{"id":2191,"date":"2025-05-29T10:39:22","date_gmt":"2025-05-29T08:39:22","guid":{"rendered":"https:\/\/sympulse.cz\/?p=2191"},"modified":"2025-05-29T10:44:17","modified_gmt":"2025-05-29T08:44:17","slug":"how-to-prepare-for-the-post-quantum-era","status":"publish","type":"post","link":"https:\/\/sympulse.cz\/index.php\/2025\/05\/29\/how-to-prepare-for-the-post-quantum-era\/","title":{"rendered":"How to Prepare for the Post-Quantum Era?"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"2191\" class=\"elementor elementor-2191\" data-elementor-post-type=\"post\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c83b25c e-flex e-con-boxed e-con e-parent\" data-id=\"c83b25c\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-21b8ace elementor-widget elementor-widget-text-editor\" data-id=\"21b8ace\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The risks associated with the advent of quantum technologies are not hypothetical\u2014they represent a real challenge for every organization that relies on classical cryptographic algorithms.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ff3f470 elementor-widget elementor-widget-text-editor\" data-id=\"ff3f470\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>During the March edition of <a style=\"background-color: #d1e4e5;\" href=\"https:\/\/www.alanata.sk\/event\/alanata-talks-ste-pripraveni-na-kvantovu-buducnost\/\" target=\"_blank\" rel=\"noopener\">Alanata TALKS<\/a> together with technology leaders from <strong>IBM<\/strong> and\u00a0<b>Alanata\u00a0<\/b>we opened the discussion on <b>quantum resilience<\/b> and <b>post-quantum cryptography<\/b> (PQC).\u00a0Invited experts presented concrete strategies for getting started, outlined the algorithms and technologies already available today, and highlighted key focus areas for companies aiming to protect their critical assets from future quantum attacks.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-be4b7c4 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"be4b7c4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-b85b684 e-con-full e-flex e-con e-child\" data-id=\"b85b684\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7fb7d84 elementor-widget elementor-widget-heading\" data-id=\"7fb7d84\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">How to Build a Quantum-Resilient Organization<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-47b0073 elementor-widget elementor-widget-text-editor\" data-id=\"47b0073\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><a href=\"https:\/\/www.alanata.sk\/kvantove-technologie-revolucia-v-it-bezpecnosti\/\" target=\"_blank\" rel=\"noopener\"><strong>Michal K\u0159elina<\/strong><\/a>,The Head of Quantum Technologies at our company <a href=\"https:\/\/www.sympulse.cz\/\" target=\"_blank\" rel=\"noopener\"><strong>Sympulse<\/strong><\/a>, focused on a practical roadmap for building a quantum-resilient infrastructure. He explained the differences between threats to asymmetric, symmetric, and hashing algorithms, and highlighted current recommendations from both European and national authorities, including <a href=\"https:\/\/nukib.gov.cz\/\" target=\"_blank\" rel=\"noopener\">N\u00daKIB<\/a> a <a href=\"https:\/\/www.nbu.gov.sk\/\" target=\"_blank\" rel=\"noopener\">NB\u00da<\/a>.<\/p><p>His presentation covered:<\/p><ul><li><strong>classification of organizations based on the urgency of PQC<\/strong> <strong>implementation<\/strong> (e.g., PKI providers vs. general users),<\/li><li><strong>proposed process framework<\/strong> (AS-IS analysis, GAP analysis, pilot projects),<\/li><li>selection of appropriate post-quantum algorithms,<\/li><li>recommendations for implementing cryptographic agility and certification measures (e.g., according to ISO\/IEC 27001:2022 and CIS Controls v8.1).<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0c60464 elementor-widget elementor-widget-image\" data-id=\"0c60464\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"800\" height=\"534\" src=\"https:\/\/sympulse.cz\/wp-content\/uploads\/2025\/05\/news-postkvantova-era-2-1024x683.webp\" class=\"attachment-large size-large wp-image-2145\" alt=\"\" srcset=\"https:\/\/sympulse.cz\/wp-content\/uploads\/2025\/05\/news-postkvantova-era-2-1024x683.webp 1024w, https:\/\/sympulse.cz\/wp-content\/uploads\/2025\/05\/news-postkvantova-era-2-300x200.webp 300w, https:\/\/sympulse.cz\/wp-content\/uploads\/2025\/05\/news-postkvantova-era-2-768x512.webp 768w, https:\/\/sympulse.cz\/wp-content\/uploads\/2025\/05\/news-postkvantova-era-2.webp 1536w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-45db6ff e-con-full e-flex e-con e-child\" data-id=\"45db6ff\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1f90237 elementor-widget elementor-widget-heading\" data-id=\"1f90237\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">What are the most common barriers preventing companies from preparing?<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d8db39a elementor-widget elementor-widget-text-editor\" data-id=\"d8db39a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p data-start=\"0\" data-end=\"181\">In a follow-up interview, Michal K\u0159elina pointed out that the biggest obstacle is not the technology itself, but rather the<strong> lack of information<\/strong> and <strong>the underestimation of the risks.<\/strong><\/p><p data-start=\"183\" data-end=\"531\" data-is-last-node=\"\" data-is-only-node=\"\"><em>\u201cIf a company holds sensitive data with a lifespan exceeding 10 years, it is already at risk today. Attackers can intercept such data and decrypt it later using quantum computers,\u201d<\/em> he explains. That\u2019s why he recommends not waiting, but instead launching a <strong>pilot project<\/strong> to test new algorithms, identify vulnerabilities, and set up a migration plan.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-eef4602 e-con-full e-flex e-con e-child\" data-id=\"eef4602\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5244485 elementor-widget elementor-widget-heading\" data-id=\"5244485\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">QUANTUM SAFE \u2013 bezpe\u010dnostn\u00fd r\u00e1mec pripraven\u00fd na bud\u00facnos\u0165<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c9f9103 elementor-widget elementor-widget-text-editor\" data-id=\"c9f9103\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><a href=\"https:\/\/www.linkedin.com\/in\/milos-soukup-65553250\/\" target=\"_blank\" rel=\"noopener\"><strong>Milo\u0161 Soukup<\/strong><\/a>, The Business Technology Leader and Quantum Ambassador at <a href=\"https:\/\/cz.newsroom.ibm.com\/O-IBM\" target=\"_blank\" rel=\"noopener\"><strong>IBM<\/strong><\/a>, focused his presentation on the current state and practical solutions that IBM offers in the field of post-quantum cryptography. His talk covered:<\/p><ul><li>the development of standards led by NIST (ML-KEM, ML-DSA, SLH-DSA),<\/li><li>the availability of PQC algorithms in IBM Cloud and on the IBM z16 platform,<\/li><li>a portfolio of tools including IBM Quantum Safe Explorer, Remediator, and Guardium QS,<\/li><li>and specific deployment options for hybrid cryptography at both the application and infrastructure levels.<\/li><\/ul><p>A key message was that<strong> IBM already offers technologies<\/strong> ready for the transition to the post-quantum era\u2014including <strong><a href=\"https:\/\/mediacenter.ibm.com\/media\/3+Steps+to+Become+Quantum+Safe+with+Crypto-agility\/1_32xuttkw\" target=\"_blank\" rel=\"noopener\">crypto-agile<\/a> platforem<\/strong>, platforms that enable the simultaneous deployment of both classical and post-quantum algorithms.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1f556eb elementor-widget elementor-widget-image\" data-id=\"1f556eb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"800\" height=\"534\" src=\"https:\/\/sympulse.cz\/wp-content\/uploads\/2025\/05\/news-postkvantova-era-3-1024x683.webp\" class=\"attachment-large size-large wp-image-2144\" alt=\"\" srcset=\"https:\/\/sympulse.cz\/wp-content\/uploads\/2025\/05\/news-postkvantova-era-3-1024x683.webp 1024w, https:\/\/sympulse.cz\/wp-content\/uploads\/2025\/05\/news-postkvantova-era-3-300x200.webp 300w, https:\/\/sympulse.cz\/wp-content\/uploads\/2025\/05\/news-postkvantova-era-3-768x512.webp 768w, https:\/\/sympulse.cz\/wp-content\/uploads\/2025\/05\/news-postkvantova-era-3.webp 1536w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5613afd e-con-full e-flex e-con e-child\" data-id=\"5613afd\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-058ad2f elementor-widget elementor-widget-heading\" data-id=\"058ad2f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">How to get started without an in-house security team?<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-bde277f elementor-widget elementor-widget-text-editor\" data-id=\"bde277f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>As a first step, he recommends conducting a<strong> cryptographic inventory<\/strong>, to identify where and which algorithms are currently in use. Using tools such as <a href=\"https:\/\/www.ibm.com\/docs\/en\/quantum-safe\/quantum-safe-explorer\/2.x.x?topic=quantum-safe-explorer-overview#:~:text=IBM%20Quantum%20Safe%E2%84%A2%20Explorer%20simplifies%20the%20discovery%20and,artifacts%20that%20may%20be%20vulnerable%20to%20quantum%20attacks.\" target=\"_blank\" rel=\"noopener\">IBM Quantum Safe Explorer<\/a> an organization can create a <strong>CBOM<\/strong> (Cryptographic Bill of Materials),<\/p><p data-start=\"0\" data-end=\"332\">which serves as a foundation for effective migration planning and investment decisions.<\/p><p data-start=\"334\" data-end=\"540\" data-is-last-node=\"\" data-is-only-node=\"\">He also debunked the common myth that quantum computers will be used solely for research\u2014according to him, this <strong>technology has significant potential for misuse as well,<\/strong> making it crucial to act proactively.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-2a00b77 e-con-full e-flex e-con e-child\" data-id=\"2a00b77\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b18dd19 elementor-widget elementor-widget-heading\" data-id=\"b18dd19\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Watch the full recording of Alanata Talks for free.<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ca7a38c elementor-widget elementor-widget-video\" data-id=\"ca7a38c\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;youtube_url&quot;:&quot;https:\\\/\\\/youtu.be\\\/XnJ7fYo2Fwk&quot;,&quot;video_type&quot;:&quot;youtube&quot;,&quot;controls&quot;:&quot;yes&quot;}\" data-widget_type=\"video.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-wrapper elementor-open-inline\">\n\t\t\t<div class=\"elementor-video\"><\/div>\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-a477654 e-con-full e-flex e-con e-child\" data-id=\"a477654\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-51bbad9 elementor-widget elementor-widget-heading\" data-id=\"51bbad9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Leverage our expertise for a secure transition into the post-quantum era.<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-50453a3 elementor-widget elementor-widget-text-editor\" data-id=\"50453a3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p data-start=\"208\" data-end=\"693\">As a systems integrator, Sympulse works closely with technology partners to ensure our customers can securely face even the most advanced threats. In the area of quantum-safe solutions, we join forces with our sister company Alanata within the<a href=\"https:\/\/www.synteca.sk\/\" target=\"_blank\" rel=\"noopener\"> SYNTECA group<\/a>.<\/p><p data-start=\"0\" data-end=\"494\">This collaboration creates a strong synergistic effect\u2014combining expertise to form a unique partnership in quantum technologies, accelerating the development of innovative solutions and increasing their practical value for our clients.<\/p><p data-start=\"496\" data-end=\"711\" data-is-last-node=\"\" data-is-only-node=\"\">We\u2019re ready to help you analyze your cryptographic infrastructure and recommend the right path toward migrating to quantum-safe solutions. Get in touch with us and start your journey toward quantum resilience today.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>The risks associated with the advent of quantum technologies are not hypothetical\u2014they represent a real challenge for every organization that relies on classical cryptographic algorithms. During the March edition of Alanata TALKS together with technology leaders from IBM and\u00a0Alanata\u00a0we opened the discussion on quantum resilience and post-quantum cryptography (PQC).\u00a0Invited experts presented concrete strategies for getting [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":2147,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[1],"tags":[19],"class_list":["post-2191","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-nezarazene","tag-en"],"_links":{"self":[{"href":"https:\/\/sympulse.cz\/index.php\/wp-json\/wp\/v2\/posts\/2191","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sympulse.cz\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sympulse.cz\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sympulse.cz\/index.php\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/sympulse.cz\/index.php\/wp-json\/wp\/v2\/comments?post=2191"}],"version-history":[{"count":0,"href":"https:\/\/sympulse.cz\/index.php\/wp-json\/wp\/v2\/posts\/2191\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/sympulse.cz\/index.php\/wp-json\/wp\/v2\/media\/2147"}],"wp:attachment":[{"href":"https:\/\/sympulse.cz\/index.php\/wp-json\/wp\/v2\/media?parent=2191"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sympulse.cz\/index.php\/wp-json\/wp\/v2\/categories?post=2191"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sympulse.cz\/index.php\/wp-json\/wp\/v2\/tags?post=2191"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}