Post Quantum Cryptography
What is a Quantum Computer?
Quantum computers are no longer a theoretical concept—they are here and evolving rapidly. Unlike classical computers that use binary bits (0s and 1s), quantum computers leverage qubits, enabling them to perform complex calculations at speeds unimaginable with today’s supercomputers. This breakthrough technology has significant implications for cybersecurity.
The Post-Quantum Apocalypse
A Looming Threat
With advancements in quantum computing, the timeline for breaking traditional encryption has drastically shortened:

2021
Breaking modern encryption would take over a million years with classical computers.

2022
Quantum advancements reduced this estimate to 1,000 years.

2023
The timeline dropped further to just 100 years—and continues to shrink.
The reality? Quantum decryption capabilities may arrive much sooner than expected.
Current Quantum Threats
Everyone is already at risk
Quantum computers with sufficient qubit power can already decrypt many encryption methods once considered secure. This puts sensitive data, financial transactions, and personal information at risk.
What's happening right now?
- Cybercriminals are actively harvesting encrypted data today, storing it for future decryption once quantum computing advances further. This practice, known as “Harvest Now, Decrypt Later,” poses an imminent threat.
- Some organizations already have access to early-stage quantum decryption capabilities, enabling real-time document decryption.
- Encryption that protects today’s data may soon become obsolete.
The risk isn’t just a future concern—it’s happening now.
What Can We Do Now?
The cybersecurity community is racing to develop quantum-resistant encryption to counteract these threats.
Some of the leaders in this space include:

Digicert
A key player in developing post-quantum cryptographic algorithms

National Institute of Standards and Technology
Spearheading the Post-Quantum Cryptography Standardization Project, selecting quantum-resistant algorithms.

IBM
A major player in quantum-safe cryptography, contributing to quantum-resistant encryption protocols.
The Changing Landscape of SSL/TLS Certificate Validity
SSL/TLS certificate validity periods have been steadily decreasing due to industry regulations set by major browser vendors such as Apple, Google, and Mozilla. The push toward shorter certificate lifespans is aimed at improving security and ensuring a faster response to emerging threats, including post-quantum cryptographic risks.
Key Changes in SSL Certificate Validity
- Before March 2018: SSL certificates could be issued for up to 825 days (over two years).
- March 1, 2018: The CA/Browser Forum introduced a new rule limiting SSL validity to 398 days (~13 months).
- September 1, 2020: Apple, followed by Google and Mozilla, enforced a maximum validity of 398 days.
- Upcoming Change (Expected in 2025-2026): Industry discussions suggest SSL validity may soon be reduced to 90 days.
Why Are SSL Validity Periods Getting Shorter?
- Enhanced Security – Shorter lifespans reduce risks from compromised, stolen, or misused certificates.
- Crypto Agility – Allows for a faster transition to post-quantum cryptography when necessary.
- Automation Readiness – Encourages organizations to implement automated certificate renewal processes using protocols like ACME (Automated Certificate Management Environment).
What's Next?
The transition to 90-day SSL certificates is not yet mandatory, but it is highly likely within the next 1-2 years. Organizations should begin preparing now by implementing:
- Automated SSL renewal systems to prevent lapses in security.
- Post-quantum cryptography strategies to future-proof encryption.
- Certificate lifecycle management solutions to stay compliant with upcoming browser and industry requirements.
Get Prepared
Download Post-Quantum Cryptography for Dummies
Stay ahead of emerging security threats with expert insights into post-quantum cryptography. This guide provides actionable steps to help your organization prepare for the quantum era and implement quantum-resistant security strategies.
How to access the Guide
- 1. Enter your details in the form.
- 2. Receive an email with a secure link to download the guide.
- 3. Learn how to future-proof your security infrastructure before quantum threats become a reality.