netnet-logo 2
  • Home
  • who we are
  • What we do
  • How we do it
  • who we serve
  • Resources
    • Win(win)
    • Contact us
    • Blog
    • Newsletter Archive
    • White Papers
    • Case Studies
    • Video Library
    • News
Contact Us
  • There are no suggestions because the search field is empty.
facebook
Vector
icons8-twitter-24 (1)
Group

Enterprise Security: Getting Ready for Q-Day and PQC

avatar

Dave Young

Jul. 28,2022 | Security, Cyber Security, Quantum Computing

Q-Day: The day quantum computers can render all current encryption methods meaningless. 

 If you are not yet familiar with the terms Q-Day and PQC, you should be starting today.  PQC or ‘Post Quantum Computing’ refers to the next wave of potential security headaches coming your way in the next decade if not sooner. The industry already has coined a term for it, called Q-day, which is when your current security that revolves around cryptography will be rendered irrelevant. So, this may be one area where being an early adopter has far less risk than being a laggard. The good news is that we seem to have some time to prepare for this change (more time than say the Y2K switch) given the current state of innovation around quantum computing. That said, this is one area that it will pay to stay vigilant as our sense is that once the dam breaks on this technology, it will be everywhere in the wrong hands and quickly. 

What is Quantum Computing? 

I blame Max Planck, one the leading German scientists who pioneered quantum theory leading to quantum mechanics, which is the underlying principle of quantum computing. Our ‘classical computing’ machines rely on the old trustworthy system of binary bits and bytes (1’s and 0’s) to calculate and manage data, whereas quantum computing uses a system called qubits.  The really cool thing about qubits, however, is that they too use 1’s and 0’s but have a third state called ‘superposition’. Qubits are created using physical systems, like the spin of an electron or the orientation of a photon. These systems can be in many different arrangements all at once, known as this quantum superposition. This is where all that science from Max Planck (and many others) comes in. Superposition takes advantage of quantum entanglement such that qubits can be represented by 1’s, 0’s, or both at the same time. So, to us laymen, it just means that a quantum computer can take on thousands more computations at the same time than classical computing. 

Why QC a threat to the data security status quo? 

For many years, we’ve been protecting our data with AES (Advanced Encryption Standard) using 128-bit to 256-bit encryption technology. These varying cipher lengths are used to encrypt and decrypt blocks of data. The beauty of this technology has been that in order for a system to hack or break this encryption, would require ‘classical computing’ systems years solve. The sheer computing power required to break the code makes the possibility so remote that no effort would be practical, even for thieves. Who can wait thirty or more years just to see information that is will likely be irrelevant by then?   

Now comes the QC. As referenced earlier, QC is able to process data and computations exponentially faster than classical computing. In fact, exponential does not begin to describe the impact QC will have in terms of computational capacity. Google's Quantum Computer in their lab was reported last year to be about 158 million times faster than the world's fastest supercomputer (IBM Summit). So in essence, this means in theory that a quantum computer could crack our current day standard encryption in minutes, if not seconds. To say that there will be a transition needed to maintain encryption technology and standards to stay well ahead of this would be an understatement. 

What should you be planning for? 

The current state of quantum computing suggests that we are far from having commercial applications and mainstream quantum computing hardware. There are many barriers to overcome in this space, not the least of which is the science behind manufacturing them. Engineers are still working out the best methods and processes to effect quantum computing in real life, and investments are on the rise to help them do that. The good news is that the US Commerce Department’s NIST (National Institute of Standards and Technology) have released the results of a six-year competition to devise methods that could resist or withstand QC attacks. According to them, the results are promising, for now. 

We advise Clients to keep an eye on PQC (post quantum computing) and stay informed! You don’t want to be caught in a situation where you are having to ‘binge buy’ security technology because PQC readiness was underwater.  There are already companies offering to future proof you with quantum encryption capabilities. We look at these skeptically in terms of when to purchase given what’s secure against QC today – may not be tomorrow. 

So, while you may not need this technology now, rest assured that very soon you will be making investments in post quantum security to ensure you are protected. Some are projecting just in the Banking industry alone that Billions will be spent soon to thwart any threats. Today there aren’t any real commercial QC applications or hardware, but there will be bad ‘state’ actors who will have QC technology well before the world knows about it and try to use it on unsuspecting enterprises running 256-bit encryption thinking they are ‘safe’.   

If you need a review of who the players are in this post-quantum security world, let us know and we’d be happy to discuss your situation. 

About NET(net)

Founded in 2002, NET(net) is the world’s leading IT Investment Optimization firm, helping clients find, get and keep more economic and strategic value. With over 2,500 clients around the world in nearly all industries and geographies, and with the experience of over 25,000 field engagements with over 250 technology suppliers in XaaS, Cloud, Hardware, Software, Services, Healthcare, Outsourcing, Infrastructure, Telecommunications, and other areas of IT spend, resulting in incremental client captured value in excess of $250 billion since 2002. NET(net) has the expertise you need, the experience you want, and the performance you demand. Contact us today at info@netnetweb.com, visit us online at www.netnetweb.com, or call us at +1-866-2-NET-net to see if we can help you capture more value in your IT investments, agreements, and relationships.

NET(net)’s Website/Blogs/Articles and other content is subject to NET(net)’s legal terms offered for general information purposes only, and while NET(net) may offer views and opinions regarding the subject matter, such views and opinions are not intended to malign or disparage any other company or other individual or group.

Read similar posts below

By Fred Teekens - Mar. 27,2025

European Tech Leaders Mitigating Geopolitical Risk

READ MORE
By Andrea Alterman - Apr. 29,2021

Top 10 HCM HRMS Suppliers for 2021

READ MORE
By Dave Young - Feb. 27,2020

Security Operations Center: Insource or Outsource to MSSP?

READ MORE
Top12ReasonsWhyHealthcareProvidersPayWAYtOOMuchforIT-2-1

Top 12 Reasons Why: Healthcare Providers Pay WAY TOO Much for IT

Download Free PDF
Top10WaystoDefendYourselffromanOracleAudit-2

Top 10 Ways to Defend Yourself from an Oracle Audit

Download Free PDF
SLS5WaysToManageMicrosoft

SLS 5 Ways To Manage Microsoft

Download Free PDF
Top_7_reasons_Youre_Overpaying _Microsoft - 2017

Top 7 Reasons You’re Overpaying Microsoft – 2017

Download Free PDF
SupplierLockInRisk

Supplier Lock In Risk

Download Free PDF
SLSTheComplianceGambit

SLS The Compliance Gambit

Download Free PDF
SLSMicrosoftLargeAccountResellers

SLS Microsoft Large Account Resellers

Download Free PDF
SLSHiddenFinancialOpportunityinMicrosoft

SLS Hidden Financial Opportunity in Microsoft

Download Free PDF
OverpayingforTelecommunications

Overpaying for Telecommunications

Download Free PDF
OutsourcingGovernanceGuidelines

Outsourcing Governance Guidelines

Download Free PDF
OutsourcingAgreementCrisis

Outsourcing Agreement Crisis

Download Free PDF
OracleThirdPartySupport-1

Oracle Third Party Support

Download Free PDF
cover-book

The Two Greatest Threats to the Banking Industry - Part I: The Case for the Digital Bank

Download Free PDF
OptimizePersuasiveness

Top 12 Reasons Why: Healthcare Providers Pay WAY TOO Much for IT

Download Free PDF
DCSDisasterRecoveryPlanning-1

DCS Disaster Recovery Planning

Download Free PDF
AnInsideLookatSalesforce

An Inside Look at Salesforce

Download Free PDF
MOST POPULAR

image
Top 20 Mainframe Software Suppliers
Steven Zolman
image
Guide: Selecting the Right Microsoft LSP (Licensing Solution Partner)
Scott Braden
image
Top 5 Technology Research Services Firms for 2022
Steven Zolman

Companies overpay average 40% on IT services. Do you?

Learn More
footer logo

Sign up to receive updates

  • Who we are
  • What we do
  • How we do it
  • Who we serve
  • Ethics

  • Resources
  • Contact us
  • Blog
  • Newsletter Archive
  • White Papers
  • Case Studies
  • Video Library
  • News
  • Facebook
  • Instagram
  • twitter
  • linkedin

+1 616.546.3100

info@netnetweb.com

Copyright © 2026 Netnetweb. All Rights Reserved