Important News:SafeLogic Announces CryptoComply v3.5 with OpenSSL 3.5 Compatiblity, PQC and Improved Performance! Read the announcement.
The Future is NOW
May 13, 2025 •Evgeny Gervis
At this year’s RSA conference in San Francisco, I was struck by the ubiquity of fully autonomous Waymo taxis. Yes, I had noticed them last year, but this year they seemed omnipresent. So while I had some concerns, my colleagues convinced me we could not leave San Francisco without catching a ride in one of them. So there I was, riding in the front passenger seat of a driverless taxi as it breezed through the city one evening.
It was surreal. Somehow, once inside the Waymo, I felt remarkably calm. The drive was steady, purposeful, and precise. As the ride went on, my brain kept parsing the cognitive dissonance that I was experiencing. For years, despite hearing from people who knew that fully autonomous driving was the future, I remained skeptical—if such a thing actually happened, surely it wouldn’t be for a very long time. Yet, here was irrefutable evidence that autonomous driving is possible now, and I even felt safe being driven by it.
This experience parallels how many people feel today about quantum computers and the risks they pose to classical public key cryptography. Despite accelerating progress in the development of quantum computers, many people believe that “Q-Day” (when quantum computers become powerful enough to break public key cryptography) will either never come or arrive in such a distant future that they don’t need to worry about it now.
But as I listened to Dr. Taher Elgamal and Dr. Michelle Mosca, two of the most prolific thinkers in the world of cryptography, their message was clear: Not only are cryptanalytically relevant quantum computers (CRQCs) coming, they are coming much sooner than many people think, and the time to start migrating to post-quantum cryptography (PQC) is now.
I picked up three key themes relating to PQC migration:
Cryptographic Posture Management
There is a broad consensus that fundamental risk management requires organizations to understand where and how they use cryptography. Even if the world of cryptography did not face a threat from quantum computers, organizations need a better way to manage their use of cryptography, starting with keeping an ongoing inventory of its use.
Just as organizations now use Software Bills of Materials (SBOMs) to track where they use open-source components, they should also use Cryptographic Bills of Materials (CBOMs) to understand what cryptography they use in their environment. This way, when the next Heartbleed vulnerability gets discovered, organizations will be able to quickly identify whether they are vulnerable and what needs to be patched.
Policy-Defined Crypto-Agility
Also, irrespective of the threat from quantum computers, organizations need a way to update their cryptography use efficiently, without requiring extensive changes to their environments, such as changing and recompiling their software. The idea is that cryptographic use details should be abstracted away from application code into configurations that can be changed based on policy in a declarative rather than programmatic fashion.
This way, whether it’s in response to the next Heartbleed or an organization needing to update the implementation of ML-KEM, it can be done seamlessly, with security or compliance teams able to govern the organization’s use of cryptography via policy-based means. Having policy-defined control for cryptographic use could also reduce the likelihood of a ransomware attack, for instance, since adversaries often use the organization’s own cryptographic capabilities against it through unauthorized use of cryptography in these attacks.
Iterative Process for PQC Migration
Finally, it is important to get started on PQC migration. While planning and maintaining inventory are important activities, they do not in themselves make the organization quantum resilient. In the world of IT, we long ago learned that waterfall projects do not work as well as agile ones, so why should PQC migration be any different? What is essential is to set the organization on a path of continuous improvement, where every day it becomes more quantum resilient than it was the day before.
A case in point: Many organizations will discover that they have a lot of quantum-vulnerable TLS connections that may leave their data open to harvest-now, decrypt-later (HNDL) attacks. So why not start securing some of these TLS connections today? Here at SafeLogic, we are big believers in this approach. We have recently released a new product called CryptoComply PQ TLS, which enables organizations to make their TLS connections quantum resilient using policy-driven crypto-agility. We have also recently demonstrated an end-to-end use case from discovery of quantum vulnerable cryptography, to automated crypto-agile remediation with quantum resistant cryptography, to remediation verification.
The need for PQC migration will incentivize organizations to improve their cryptographic posture management and build in crypto-agility—something they should have been doing even if Shor’s algorithm to break asymmetric cryptography on quantum computers had never been invented. Doing so will make them more secure from classical attacks, while also facilitating migration to PQC and inevitable future migrations. The important thing to recognize is that the future is now regarding the need to strengthen cryptographic posture management and migrate to PQC. Don’t wait until CRQCs are staring you in the face like the Waymo that was driving yours truly around San Francisco, because by then it will be way too late for your sensitive data.

Evgeny Gervis
Evgeny is the CEO of SafeLogic.
Popular Posts
Search for posts
Tags
- FIPS 140 (113)
- FIPS validation (85)
- Encryption (69)
- cryptography (67)
- NIST (62)
- CryptoComply (60)
- SafeLogic (57)
- Industry News (52)
- cryptographic module (51)
- CMVP (48)
- Conversations (47)
- RapidCert (46)
- compliance (41)
- Ray Potter (33)
- SafeLogic News (32)
- federal (27)
- Event (26)
- CAVP (24)
- Cybersecurity (23)
- FIPS 140-3 (21)
- post-quantum cryptography (16)
- OpenSSL (15)
- FedRAMP (14)
- PQC (14)
- government (14)
- CryptoCompact (12)
- Cryptology (12)
- DoD (12)
- healthcare (12)
- partners (11)
- RSA (10)
- Cloud (9)
- NSA (9)
- security (9)
- CMMC (8)
- Suite B (8)
- testing (8)
- whitepaper (8)
- Approved Products List (APL) (6)
- HITECH (6)
- ICMC (6)
- NIST 800-53 (6)
- lab (6)
- CEO (5)
- Entropy Source Validation (5)
- NIST 800-171 (5)
- OpenSSL 3.0 (5)
- iOS (5)
- procurement (5)
- C3PAO (4)
- Common Criteria (4)
- HITECH Act (4)
- OpenSSL 3.x (4)
- TLS 1.3 (4)
- deadline (4)
- entropy (4)
- innovation (4)
- procure (4)
- public sector (4)
- Air Force (3)
- DFARS (3)
- HIPAA Safe Harbor (3)
- HITECH Safe Harbor (3)
- OpenSSL 1.1.1 (3)
- POA&M (3)
- encrypt (3)
- magazine (3)
- queue (3)
- transition (3)
- 3PAO (2)
- ACVP (2)
- BAA (2)
- BSAFE (2)
- CIO (2)
- CSP (2)
- Defense Industrial Base (2)
- FISMA (2)
- HIPAA security controls (2)
- Historical Status (2)
- MFA (2)
- OpenSSL 1.0.2 (2)
- SPRS (2)
- StateRAMP (2)
- excellence (2)
- founder (2)
- gold (2)
- leader (2)
- maturity (2)
- overlap (2)
- pilot (2)
- rsa conference (2)
- solution (2)
- sunset (2)
- vendor (2)
- year (2)
- Active Status (1)
- Alliance for Digital Innovation (1)
- Android (1)
- CIO Prime Views (1)
- Cyber Defense Magazine (1)
- DHS (1)
- DIU (1)
- DIUx (1)
- DOJ (1)
- DoDIN APL (1)
- FCA (1)
- FIPS Compliance (1)
- GSA (1)
- HITRUST (1)
- Matt Cornelius (1)
- Matthew Cornelius (1)
- Maturity Model (1)
- NCCoE (1)
- OMB (1)
- SLED (1)
- SP800-131A (1)
- SP800-90A (1)
- TLS 1.1 (1)
- background (1)
- best (1)
- co-founder (1)
- congress (1)
- cybertech (1)
- education (1)
- elliptic curve cryptography (1)
- extended (1)
- faq (1)
- finance (1)
- fintech (1)
- fiscal (1)
- fiscal year (1)
- fraud (1)
- globee (1)
- hill (1)
- interview (1)
- kratos (1)
- libgcrypt (1)
- national cybersecurity strategy (1)
- opportunities (1)
- parallel (1)
- profile (1)
- public (1)
- representatives (1)
- reseller (1)
- senate (1)
- senators (1)
- simplify (1)
- sponsors (1)
- state (1)
- stealth mode (1)
- story (1)