• 2 Dec 2025
  • 3 min read

Crypto Agility: How to Make Your IT Department Future-Proof

Quantum computing is no longer a distant theoretical idea. Over the next five to ten years, these machines may gain the power to break the cryptographic foundations we rely on every day; from VPNs and digital certificates to cloud systems and long-term archives.

Some cryptography will remain safe. Some will become effectively useless. And organizations that wait too long to adapt may find themselves exposed in ways they can't recover from.

In this article, we'll break down what's actually at risk, what will remain secure, and how IT leaders can prepare their environments for the post-quantum era.

Why Quantum Computing Threatens Today's Cryptography

Modern cryptography is deeply tied to mathematics, specifically, mathematical problems that classical computers struggle to solve. Quantum computers approach these problems differently, enabling them to solve certain tasks exponentially faster.

This creates an immediate risk:

Data stolen today can be decrypted later. This is known as "harvest now, decrypt later."

Any sensitive information intercepted, even if it's encrypted today, could be exposed once quantum computers mature.

But not all cryptographic systems are equally vulnerable.

1. Symmetric Cryptography (AES, etc.) – Mostly Safe

Symmetric encryption uses the same key to encrypt and decrypt data. The most well-known example is AES, originally developed in Leuven, Belgium.

The good news: symmetric cryptography remains largely secure in the post-quantum world.

Quantum computers do offer one advantage here: Grover's algorithm provides a quadratic speed-up for brute-force attacks.

  • Classical brute force: 2^n steps
  • Quantum brute force: 2^(n/2) steps

The fix is simple: use longer keys.

AES-256 is considered quantum-resistant and remains safe for the foreseeable future.

2. Asymmetric Cryptography – Quantum-Vulnerable

This is where the real danger begins.

Asymmetric cryptography uses two keys:

  • a public key (shared), and
  • a private key (kept secret).

It secures everything from TLS certificates and VPNs to identity systems, code signing, and secure communication.

Algorithms at risk include:

  • RSA
  • ECC (Elliptic Curve Cryptography)
  • Diffie-Hellman
  • DSA

These systems depend on mathematical problems like integer factorization and discrete logarithms – exactly the problems Shor's algorithm solves dramatically faster on a quantum computer.

Key size doesn't matter. Even huge keys will break.

The solution: Post-Quantum Cryptography

NIST has now published the first official quantum-safe standards:

  • FIPS 203 – ML-KEM (Key Encapsulation)
  • FIPS 204 – ML-DSS (Digital Signatures)
  • FIPS 205 – SLH-DSS (Hash-based Signatures)

These algorithms are lattice-based, efficient, and secure against quantum attacks. Most importantly:

They run on conventional hardware. No quantum computer required.

3. Crypto Agility – Your Long-Term Survival Strategy

Even with standards available, there is uncertainty:

  • Quantum capabilities will evolve
  • Standards will be refined
  • Keys will need renewal
  • Hybrid cryptography may become necessary
  • Migrations will take years

Crypto agility means designing systems that can change cryptographic algorithms quickly, without major architectural rewrites or system migrations.

This is essential for:

  • large IT environments
  • organizations with long data-retention requirements
  • regulated industries
  • any system that must remain secure for a decade or more

If your data must remain confidential for 10–20 years, crypto agility is no longer optional. It becomes critical.

4. What You Should Do Today

Whether you're a CISO, architect, or IT decision-maker, here's the practical roadmap:

Migrate immediately away from quantum-vulnerable algorithms

  • RSA
  • Diffie-Hellman
  • DSA
  • ECC

Adopt quantum-safe cryptography where possible

Start exploring ML-KEM and ML-DSS implementations.

Reinforce symmetric systems

  • Use AES-256
  • Prefer SHA-512 for hashing

Prepare your infrastructure for crypto agility

This includes key management, certificate management, archives, backups, and application dependencies.

Large organizations may need several years to migrate and conservative estimates suggest we may only have five.

Conclusion

Quantum computing will break significant parts of our current cryptography landscape. But not all cryptography is fragile and with the right choices today, your organization can remain secure long into the post-quantum future.

The transition begins now. Start early, stay agile, and ensure your most valuable data remains protected.