{"id":15908,"date":"2023-08-25T12:15:56","date_gmt":"2023-08-25T10:15:56","guid":{"rendered":"https:\/\/www.thegreenbow.com\/?post_type=resource&#038;p=15908"},"modified":"2023-08-28T12:02:13","modified_gmt":"2023-08-28T10:02:13","slug":"migration-to-quantum-resistant-cryptography","status":"publish","type":"resource","link":"https:\/\/www.thegreenbow.com\/en\/ressource\/migration-to-quantum-resistant-cryptography\/","title":{"rendered":"Migration to quantum-resistant cryptography"},"content":{"rendered":"\n<div class=\"wp-block-ch-resource-content alignfull\">\n<p><strong>Guest author: Indr\u00e9 Vaicekavi\u010di\u016bt\u0117, CyberNews<\/strong><\/p>\n\n\n\n<p>Cryptography holds a key role in maintaining data confidentiality in information security. This technique revolves around generating and deciphering codes that permit access to the data solely by approved entities. However, the emergence of quantum computing threatens to render traditional cryptographic methods obsolete, thereby creating a significant risk to the security of information.<\/p>\n\n\n\n<p>In response to this emerging issue, professionals and coders are beginning to create encryption that is resistant to the computational capabilities of quantum computers. The development of this type of encryption is crucial to stay on top of technological progress and guarantee the protection of information.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What Is Quantum-Proof Encryption and Why Is It Important?<\/h2>\n\n\n\n<p>Quantum-resistant encryption is an advanced collection of algorithms resistant to highly advanced quantum computing systems. These encryption strategies are expected to replace conventional algorithms that use public key encryption.<\/p>\n\n\n\n<p>In 1994, the mathematician Peter Shor brought forth the idea of quantum computers, which promised greater capabilities than existing computers. However, they were purely theoretical at that point. Fast-forwarding to the present day, there have been considerable advancements in computing technology, and quantum computers are anticipated to become a reality within the next ten years.<\/p>\n\n\n\n<p>This progress brings about significant concerns. Existing encryption methods may not hold up against the widespread use of quantum computers. In response to this pressing issue, researchers are focusing on the development of post-quantum cryptography.<\/p>\n\n\n\n<p>By adopting quantum-resistant encryption, we can safeguard confidential information despite technological progression. It&#8217;s essential to stay proactive and shield our data from potential future threats.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Developing a Quantum-Resistant Encryption Standard<\/strong><\/h2>\n\n\n\n<p>In 2016, the National Institute of Standards and Technology (NIST) launched a competition to find a post-quantum encryption standard capable of withstanding quantum computers.<\/p>\n\n\n\n<p>Unlike traditional encryption systems that rely on complex mathematical solutions, NIST has recently announced the shortlisting of four encryption algorithms that it deems &#8220;quantum-proof&#8221; in 2022.&nbsp;<\/p>\n\n\n\n<p>These include the<strong> CRYSTALS-Kyber<\/strong> algorithm, the <strong>CRYSTALS-Dilithium<\/strong> algorithm, <strong>FALCON<\/strong>, and <strong>SPHINCS+<\/strong>.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>The <strong>CRYSTALS-Kyber<\/strong> algorithm, in particular, is gaining popularity as a general encryption standard due to its smaller encryption keys, facilitating rapid exchange. It also boasts impressive speed compared to other options.<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>For digital signatures, the NIST officially recommends <strong>CRYSTALS-Dilithium<\/strong>, with <strong>FALCON <\/strong>serving as an alternative for cases where Dilithium may not be suitable. Both algorithms are recognized for their speed and rely on structured lattice math problems for data encryption.<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>On the other hand, the fourth algorithm, <strong>SPHINCS+<\/strong>, may be slower than the rest, but it is considered quantum-proof due to its reliance on a distinct set of mathematical problems. Instead of structured lattices, this algorithm places its trust in hash functions.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Migration To Quantum-Resistant Cryptography<\/strong><\/h2>\n\n\n\n<p>With the rise of quantum computing, traditional encryption methods are becoming increasingly vulnerable to attack. As a result, organizations must prepare for a transition to <a href=\"https:\/\/www.thegreenbow.com\/en\/ressource\/ebook\/cryptography-at-the-core-of-the-quantum-revolution\/\" target=\"_blank\" rel=\"noreferrer noopener\">quantum-resistant cryptography<\/a> in order to maintain the security of their data. This migration to new cryptosystems will require a carefully crafted strategy, encompassing everything from identifying key areas of vulnerability to selecting the most effective cryptographic algorithms.<\/p>\n\n\n\n<p>Here is the strategy we recommend:<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"576\" src=\"https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2023\/08\/PQC-Migration-1024x576.png\" alt=\"\" class=\"wp-image-15909\" srcset=\"https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2023\/08\/PQC-Migration-1024x576.png 1024w, https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2023\/08\/PQC-Migration-300x169.png 300w, https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2023\/08\/PQC-Migration-768x432.png 768w, https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2023\/08\/PQC-Migration-1536x864.png 1536w, https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2023\/08\/PQC-Migration-100x56.png 100w, https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2023\/08\/PQC-Migration.png 1600w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Assess and prioritize<\/strong><\/h3>\n\n\n\n<p>Begin by thoroughly evaluating your organization&#8217;s current cryptographic systems, identifying the most crucial data and critical infrastructure. Prioritize migrating these high-risk components to quantum-resistant cryptography.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Research and choose appropriate algorithms<\/strong><\/h3>\n\n\n\n<p>Investigate the available quantum-resistant algorithms, considering their security, performance, and interoperability. As such, it is recommended to select quantum-resistant algorithms endorsed by reputable organizations like the National Institute of Standards and Technology (NIST).<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Create a migration strategy<\/strong><\/h3>\n\n\n\n<p>Develop a detailed plan for transitioning, including timelines, resource allocation, and integration techniques. Consider a phased approach, starting with the most important components and gradually expanding the implementation.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Test and validate<\/strong><\/h3>\n\n\n\n<p>Before deploying quantum-resistant cryptography on a large scale, conduct exhaustive testing to ensure its efficacy, efficiency, and compatibility with existing systems.&nbsp; Moreover, thorough testing also helps to identify any potential limitations or weaknesses of the new cryptography, allowing for any necessary refinements or improvements to be made before deployment.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Continuously monitor developments<\/strong><\/h3>\n\n\n\n<p>Maintain current knowledge of progress in quantum computing and quantum-proof cryptography. Thus, it&#8217;s crucial to stay informed about technological developments in quantum computing and modify cryptographic systems as necessary.<\/p>\n\n\n\n<p>In addition to implementing quantum-resistant cryptography, deploying a robust <a href=\"https:\/\/cybernews.com\/best-antivirus-software\/\">antivirus solution<\/a> and trustworthy <a href=\"https:\/\/cyberwaters.com\/what-is-vpn\/\">VPN<\/a> contributes to strengthening your organization&#8217;s overall security posture during the migration to quantum-resistant cryptography. By integrating antivirus and VPN measures into your cryptographic strategy, you can further mitigate the risk of data breaches and unauthorized access.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Challenges and Pitfalls in the Migration Process<\/strong><\/h2>\n\n\n\n<p>Migrating can be an extremely complex and challenging process. It is important to be aware of potential pitfalls along the way in order to successfully navigate this process.&nbsp; The following are some of the challenges associated with migration:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Integration difficulties:<\/strong> Adapting quantum-resistant cryptography into existing infrastructures, especially in hybrid environments with diverse systems and platforms, can be challenging.<\/li>\n\n\n\n<li><strong>Resource impact<\/strong>: Quantum-resistant algorithms often require larger key sizes and additional computational resources, potentially affecting system performance and scalability.<\/li>\n\n\n\n<li><strong>Skill and expertise:<\/strong> Transitioning to quantum-resistant cryptography demands specialized knowledge and expertise, which may be lacking within your organization.<\/li>\n\n\n\n<li><strong>Financial investment:<\/strong> Transitioning to quantum-resistant cryptography may require significant monetary and human resource investments.<\/li>\n\n\n\n<li><strong>Price of inaction:<\/strong> Failure to implement quantum-resistant cryptography exposes organizations to future decryption of sensitive data by quantum computers, leading to data breaches and intellectual property loss.<\/li>\n\n\n\n<li><strong>Financial losses:<\/strong> Inadequate cryptographic protection can result in substantial financial losses, such as regulatory penalties, legal fees, and consumer compensation.<\/li>\n\n\n\n<li><strong>Reputational damage:<\/strong> Neglecting quantum-resistant cryptography can harm consumer confidence and reputation, as organizations may be perceived as neglecting their cybersecurity responsibilities.<\/li>\n\n\n\n<li><strong>Competitive disadvantage:<\/strong> Organizations that delay the transition risk falling behind competitors who showcase their dedication to data security through the early adoption of quantum-resistant cryptography, earning consumer trust.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Conclusion<\/h2>\n\n\n\n<p>The shift to quantum-proof cryptography is essential for enterprises to protect their confidential data from the impending risk of quantum-powered breaches. To effectively manage this change, organizations need to grasp the challenges involved and employ a strategic method while foreseeing possible risks.<\/p>\n\n\n\n<p>The potential damages from not integrating quantum-proof cryptography considerably surpass any preliminary investment needed for the switch. It&#8217;s vital to commence planning and instigating the transfer of your organization&#8217;s digital assets to quantum-proof cryptography promptly, guaranteeing their security in the long run.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<div class=\"wp-block-media-text alignwide has-media-on-the-right is-stacked-on-mobile\" style=\"grid-template-columns:auto 35%\"><div class=\"wp-block-media-text__content\">\n<p><strong>About the author:<\/strong><\/p>\n\n\n\n<p>&#8220;Indr\u0117 Vaicekavi\u010di\u016bt\u0117 is an accomplished SEO Specialist and Content Manager at <a href=\"https:\/\/cybernews.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">CyberNews<\/a>. She is responsible for optimizing website content and enhancing its visibility in search engine rankings.  With expertise in cyber security, SEO, and content creation, she is a renowned author, providing readers with insightful and accessible perspectives on the ever-changing landscape of digital threats and protective measures.\u201d<\/p>\n<\/div><figure class=\"wp-block-media-text__media\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"683\" src=\"https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2023\/08\/Indre-1024x683.jpg\" alt=\"\" class=\"wp-image-15913 size-full\" srcset=\"https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2023\/08\/Indre-1024x683.jpg 1024w, https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2023\/08\/Indre-300x200.jpg 300w, https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2023\/08\/Indre-768x512.jpg 768w, https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2023\/08\/Indre-1536x1024.jpg 1536w, https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2023\/08\/Indre-100x67.jpg 100w, https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2023\/08\/Indre-301x201.jpg 301w, https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2023\/08\/Indre-343x229.jpg 343w, https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2023\/08\/Indre.jpg 2048w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure><\/div>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<p><\/p>\n\n\n\n\t<section itemprop=\"hasPart\" itemscope itemtype=\"https:\/\/schema.org\/WebPageElement\"  class=\"wp-block-acf-featured-news-resources  page-list-section has-main-bg-background-color\" >\n\n    \t\t  <div class=\"grid-container grid-title\">\n\n        <div class=\"grid-x grid-padding-x\">\n          <div class=\"cell\">\n            <h2 class=\"title\">Check out our latest ebook<\/h2>\n          <\/div>\n        <\/div>\n      <\/div>\n    \n    <div class=\"grid-container grid-content\">\n\t\t\t<div class=\"grid-x grid-padding-x featured-slider slick-flex\">\n\n        \n<article class=\"cell medium-6 large-4 resource-wrapper flex-container flex-dir-column post-12900 resource type-resource status-publish has-post-thumbnail hentry resource_category-ebook\">\n\n  <div class=\"article-box-content flex-child-grow flex-container flex-dir-column\">\n    <header class=\"entry-header flex-child-grow flex-container flex-dir-column\">\n\n      <div class=\"post-link flex-child-grow flex-container flex-dir-column\">\n\n        <div class=\"content-wrapper\">\n                      <div class=\"category-wrapper\">\n              <span class=\"category-name has-white-color\">eBook<\/span>\n            <\/div>\n          \n          <h3 class=\"entry-title flex-child-grow seo-title\" itemprop=\"name headline\">\n            Cryptography at the core of the Quantum revolution          <\/h3>\n\n          <a class=\"read-more-link\" href=\"https:\/\/www.thegreenbow.com\/en\/ressource\/ebook\/cryptography-at-the-core-of-the-quantum-revolution\/\">Discover<\/a>\n\n        <\/div>\n      <\/div>\n\n    <\/header>\n  <\/div>\n<\/article>\n\t\t\t<\/div>\n\t\t<\/div>\n\t<\/section>\n<\/div>\n","protected":false},"featured_media":15933,"template":"","meta":{"_acf_changed":false,"resource_type":"internal"},"resource_category":[30,342],"class_list":["post-15908","resource","type-resource","status-publish","has-post-thumbnail","hentry","resource_category-blog","resource_category-blog-en"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Migration to quantum-resistant cryptography - TheGreenBow<\/title>\n<meta name=\"description\" content=\"The shift to quantum-proof cryptography is essential for enterprises to protect their confidential data from the impending risk of quantum-powered breaches.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.thegreenbow.com\/en\/ressource\/migration-to-quantum-resistant-cryptography\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Migration to quantum-resistant cryptography - TheGreenBow\" \/>\n<meta property=\"og:description\" content=\"The shift to quantum-proof cryptography is essential for enterprises to protect their confidential data from the impending risk of quantum-powered breaches.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.thegreenbow.com\/en\/ressource\/migration-to-quantum-resistant-cryptography\/\" \/>\n<meta property=\"og:site_name\" content=\"TheGreenBow\" \/>\n<meta property=\"article:modified_time\" content=\"2023-08-28T10:02:13+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2023\/08\/post-Cybernews.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2048\" \/>\n\t<meta property=\"og:image:height\" content=\"1365\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@thegreenbow\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.thegreenbow.com\\\/en\\\/ressource\\\/migration-to-quantum-resistant-cryptography\\\/\",\"url\":\"https:\\\/\\\/www.thegreenbow.com\\\/en\\\/ressource\\\/migration-to-quantum-resistant-cryptography\\\/\",\"name\":\"Migration to quantum-resistant cryptography - TheGreenBow\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.thegreenbow.com\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.thegreenbow.com\\\/en\\\/ressource\\\/migration-to-quantum-resistant-cryptography\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.thegreenbow.com\\\/en\\\/ressource\\\/migration-to-quantum-resistant-cryptography\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.thegreenbow.com\\\/wp-content\\\/uploads\\\/2023\\\/08\\\/post-Cybernews.jpg\",\"datePublished\":\"2023-08-25T10:15:56+00:00\",\"dateModified\":\"2023-08-28T10:02:13+00:00\",\"description\":\"The shift to quantum-proof cryptography is essential for enterprises to protect their confidential data from the impending risk of quantum-powered breaches.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.thegreenbow.com\\\/en\\\/ressource\\\/migration-to-quantum-resistant-cryptography\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.thegreenbow.com\\\/en\\\/ressource\\\/migration-to-quantum-resistant-cryptography\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.thegreenbow.com\\\/en\\\/ressource\\\/migration-to-quantum-resistant-cryptography\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.thegreenbow.com\\\/wp-content\\\/uploads\\\/2023\\\/08\\\/post-Cybernews.jpg\",\"contentUrl\":\"https:\\\/\\\/www.thegreenbow.com\\\/wp-content\\\/uploads\\\/2023\\\/08\\\/post-Cybernews.jpg\",\"width\":2048,\"height\":1365},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.thegreenbow.com\\\/en\\\/ressource\\\/migration-to-quantum-resistant-cryptography\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.thegreenbow.com\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Blog\",\"item\":\"https:\\\/\\\/www.thegreenbow.com\\\/fr\\\/ressources\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Migration to quantum-resistant cryptography\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.thegreenbow.com\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.thegreenbow.com\\\/en\\\/\",\"name\":\"TheGreenBow\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.thegreenbow.com\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.thegreenbow.com\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.thegreenbow.com\\\/en\\\/#organization\",\"name\":\"TheGreenBow\",\"url\":\"https:\\\/\\\/www.thegreenbow.com\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.thegreenbow.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.thegreenbow.com\\\/wp-content\\\/uploads\\\/2021\\\/04\\\/Logotype@2x-min.png\",\"contentUrl\":\"https:\\\/\\\/www.thegreenbow.com\\\/wp-content\\\/uploads\\\/2021\\\/04\\\/Logotype@2x-min.png\",\"width\":422,\"height\":84,\"caption\":\"TheGreenBow\"},\"image\":{\"@id\":\"https:\\\/\\\/www.thegreenbow.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/thegreenbow\",\"https:\\\/\\\/fr.linkedin.com\\\/company\\\/thegreenbow\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCZKtI7_fmgFcmovgGSy8AnQ\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Migration to quantum-resistant cryptography - TheGreenBow","description":"The shift to quantum-proof cryptography is essential for enterprises to protect their confidential data from the impending risk of quantum-powered breaches.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.thegreenbow.com\/en\/ressource\/migration-to-quantum-resistant-cryptography\/","og_locale":"en_US","og_type":"article","og_title":"Migration to quantum-resistant cryptography - TheGreenBow","og_description":"The shift to quantum-proof cryptography is essential for enterprises to protect their confidential data from the impending risk of quantum-powered breaches.","og_url":"https:\/\/www.thegreenbow.com\/en\/ressource\/migration-to-quantum-resistant-cryptography\/","og_site_name":"TheGreenBow","article_modified_time":"2023-08-28T10:02:13+00:00","og_image":[{"width":2048,"height":1365,"url":"https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2023\/08\/post-Cybernews.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_site":"@thegreenbow","twitter_misc":{"Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.thegreenbow.com\/en\/ressource\/migration-to-quantum-resistant-cryptography\/","url":"https:\/\/www.thegreenbow.com\/en\/ressource\/migration-to-quantum-resistant-cryptography\/","name":"Migration to quantum-resistant cryptography - TheGreenBow","isPartOf":{"@id":"https:\/\/www.thegreenbow.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.thegreenbow.com\/en\/ressource\/migration-to-quantum-resistant-cryptography\/#primaryimage"},"image":{"@id":"https:\/\/www.thegreenbow.com\/en\/ressource\/migration-to-quantum-resistant-cryptography\/#primaryimage"},"thumbnailUrl":"https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2023\/08\/post-Cybernews.jpg","datePublished":"2023-08-25T10:15:56+00:00","dateModified":"2023-08-28T10:02:13+00:00","description":"The shift to quantum-proof cryptography is essential for enterprises to protect their confidential data from the impending risk of quantum-powered breaches.","breadcrumb":{"@id":"https:\/\/www.thegreenbow.com\/en\/ressource\/migration-to-quantum-resistant-cryptography\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.thegreenbow.com\/en\/ressource\/migration-to-quantum-resistant-cryptography\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.thegreenbow.com\/en\/ressource\/migration-to-quantum-resistant-cryptography\/#primaryimage","url":"https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2023\/08\/post-Cybernews.jpg","contentUrl":"https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2023\/08\/post-Cybernews.jpg","width":2048,"height":1365},{"@type":"BreadcrumbList","@id":"https:\/\/www.thegreenbow.com\/en\/ressource\/migration-to-quantum-resistant-cryptography\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.thegreenbow.com\/en\/"},{"@type":"ListItem","position":2,"name":"Blog","item":"https:\/\/www.thegreenbow.com\/fr\/ressources\/blog\/"},{"@type":"ListItem","position":3,"name":"Migration to quantum-resistant cryptography"}]},{"@type":"WebSite","@id":"https:\/\/www.thegreenbow.com\/en\/#website","url":"https:\/\/www.thegreenbow.com\/en\/","name":"TheGreenBow","description":"","publisher":{"@id":"https:\/\/www.thegreenbow.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.thegreenbow.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.thegreenbow.com\/en\/#organization","name":"TheGreenBow","url":"https:\/\/www.thegreenbow.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.thegreenbow.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2021\/04\/Logotype@2x-min.png","contentUrl":"https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2021\/04\/Logotype@2x-min.png","width":422,"height":84,"caption":"TheGreenBow"},"image":{"@id":"https:\/\/www.thegreenbow.com\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/thegreenbow","https:\/\/fr.linkedin.com\/company\/thegreenbow","https:\/\/www.youtube.com\/channel\/UCZKtI7_fmgFcmovgGSy8AnQ"]}]}},"_links":{"self":[{"href":"https:\/\/www.thegreenbow.com\/en\/wp-json\/wp\/v2\/resource\/15908","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.thegreenbow.com\/en\/wp-json\/wp\/v2\/resource"}],"about":[{"href":"https:\/\/www.thegreenbow.com\/en\/wp-json\/wp\/v2\/types\/resource"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.thegreenbow.com\/en\/wp-json\/wp\/v2\/media\/15933"}],"wp:attachment":[{"href":"https:\/\/www.thegreenbow.com\/en\/wp-json\/wp\/v2\/media?parent=15908"}],"wp:term":[{"taxonomy":"resource_category","embeddable":true,"href":"https:\/\/www.thegreenbow.com\/en\/wp-json\/wp\/v2\/resource_category?post=15908"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}