The looming arrival of quantum computing presents a fundamental threat to modern cybersecurity, potentially rendering current encryption methods obsolete, and a new study investigates how well enterprises are preparing for this disruption. Tran Duc Le from University of Wisconsin, Stout, Phuc Hao Do from Bonch-Bruevich St. Petersburg State University of Telecommunications, and Truong Duy Dinh from Posts and Telecommunications Institute of Technology, alongside Van Dai Pham from Swinburne Vietnam and FPT University, assess enterprise readiness through the lenses of technology, organizational awareness, and potential attacker behaviour. Their research synthesizes recent standards, industry surveys, and threat intelligence to reveal a concerning lack of preparedness, with fewer than 5% of organizations possessing formal plans to transition to quantum-resistant cryptography. The findings highlight that delayed action leaves sensitive data vulnerable for decades, despite expert predictions of cryptographically relevant quantum computers arriving in the 2030s, and underscore the urgent need for proactive strategies to secure digital assets in the emerging quantum era.
Experts recognize the potential for quantum computers to compromise widely used public-key algorithms, prompting a need for organizations to adopt new cryptographic standards. This transition presents considerable challenges, including selecting appropriate algorithms, integrating them into existing systems, and addressing performance considerations. A key focus is raising awareness among security professionals and developing strategies for a smooth and effective transition.
Researchers are actively investigating methods for integrating PQC into existing systems and cryptographic libraries. Complementary technologies like quantum key distribution (QKD) also offer potential solutions, providing theoretically unbreakable encryption based on the laws of physics. The growing body of research demonstrates increasing investment and development in this critical area, though budget and resource allocation remain significant hurdles for many organizations. Successfully navigating this transition requires careful planning, algorithm selection, and a proactive approach to security.
Enterprise Readiness for Post-Quantum Cryptography
Researchers assessed enterprise readiness for post-quantum cryptography by examining technical maturity, organizational awareness, and evolving threats. The team synthesized findings from recent standards, notably the 2024 NIST PQC algorithms, alongside industry surveys and threat intelligence, utilizing a strengths, weaknesses, opportunities, and threats analysis to map the current landscape. This comprehensive methodology provides a nuanced understanding of the challenges and potential solutions surrounding the transition to quantum-resistant security. Scientists analyzed the performance characteristics of standardized PQC algorithms, comparing them to classical counterparts.
While PQC schemes typically exhibit larger key and signature sizes, the overhead is manageable for most applications. Benchmarks reveal Kyber operations achieve speeds comparable to RSA in software, and Dilithium can verify thousands of signatures per second on modern CPUs, demonstrating viable performance. Researchers also noted that lattice-based algorithms benefit from hardware acceleration. Recognizing the importance of flexibility, the team investigated crypto-agility, the ability to swap cryptographic algorithms without disrupting infrastructure, and found many enterprise systems currently lack this capability.
The emergence of standard PQC libraries and protocols, such as updated TLS 1. 3 and X. 509 certificates, supports easier updates and a smoother transition. Early deployments of hybrid cryptography, combining classical and post-quantum algorithms, in platforms like Chrome, Cloudflare, Signal, and Apple iMessage, provide both confidence and backwards compatibility. Researchers emphasize the need for continued scrutiny and a multi-algorithm portfolio, as the unexpected break of the SIKE algorithm during the NIST process underscored the potential for undiscovered weaknesses.
Quantum Cybersecurity Readiness Remains Low Across Enterprises
Researchers investigated enterprise readiness for quantum-safe cybersecurity, examining the challenge from technological, organizational, and threat actor perspectives. The study reveals a landscape of uneven preparedness, despite advancements in post-quantum cryptography (PQC) and quantum key distribution (QKD). Following a multi-year process, the U. S. Many organizations underestimate the risks associated with adversaries harvesting encrypted data now for future decryption. Experts estimate that cryptographically relevant quantum computers may arrive in the 2030s, yet delayed preparation could leave decades of sensitive data vulnerable. Analysis of industry surveys and threat intelligence reveals that financial, telecom, and government sectors are beginning to migrate to quantum-safe solutions, but most industries remain in exploratory phases, stalled by costs, complexity, and a lack of skilled personnel. The research highlights the growing concern surrounding the “store now, decrypt later” tactic, where adversaries stockpile encrypted data anticipating future quantum decryption capabilities. This study underscores the urgent need for establishing crypto-agility, creating transition roadmaps, prioritizing PQC deployment in high-value systems, and upskilling cybersecurity teams to secure digital assets in the quantum era.
Quantum Cybersecurity Readiness Remains Critically Low
This research presents a comprehensive assessment of enterprise preparedness for the coming era of quantum computing and the associated threats to current cybersecurity infrastructure. The study examines readiness from three perspectives: technological solutions, organizational awareness within enterprises, and the evolving capabilities of potential threat actors. Results indicate that while progress has been made in developing post-quantum cryptography (PQC) standards, with NIST finalizing standards for several algorithms in 2024, overall enterprise readiness remains insufficient. Fewer than five percent of organizations currently have formal plans to transition to quantum-resistant security measures, and many underestimate the long-term risks posed by “harvest now, decrypt later” attacks.
The research highlights a disparity in preparedness across different sectors, with financial, telecommunications, and government organizations leading the way, while most other industries remain in exploratory phases. The study acknowledges limitations in current understanding of the precise timeline for cryptographically relevant quantum computers, but emphasizes that delayed preparation could leave decades of sensitive data vulnerable. The authors recommend immediate action, including establishing cryptographic agility, creating transition roadmaps, prioritizing PQC deployment in critical systems, and investing in cybersecurity skills development. This work contributes an up-to-date review and strategic framework for understanding and enhancing enterprise readiness, offering a nuanced assessment of the current landscape and providing actionable recommendations for stakeholders preparing for the post-quantum era.
👉 More information
🗞 Are Enterprises Ready for Quantum-Safe Cybersecurity?
🧠 ArXiv: https://arxiv.org/abs/2509.01731
