrating-to-quantum-resistant-cryptography-why-you-should-start-now","status":"publish","type":"resource","link":"https:\/\/www.thegreenbow.com\/en\/ressource\/blog-en\/migrating-to-quantum-resistant-cryptography-why-you-should-start-now\/","title":{"rendered":"Migrating to quantum-resistant cryptography: why you should start now"},"content":{"rendered":"\n<div class=\"wp-block-ch-resource-content alignfull\">\n<p><strong>Author: Arnaud DUFOURNET<\/strong>, Chief Marketing Officer<\/p>\n\n\n\n<p>Before leaving the French national cybersecurity agency, ANSSI, Guillaume Poupard reiterated in his annual review that 80% of its work involved combating espionage of critical systems. Media coverage of ransomware attacks has caused us to overlook the fact that many attacks are aimed at stealing industrial secrets or purloining data, which could jeopardize a country&#8217;s national security.<\/p>\n\n\n\n<p>The United States has decided to react to the threat posed by harvest now, decrypt later (HNDL)* attacks, starting now. In securing the passing of the Quantum Computing Cybersecurity Preparedness Act in December 2022, Joe Biden compelled federal agencies to identify, by the end of May 2023, the mission-critical cryptographic systems that urgently need to be migrated to quantum-resistant cryptography. European nations would be well advised to take their cue from Biden\u2019s administration.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Two levels of threat<\/strong><\/h2>\n\n\n\n<p>There are two levels of threat associated with quantum supremacy. The first is a \u201cphantom menace,\u201d to repeat the term employed by Olivier Ezratty. We have known since Peter Shor\u2019s work in 1994 that an algorithm exists that can be used to solve the mathematical problems on which RSA and elliptic-curve cryptography are based. This phantom menace will only materialize on the day a quantum computer emerges with sufficient qubits to run this algorithm without errors. On that day, all internet communications will instantly find themselves devoid of protection, as will a good number of security architectures based on public key cryptography. It remains very difficult to predict when Q-Day**, as some experts call it, will arrive. However, governments\u2019 desire to see it is very strong, and significant technological progress is being made at a regular pace.<\/p>\n\n\n\n<div class=\"wp-block-media-text alignwide is-stacked-on-mobile\" style=\"grid-template-columns:43% auto\"><figure class=\"wp-block-media-text__media\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"717\" src=\"https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2023\/07\/Quantum-computer_lite-1024x717.jpg\" alt=\"Quantum day\" class=\"wp-image-15731 size-full\" srcset=\"https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2023\/07\/Quantum-computer_lite-1024x717.jpg 1024w, https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2023\/07\/Quantum-computer_lite-300x210.jpg 300w, https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2023\/07\/Quantum-computer_lite-768x538.jpg 768w, https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2023\/07\/Quantum-computer_lite-1536x1075.jpg 1536w, https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2023\/07\/Quantum-computer_lite-2048x1434.jpg 2048w, https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2023\/07\/Quantum-computer_lite-100x70.jpg 100w, https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2023\/07\/Quantum-computer_lite-428x300.jpg 428w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure><div class=\"wp-block-media-text__content\">\n<p>The second threat is real, already visibly operational. HNDL attacks are happening now, and not just on national infrastructure. All sectors processing data with a long lifespan (greater than 10 years) should already be concerned about this threat.<\/p>\n\n\n\n<p>The defense, energy, healthcare, finance and insurance, public services, automotive, shipbuilding, aviation, telecoms, and IT sectors among others spring immediately to mind. For such sectors, the challenge is to start protecting their sensitive data now, and not wait until Q-Day.<\/p>\n<\/div><\/div>\n\n\n\n<p>One sector that has seen the danger coming is banking. In March 2022, the Financial Services Information Sharing and Analysis Center (FS-ISAC), a professional body with members in more than 70 countries, formed with the aim of sharing information to protect against cyber risks in the financial services sector, published a <a href=\"https:\/\/www.fsisac.com\/hubfs\/Knowledge\/PQC\/PreparingForAPostQuantumWorldByManagingCryptographicRisk.pdf?hsLang=en\">report<\/a> underlining the quantum threat and the need to have a plan to migrate to quantum-resistant cryptography. Various central banks, including the European Central Bank, have already started on PoC, to start to get used to the idea of protecting data transmissions with quantum-resistant cryptography.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Why now?<\/strong><\/h2>\n\n\n\n<p>The answer is fairly simple: because a race against time is underway, and the resulting migration projects will be very lengthy affairs. Experience shows that it takes several years, potentially as long as a decade, to migrate cryptography systems (hardware, software, and associated services) when they either use RSA or are based on elliptic curves (ECDH and ECDSA).<\/p>\n\n\n\n<p>The first step in a migration project, i.e. taking an inventory of all the cryptography technology used by an organization, can prove tedious and time-consuming. This step includes mapping these technologies, compiling a list of the applications and software that use them, documenting the reasons for their use, and identifying all the suppliers involved. The next step is to examine the data passing through these systems to assess how sensitive\u2014and critical\u2014the data streams are, so as to establish your priorities as the final step.<\/p>\n\n\n\n<p>The whole exercise will bring its fair share of surprises and unknown factors. Microsoft suffered its own bitter experience of this in 2013. Working under a hypothetical scenario that RSA had been cracked, Microsoft examined the extent to which cryptography was used in Windows\u00a07. The findings were instructive: 70 situations were found where RSA was used with no explanation why. It is difficult to replace something when you don\u2019t know what it is for.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">No more reason to wait<\/h2>\n\n\n\n<p>Organizations have everything they need to start their migration projects. First of all, operating procedures are available. ANSSI has shown the path to follow to protect yourself against the quantum threat, recommending the hybridization of systems, i.e. the gradual introduction of quantum-resistant algorithms combined with the use of the current algorithms.<\/p>\n\n\n\n<p>However, it is not the only cybersecurity agency in Europe to issue warnings about the quantum threat and the measures to be taken. The German Federal Office for Information Security, BSI,has published a crystal clear <a href=\"https:\/\/www.bsi.bund.de\/SharedDocs\/Downloads\/EN\/BSI\/Publications\/Brochure\/quantum-safe-cryptography.pdf?__blob=publicationFile&amp;v=4\">guide<\/a> to the subject The EU\u2019s agency, ENISA, published <a href=\"https:\/\/www.enisa.europa.eu\/publications\/post-quantum-cryptography-integration-study\">a report<\/a> in October 2022 on integrating quantum-resistant cryptography. And having just been appointed CEO of the National Cyber Security Centre (NCSC) in the UK, <a href=\"https:\/\/www.quantumbusinessnews.com\/government\/quantum-cybersecurity-threat-takes-center-stage-at-cyberuk\">Linda Cameron<\/a> said in April 2023 during a keynote speech that organizations absolutely had no choice but to prepare to migrate the cryptography systems that keep internet communications, and the digital economy more broadly, secure.<\/p>\n\n\n\n<p>Algorithms reckoned to be resistant to a quantum attack do exist. After six years, and three qualifying rounds, NIST selected four algorithms in July 2022 (three for electronic signatures, one for public key encryption) and plans to publish implementation standards during 2024. <\/p>\n\n\n\n<div class=\"wp-block-media-text alignwide has-media-on-the-right is-stacked-on-mobile\" style=\"grid-template-columns:auto 46%\"><div class=\"wp-block-media-text__content\">\n<p>The National Cybersecurity Center of Excellence (NCCoE), a division of NIST, recently kicked off a project called <a href=\"https:\/\/www.nccoe.nist.gov\/crypto-agility-considerations-migrating-post-quantum-cryptographic-algorithms\">Migration to Post-Quantum Cryptography<\/a>, the aim of which is to centralize and share best practice within a consortium of around twenty manufacturers and solutions providers. A white paper entitled <a href=\"https:\/\/doi.org\/10.6028\/NIST.CSWP.04282021\">Getting Ready for Post-Quantum Cryptography: Exploring Challenges Associated with Adopting and Using Post-Quantum Cryptographic Algorithms<\/a> is freely available on the NCCoE\u2019s website.<\/p>\n<\/div><figure class=\"wp-block-media-text__media\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"683\" src=\"https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2023\/07\/NIST_Lite-1024x683.jpg\" alt=\"NIST\" class=\"wp-image-15739 size-full\" srcset=\"https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2023\/07\/NIST_Lite-1024x683.jpg 1024w, https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2023\/07\/NIST_Lite-300x200.jpg 300w, https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2023\/07\/NIST_Lite-768x512.jpg 768w, https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2023\/07\/NIST_Lite-1536x1024.jpg 1536w, https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2023\/07\/NIST_Lite-2048x1365.jpg 2048w, https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2023\/07\/NIST_Lite-100x67.jpg 100w, https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2023\/07\/NIST_Lite-301x201.jpg 301w, https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2023\/07\/NIST_Lite-343x229.jpg 343w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure><\/div>\n\n\n\n<p>One final important point is that the deployment of quantum-resistant algorithms is entirely unconnected to the development of quantum computers. Such algorithms are deployed on existing infrastructure and communication channels, and no major hardware changes are required. They can be run on conventional devices and computers. The hybridization needed can consequently start now.<em><\/em><\/p>\n\n\n\n<p>When we ask CISOs what they know about the issues surrounding quantum-resistant cryptography, the answer is still all too often the same: \u201cI\u2019ve heard of it, but we\u2019re not working on it yet.\u201d A survey of CISOs at American corporations conducted by Deloitte in the summer of 2022 showed that 50% admitted they could potentially fall victim to an HNDL attack. Almost as many, 45%, were hoping to complete their assessment of their exposure to this threat within the next twelve months. One can only hope that their European counterparts share their level of awareness. Unless, that is, the adoption of new European or domestic regulations sparks them into life.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<p>*HNDL: an attack whereby encrypted data (e.g. personal, financial, or health data, intellectual or industrial property) is intercepted today (i.e. harvest now) in the hope of decrypting it in the future using a quantum computer (i.e. decrypt later).<\/p>\n\n\n\n<p>**Q-Day: the day when a quantum computer has the number of qubits necessary to run Shor\u2019s algorithm without error, and therefore cracks RSA keys.<\/p>\n<\/div>\n","protected":false},"featured_media":15735,"template":"","meta":{"_acf_changed":false,"resource_type":"internal"},"resource_category":[342],"class_list":["post-15882","resource","type-resource","status-publish","has-post-thumbnail","hentry","resource_category-blog-en"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Migrating to quantum-resistant cryptography: why you should start now - TheGreenBow<\/title>\n<meta name=\"description\" content=\"While HNDL attacks are already a threat today, protection of long-lived data becomes a national security issue.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.thegreenbow.com\/en\/ressource\/blog-en\/migrating-to-quantum-resistant-cryptography-why-you-should-start-now\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Migrating to quantum-resistant cryptography: why you should start now - TheGreenBow\" \/>\n<meta property=\"og:description\" content=\"While HNDL attacks are already a threat today, protection of long-lived data becomes a national security issue.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.thegreenbow.com\/en\/ressource\/blog-en\/migrating-to-quantum-resistant-cryptography-why-you-should-start-now\/\" \/>\n<meta property=\"og:site_name\" content=\"TheGreenBow\" \/>\n<meta property=\"article:modified_time\" content=\"2023-10-03T14:22:59+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2023\/07\/Start_lite-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1712\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@thegreenbow\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.thegreenbow.com\\\/en\\\/ressource\\\/blog-en\\\/migrating-to-quantum-resistant-cryptography-why-you-should-start-now\\\/\",\"url\":\"https:\\\/\\\/www.thegreenbow.com\\\/en\\\/ressource\\\/blog-en\\\/migrating-to-quantum-resistant-cryptography-why-you-should-start-now\\\/\",\"name\":\"Migrating to quantum-resistant cryptography: why you should start now - TheGreenBow\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.thegreenbow.com\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.thegreenbow.com\\\/en\\\/ressource\\\/blog-en\\\/migrating-to-quantum-resistant-cryptography-why-you-should-start-now\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.thegreenbow.com\\\/en\\\/ressource\\\/blog-en\\\/migrating-to-quantum-resistant-cryptography-why-you-should-start-now\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.thegreenbow.com\\\/wp-content\\\/uploads\\\/2023\\\/07\\\/Start_lite-scaled.jpg\",\"datePublished\":\"2023-07-12T07:59:02+00:00\",\"dateModified\":\"2023-10-03T14:22:59+00:00\",\"description\":\"While HNDL attacks are already a threat today, protection of long-lived data becomes a national security issue.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.thegreenbow.com\\\/en\\\/ressource\\\/blog-en\\\/migrating-to-quantum-resistant-cryptography-why-you-should-start-now\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.thegreenbow.com\\\/en\\\/ressource\\\/blog-en\\\/migrating-to-quantum-resistant-cryptography-why-you-should-start-now\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.thegreenbow.com\\\/en\\\/ressource\\\/blog-en\\\/migrating-to-quantum-resistant-cryptography-why-you-should-start-now\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.thegreenbow.com\\\/wp-content\\\/uploads\\\/2023\\\/07\\\/Start_lite-scaled.jpg\",\"contentUrl\":\"https:\\\/\\\/www.thegreenbow.com\\\/wp-content\\\/uploads\\\/2023\\\/07\\\/Start_lite-scaled.jpg\",\"width\":2560,\"height\":1712,\"caption\":\"PQC Migration\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.thegreenbow.com\\\/en\\\/ressource\\\/blog-en\\\/migrating-to-quantum-resistant-cryptography-why-you-should-start-now\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.thegreenbow.com\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Blog\",\"item\":\"https:\\\/\\\/www.thegreenbow.com\\\/en\\\/resources\\\/blog-en\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Migrating to quantum-resistant cryptography: why you should start now\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.thegreenbow.com\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.thegreenbow.com\\\/en\\\/\",\"name\":\"TheGreenBow\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.thegreenbow.com\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.thegreenbow.com\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.thegreenbow.com\\\/en\\\/#organization\",\"name\":\"TheGreenBow\",\"url\":\"https:\\\/\\\/www.thegreenbow.com\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.thegreenbow.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.thegreenbow.com\\\/wp-content\\\/uploads\\\/2021\\\/04\\\/Logotype@2x-min.png\",\"contentUrl\":\"https:\\\/\\\/www.thegreenbow.com\\\/wp-content\\\/uploads\\\/2021\\\/04\\\/Logotype@2x-min.png\",\"width\":422,\"height\":84,\"caption\":\"TheGreenBow\"},\"image\":{\"@id\":\"https:\\\/\\\/www.thegreenbow.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/thegreenbow\",\"https:\\\/\\\/fr.linkedin.com\\\/company\\\/thegreenbow\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCZKtI7_fmgFcmovgGSy8AnQ\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Migrating to quantum-resistant cryptography: why you should start now - TheGreenBow","description":"While HNDL attacks are already a threat today, protection of long-lived data becomes a national security issue.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.thegreenbow.com\/en\/ressource\/blog-en\/migrating-to-quantum-resistant-cryptography-why-you-should-start-now\/","og_locale":"en_US","og_type":"article","og_title":"Migrating to quantum-resistant cryptography: why you should start now - TheGreenBow","og_description":"While HNDL attacks are already a threat today, protection of long-lived data becomes a national security issue.","og_url":"https:\/\/www.thegreenbow.com\/en\/ressource\/blog-en\/migrating-to-quantum-resistant-cryptography-why-you-should-start-now\/","og_site_name":"TheGreenBow","article_modified_time":"2023-10-03T14:22:59+00:00","og_image":[{"width":2560,"height":1712,"url":"https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2023\/07\/Start_lite-scaled.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_site":"@thegreenbow","twitter_misc":{"Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.thegreenbow.com\/en\/ressource\/blog-en\/migrating-to-quantum-resistant-cryptography-why-you-should-start-now\/","url":"https:\/\/www.thegreenbow.com\/en\/ressource\/blog-en\/migrating-to-quantum-resistant-cryptography-why-you-should-start-now\/","name":"Migrating to quantum-resistant cryptography: why you should start now - TheGreenBow","isPartOf":{"@id":"https:\/\/www.thegreenbow.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.thegreenbow.com\/en\/ressource\/blog-en\/migrating-to-quantum-resistant-cryptography-why-you-should-start-now\/#primaryimage"},"image":{"@id":"https:\/\/www.thegreenbow.com\/en\/ressource\/blog-en\/migrating-to-quantum-resistant-cryptography-why-you-should-start-now\/#primaryimage"},"thumbnailUrl":"https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2023\/07\/Start_lite-scaled.jpg","datePublished":"2023-07-12T07:59:02+00:00","dateModified":"2023-10-03T14:22:59+00:00","description":"While HNDL attacks are already a threat today, protection of long-lived data becomes a national security issue.","breadcrumb":{"@id":"https:\/\/www.thegreenbow.com\/en\/ressource\/blog-en\/migrating-to-quantum-resistant-cryptography-why-you-should-start-now\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.thegreenbow.com\/en\/ressource\/blog-en\/migrating-to-quantum-resistant-cryptography-why-you-should-start-now\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.thegreenbow.com\/en\/ressource\/blog-en\/migrating-to-quantum-resistant-cryptography-why-you-should-start-now\/#primaryimage","url":"https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2023\/07\/Start_lite-scaled.jpg","contentUrl":"https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2023\/07\/Start_lite-scaled.jpg","width":2560,"height":1712,"caption":"PQC Migration"},{"@type":"BreadcrumbList","@id":"https:\/\/www.thegreenbow.com\/en\/ressource\/blog-en\/migrating-to-quantum-resistant-cryptography-why-you-should-start-now\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.thegreenbow.com\/en\/"},{"@type":"ListItem","position":2,"name":"Blog","item":"https:\/\/www.thegreenbow.com\/en\/resources\/blog-en\/"},{"@type":"ListItem","position":3,"name":"Migrating to quantum-resistant cryptography: why you should start now"}]},{"@type":"WebSite","@id":"https:\/\/www.thegreenbow.com\/en\/#website","url":"https:\/\/www.thegreenbow.com\/en\/","name":"TheGreenBow","description":"","publisher":{"@id":"https:\/\/www.thegreenbow.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.thegreenbow.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.thegreenbow.com\/en\/#organization","name":"TheGreenBow","url":"https:\/\/www.thegreenbow.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.thegreenbow.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2021\/04\/Logotype@2x-min.png","contentUrl":"https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2021\/04\/Logotype@2x-min.png","width":422,"height":84,"caption":"TheGreenBow"},"image":{"@id":"https:\/\/www.thegreenbow.com\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/thegreenbow","https:\/\/fr.linkedin.com\/company\/thegreenbow","https:\/\/www.youtube.com\/channel\/UCZKtI7_fmgFcmovgGSy8AnQ"]}]}},"_links":{"self":[{"href":"https:\/\/www.thegreenbow.com\/en\/wp-json\/wp\/v2\/resource\/15882","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.thegreenbow.com\/en\/wp-json\/wp\/v2\/resource"}],"about":[{"href":"https:\/\/www.thegreenbow.com\/en\/wp-json\/wp\/v2\/types\/resource"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.thegreenbow.com\/en\/wp-json\/wp\/v2\/media\/15735"}],"wp:attachment":[{"href":"https:\/\/www.thegreenbow.com\/en\/wp-json\/wp\/v2\/media?parent=15882"}],"wp:term":[{"taxonomy":"resource_category","embeddable":true,"href":"https:\/\/www.thegreenbow.com\/en\/wp-json\/wp\/v2\/resource_category?post=15882"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}