TRANSITIONING
TO QSC
D o m e n Z a v r l
DOMEN ZAVRL
2
The NCSC recommends that large organizations and
businesses incorporate the threat of attacks from
quantum computers into their long-term plans. The NCSC
believes that major commercial services and products will
make the transition to QSC as soon as the NIST standards
become available and the relevant protocols have been
updated to support QSC.
T R A N S I T I O N I N G T O Q S C
DOME N ZAVRL
3
It’s recommended that most
users continue to follow
their current best practices
regarding cyber security
until the development of
QCS standard-compliant
products occurs.
RECOMMENDED COURSES OF ACTION
It’s recommended that most users continue to
follow their current best practices regarding
cyber security until the development of QCS
standard-compliant products occurs. For
organizations that are responsible for their
own cryptographic infrastructure, it’s a good
idea to factor in the transition to QSC into
their long-term roadmaps. It’s recommended
that these organizations undertake
investigatory work to discover which of their
systems are high priority when it comes to
the transition. Such priority systems could
be elements of public-key infrastructure that
incorporate certificate expiry dates far in
the future or systems that process sensitive
personal data.
THE INTERIM PERIOD
It is expected that there will be an interim
period when organizations will need to
operate both traditional and quantum-safe
cryptography simultaneously. During this
time, support for conventional PKC will need
to continue.
DOMEN ZAVRL
For more information about this topic,
visit the blog of Domen Zavrl.

More Related Content

PDF
Domen Zavrl - The Quantum Future of Cryptography
PPTX
Joe Biden’s Memorandum Post-Quantum Cryptography
PPTX
FIDO Seminar: Evolving Landscape of Post-Quantum Cryptography.pptx
PDF
Domen Zavrl - How Will the PQC Migration Happen?
PPTX
Webinar: Critical Steps For NIST Compliance
PPTX
Quantum Safety in Certified Cryptographic Modules
PPTX
Prepare For Post-Quantum Cryptography
PPTX
NIST Cloud Computing Efforts
Domen Zavrl - The Quantum Future of Cryptography
Joe Biden’s Memorandum Post-Quantum Cryptography
FIDO Seminar: Evolving Landscape of Post-Quantum Cryptography.pptx
Domen Zavrl - How Will the PQC Migration Happen?
Webinar: Critical Steps For NIST Compliance
Quantum Safety in Certified Cryptographic Modules
Prepare For Post-Quantum Cryptography
NIST Cloud Computing Efforts

More from Domen Zavrl (20)

PDF
Domen Zavrl - What Is a Commodity Market?
PDF
Domen Zavrl - Different Types of Real Estate Tokenisation
PDF
Domen Zavrl - Post-Quantum Cryptography: Lattice-Based Cryptography
PDF
Domen Zavrl - Cryptography Why All Businesses Need to Prepare for 'Q-Day' As ...
PDF
Domen Zavrl - What Is Structured Finance for Start-Ups?
PDF
Domen Zavrl - Strategic Technology Trends Set to Make a Major Impact in 2025
PDF
Domen Zavrl - How Does Securities Lending Work
PDF
Domen Zavrl - How Quantum Computers Will Change Our World
PDF
Domen Zavrl - Why Commodities Trading Could Help Drive the Energy Transition
PDF
The Work of the National Institute of Standards and Technology
PDF
Domen Zavrl - What Is Structured Finance
PDF
Asset Types Common to Securitisation
PDF
Internal Audit: Core Principles
PDF
Learning Societies: The Globalization of Learning
PDF
The World Bank: Working to Promote Debt Transparency
PDF
Crypto Trends 2023: The Future of Bitcoin Adoption, NFTs and Web3 Gaming
PDF
The Origins of the Modern Stock Market
PDF
The Impact of the COVID-19 Pandemic on the Global Economy
PDF
Cybersecurity Threats of 2023
PDF
The 2030 Agenda for Sustainable Development from the United Nations: Educatio...
Domen Zavrl - What Is a Commodity Market?
Domen Zavrl - Different Types of Real Estate Tokenisation
Domen Zavrl - Post-Quantum Cryptography: Lattice-Based Cryptography
Domen Zavrl - Cryptography Why All Businesses Need to Prepare for 'Q-Day' As ...
Domen Zavrl - What Is Structured Finance for Start-Ups?
Domen Zavrl - Strategic Technology Trends Set to Make a Major Impact in 2025
Domen Zavrl - How Does Securities Lending Work
Domen Zavrl - How Quantum Computers Will Change Our World
Domen Zavrl - Why Commodities Trading Could Help Drive the Energy Transition
The Work of the National Institute of Standards and Technology
Domen Zavrl - What Is Structured Finance
Asset Types Common to Securitisation
Internal Audit: Core Principles
Learning Societies: The Globalization of Learning
The World Bank: Working to Promote Debt Transparency
Crypto Trends 2023: The Future of Bitcoin Adoption, NFTs and Web3 Gaming
The Origins of the Modern Stock Market
The Impact of the COVID-19 Pandemic on the Global Economy
Cybersecurity Threats of 2023
The 2030 Agenda for Sustainable Development from the United Nations: Educatio...
Ad

Recently uploaded (20)

PPTX
Group 1 Presentation -Planning and Decision Making .pptx
PDF
TrustArc Webinar - Click, Consent, Trust: Winning the Privacy Game
PDF
Hybrid model detection and classification of lung cancer
PPTX
observCloud-Native Containerability and monitoring.pptx
PDF
Hindi spoken digit analysis for native and non-native speakers
PDF
Hybrid horned lizard optimization algorithm-aquila optimizer for DC motor
PDF
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
PDF
Zenith AI: Advanced Artificial Intelligence
PPTX
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
PPTX
Chapter 5: Probability Theory and Statistics
PDF
WOOl fibre morphology and structure.pdf for textiles
PPTX
Modernising the Digital Integration Hub
PDF
A contest of sentiment analysis: k-nearest neighbor versus neural network
PPT
What is a Computer? Input Devices /output devices
PDF
Architecture types and enterprise applications.pdf
PPTX
Web Crawler for Trend Tracking Gen Z Insights.pptx
PDF
1 - Historical Antecedents, Social Consideration.pdf
PDF
Getting Started with Data Integration: FME Form 101
PPTX
O2C Customer Invoices to Receipt V15A.pptx
PDF
Unlock new opportunities with location data.pdf
Group 1 Presentation -Planning and Decision Making .pptx
TrustArc Webinar - Click, Consent, Trust: Winning the Privacy Game
Hybrid model detection and classification of lung cancer
observCloud-Native Containerability and monitoring.pptx
Hindi spoken digit analysis for native and non-native speakers
Hybrid horned lizard optimization algorithm-aquila optimizer for DC motor
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
Zenith AI: Advanced Artificial Intelligence
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
Chapter 5: Probability Theory and Statistics
WOOl fibre morphology and structure.pdf for textiles
Modernising the Digital Integration Hub
A contest of sentiment analysis: k-nearest neighbor versus neural network
What is a Computer? Input Devices /output devices
Architecture types and enterprise applications.pdf
Web Crawler for Trend Tracking Gen Z Insights.pptx
1 - Historical Antecedents, Social Consideration.pdf
Getting Started with Data Integration: FME Form 101
O2C Customer Invoices to Receipt V15A.pptx
Unlock new opportunities with location data.pdf
Ad

Transitioning to QSC

  • 1. TRANSITIONING TO QSC D o m e n Z a v r l
  • 2. DOMEN ZAVRL 2 The NCSC recommends that large organizations and businesses incorporate the threat of attacks from quantum computers into their long-term plans. The NCSC believes that major commercial services and products will make the transition to QSC as soon as the NIST standards become available and the relevant protocols have been updated to support QSC. T R A N S I T I O N I N G T O Q S C
  • 3. DOME N ZAVRL 3 It’s recommended that most users continue to follow their current best practices regarding cyber security until the development of QCS standard-compliant products occurs. RECOMMENDED COURSES OF ACTION It’s recommended that most users continue to follow their current best practices regarding cyber security until the development of QCS standard-compliant products occurs. For organizations that are responsible for their own cryptographic infrastructure, it’s a good idea to factor in the transition to QSC into their long-term roadmaps. It’s recommended that these organizations undertake investigatory work to discover which of their systems are high priority when it comes to the transition. Such priority systems could be elements of public-key infrastructure that incorporate certificate expiry dates far in the future or systems that process sensitive personal data. THE INTERIM PERIOD It is expected that there will be an interim period when organizations will need to operate both traditional and quantum-safe cryptography simultaneously. During this time, support for conventional PKC will need to continue.
  • 4. DOMEN ZAVRL For more information about this topic, visit the blog of Domen Zavrl.