Becoming quantum-safe

Michele Mosca, CEO, evolutionQ

Michele Mosca is CEO and co-founder of evolutionQ, a cybersecurity company that pioneered quantum risk management and the BasejumpTM software product suite that enables scalable cryptographic resilience. Prior to co-founding evolutionQ, Michele co-founded the Institute for Quantum Computing while being a Professor of Mathematics at the University of Waterloo, Canada. He is a founding member of the Perimeter Institute for Theoretical Physics and his work on quantum computing and quantum-safe cryptography is widely cited.


Can you begin by telling us about your journey into the quantum-safe cryptography space?

I’ve been working at the intersection of cryptography and quantum computing since the 1990s 鈥 before the two were overtly connected. Over the past decade, I’ve shifted toward commercialization. Initially through services and, over the past five years, by building out a product company to address the need for cryptographic modernization, including quantum readiness and overall readiness for a cryptographic zero-day.


How would you describe the current state of awareness around quantum-safe cryptography?

Awareness has definitely increased, owing in part to organizations such as Google and IBM. But we鈥檙e still not where we need to be. Most people see this as a 鈥渙ne-problem-one-solution鈥 situation. What they need to understand is that the quantum threat is just a visible example of the things that could go wrong with our cryptographic foundations. We don’t know the limits of quantum computing and, with AI accelerating, it’s becoming even more difficult to predict future vulnerabilities.

There are two waves of awareness. First, we must recognize that there is a threat. Second, and more profoundly, we have to accept that it鈥檚 not going to go away. On the contrary, code-breaking threats will keep evolving, and our systems must be resilient by design. Just as we moved from passwords to multi-factor authentication, our key exchange and cryptographic practices must also become layered and agile. But agility alone is not enough. If your infrastructure is hijacked and money is stolen, you must be resilient.

The quantum threat is just a visible example of the things that could go wrong with our cryptographic foundations. We don’t know the limits of quantum computing.


Why do you think there is an urgency to address the quantum threat?

A few key risks drive urgency. 鈥岶irstly, transitioning to quantum-safe cryptographic infrastructure is a complex, multi-year process. Organizations that underestimate this challenge risk rushed, poorly executed migrations that could leave critical systems exposed and lead to prolonged operational disruption. Or they might be too late, and systemic quantum-enabled attacks start before they are ready. There鈥檚 no free lunch: every unit of crypto-procrastination translates either into a unit of catastrophic risk or a unit of rushed migration risk.

Another risk is already becoming a reality: 鈥渉arvest now, decrypt later鈥 attacks. Although a cryptographically relevant quantum computer does not yet exist, malicious actors are collecting encrypted data with the intent to decrypt it once quantum computers become powerful enough to do so. If organizations fail to implement quantum-safe cryptographic strategies proactively, sensitive communications, financial transactions, and classified data may be at immediate risk.

And then, as regulators, partners, and other stakeholders push for quantum-readiness, there is compliance risk and the risk of simply not keeping up with the needs of your key stakeholders.

There鈥檚 no free lunch: every unit of crypto-procrastination translates either into a unit of catastrophic risk or a unit of rushed migration risk.


What are the main challenges in scaling and commercializing quantum-safe solutions?

Interestingly, the technical challenges while tough, are manageable. The harder part is getting timelines aligned across the ecosystem. Everyone from vendors to customers must commit to securing their systems by a certain date.

But some are still lagging, and we can鈥檛 cater to the lowest common denominator anymore. It鈥檚 time to separate the wheat from the chaff and improve our vendor ecosystem quality.

Another key issue is the lack of a clear mandate. If regulators and customers demanded resilience and set clear expectations, it would accelerate adoption. But too many are still debating when 鈥淨-Day鈥 will be, rather than acknowledging the urgency. That question was valid 10 years ago, but now it’s outdated. Today, we need to focus on getting this done. The threat is already too close for comfort.


How do you create a sense of urgency around this threat?

Organizations need to understand that the quantum threat isn鈥檛 far off in the future. It鈥檚 already affecting them today, as in the 鈥渉arvest now, decrypt later鈥 threat. They must also consider the time required for a proper migration to quantum-safe technology.

This will quickly pivot from 鈥渄oesn鈥檛 matter鈥 to 鈥測ou better have it done.鈥 Adequate preparation will be a real business differentiator. One investor told me, 鈥淚t鈥檚 a dollar to get ready before left of boom, and hundreds of millions right of boom.鈥 That captures the stakes.

One of the major obstacles is self-imposed. A lot of this is driven by cool technological tactics that are unconnected with business objectives. The real goals are business continuity, resilience, trust, and risk reduction.

Adequate preparation will be a real business differentiator.


Why is the industry鈥檚 focus on crypto inventory slowing progress, and what is the correct approach?

People are embarking on the gargantuan task of inventorying their cryptography but can鈥檛 remember why they are doing it. They must use it to understand and mitigate business risk. Some even say, 鈥淚 can鈥檛 do my risk assessment yet because I haven鈥檛 done my inventory.鈥 That鈥檚 missing the point.

I鈥檒l give an example. Someone from Ericsson showed one slide in Toronto recently, it explained how 5G works and said: 鈥淭he biggest threat is firmware updates.鈥 Boom. In 30 seconds, there鈥檚 your biggest quantum risk. They didn鈥檛 spend years scanning software just to produce massive data tables.

When cleaning your house, you don鈥檛 need to dust every chandelier before you deal with the corpses in the dining room. Inventory is a part of mature crypto management, but don鈥檛 let it stall your risk assessments. Act on the most obvious risks.


Have you heard of any post-migration concerns around latency, performance, or compatibility with legacy systems?

Around 80% of the time, you’ll be fine. Even on a phone. But what if you鈥檙e in an internet of things (IoT) scenario or other constrained environments? Then, it becomes a problem. And you better find out in advance. If you need lightweight PQC and it doesn鈥檛 exist, then what?

Some experienced applied cryptographers are realizing that, most of the time, PQC is the answer. Just upgrade your PKI [public key infrastructure] to post-quantum PKI and you’re good. But, in a few cases, we鈥檙e seeing situations where PKI might be overkill. Here, we should revisit assumptions.

There are use cases where we did PKI because that鈥檚 what we knew. But, in controlled, exclusive systems, it鈥檚 worth asking why we’re still using PKI. It鈥檚 slow, consumes energy, and is vulnerable to cryptanalysis. In these cases, maybe it鈥檚 time to leverage symmetric key solutions, which are faster and more secure in the long term.


What would be your advice to a company beginning its post-quantum journey?

First, do a very quick, high-level business risk assessment. It doesn鈥檛 have to be complete. Just make a start.

Second, start engaging with the ecosystem. Figure out who鈥檚 going to evolve to be part of the solution and who you鈥檒l have to replace. Start pilots and proofs of concept. Ideally, some members of your existing ecosystem step up. But not all will.

You might light a fire under some of them to get them to improve. But you鈥檒l need to find alternatives to others, either because they lack the business will or the technical ability to get where you need to be. So, start right away. Don鈥檛 try to eat the elephant all at once. Begin doing some rapid mitigations, so you can learn quickly.

Do a very quick, high-level business risk assessment. It doesn鈥檛 have to be complete. Just make a start.
Second, start engaging with the ecosystem.