
The Everything Feed - All Packet Pushers Pods HN796: The Why and How of Making Your Infrastructure Quantum-Safe (Sponsored)
16 snips
Sep 12, 2025 Richu Channakeshava, a Principal at Palo Alto Networks and a post-quantum cryptography expert, discusses the urgent need for organizations to update their cryptographic systems in light of advancing quantum computing technologies. She highlights vulnerabilities in current encryption methods, particularly RSA, and outlines strategies for transitioning to quantum-safe alternatives. The conversation covers the complexities of implementing security solutions, the importance of hybrid strategies, and actionable steps for future-proofing network security against potential threats.
AI Snips
Chapters
Transcript
Episode notes
Shor's Algorithm Breaks Today's Asymmetric Crypto
- Shor's algorithm lets a sufficiently strong quantum computer factor RSA and break today's asymmetric crypto.
- That capability would make much of the internet's current PKI and key exchange insecure against future attackers.
Timelines Vary But Regulators Act Now
- There's no consensus on when a cryptographically relevant quantum computer (CRQC) will arrive, estimates range from a few years to decades.
- Governments and standards bodies treat the threat as imminent and are pushing timelines for migration anyway.
Adopt Hybrid Key Exchange For Safer Migration
- Use hybrid key exchange (classical + PQC) during migration to mitigate algorithm or library weaknesses.
- Keep the classical algorithm alongside a post-quantum algorithm until PQC algorithms have sufficient real-world vetting.
