{"id":107225,"date":"2025-07-17T08:00:42","date_gmt":"2025-07-17T12:00:42","guid":{"rendered":"https:\/\/forescoutstage.wpengine.com\/?p=107225"},"modified":"2025-07-17T06:47:07","modified_gmt":"2025-07-17T10:47:07","slug":"post-quantum-cryptography-the-real-risks-of-not-adopting-it","status":"publish","type":"post","link":"https:\/\/www.forescout.com\/blog\/post-quantum-cryptography-the-real-risks-of-not-adopting-it\/","title":{"rendered":"Post-Quantum Cryptography: The Real Risks of Not Adopting It"},"content":{"rendered":"<h2>Identifying Network Assets with Quantum-Safe Cryptography<\/h2>\n<p>Quantum computing has been <a href=\"https:\/\/www.bsi.bund.de\/SharedDocs\/Downloads\/DE\/BSI\/Publikationen\/Studien\/Quantencomputer\/Entwicklungstand_QC_V_2_1.pdf?__blob=publicationFile&amp;v=3\" target=\"_blank\" rel=\"noopener\">advancing rapidly<\/a>. <a href=\"https:\/\/www.cisa.gov\/sites\/default\/files\/publications\/cisa_insight_post_quantum_cryptography_508.pdf\" target=\"_blank\" rel=\"noopener\">Governments and organizations<\/a> are now concerned that a quantum computer could break traditional asymmetric encryption, such as RSA and ECC in the next few years \u2014 but it is more likely <a href=\"https:\/\/globalriskinstitute.org\/publication\/2024-quantum-threat-timeline-report\/\" target=\"_blank\" rel=\"noopener\">within the next decade<\/a>.<\/p>\n<p>Post-quantum cryptography (PQC), which is not susceptible to quantum threats, already exists but organizations need to <a href=\"https:\/\/www.nature.com\/articles\/s41586-022-04623-2\" target=\"_blank\" rel=\"noopener\">migrate their assets<\/a> to use this new technology. That includes IT, OT, IoT, medical devices, and other network-connected assets.<\/p>\n<p>Most often discussed quantum threats relate to \u201c<a href=\"https:\/\/en.wikipedia.org\/wiki\/Harvest_now,_decrypt_later\" target=\"_blank\" rel=\"noopener\">harvest now, decrypt later<\/a>\u201d for confidential information. Decryption of confidential information is also relevant for network assets, such as IoT and OT equipment, as attackers could gain access to credentials or intellectual property, for instance. However, there are other <a href=\"https:\/\/www.cisa.gov\/sites\/default\/files\/2024-10\/Post-Quantum%20Considerations%20for%20Operational%20Technology%20%28508%29.pdf\" target=\"_blank\" rel=\"noopener\">relevant security risks<\/a> for <a href=\"https:\/\/www.gsma.com\/solutions-and-impact\/technologies\/security\/wp-content\/uploads\/2025\/02\/Post-Quantum-Cryptography-Executice-Summary-Feb-2025-1.pdf\" target=\"_blank\" rel=\"noopener\">these assets<\/a>, such as:<\/p>\n<ul>\n<li>Unauthorized remote access by exploiting functionality that relies on public keys for authentication and authorization.<\/li>\n<li>Tampering with device-to-device communication by decrypting traffic.<\/li>\n<li>Persistent and stealthy malware that exploits signatures used for secure boot and firmware integrity checks.<\/li>\n<\/ul>\n<p>Current quantum migration <a href=\"https:\/\/www.gsma.com\/newsroom\/wp-content\/uploads\/Post-Quantum-Government-Initiatives-by-Country-and-Region-02-Mar-2025.pdf\" target=\"_blank\" rel=\"noopener\">roadmaps throughout the world<\/a> mandate transitioning to PQC between 2030 and 2035, especially for critical assets. These <a href=\"https:\/\/www.dhs.gov\/quantum\" target=\"_blank\" rel=\"noopener\">PQC migration roadmaps<\/a> are long, but according to <a href=\"https:\/\/www.dhs.gov\/quantum\" target=\"_blank\" rel=\"noopener\">CISA<\/a>, \u201c<em>conducting an inventory of vulnerable critical infrastructure systems [\u2026] is the first step of this preparation [\u2026]<\/em>.\u201d<\/p>\n<p>Here, we review the status of PQC migration on the internet and discuss how Forescout helps organizations understand their risks and prepare for this transition.<\/p>\n<h2>Background: Who Has Adopted Post-Quantum Cryptography?<\/h2>\n<p>Network assets use cryptographic algorithms for different types of services. The most popular protocols include Secure Shell (SSH), used for remote access, and Transport Layer Security (TLS), which forms the basis of services, such as HTTPS.<\/p>\n<p>These protocols rely on algorithms that are often developed by academics, standardized by NIST, then later integrated into existing internet services by the IETF and IANA.<\/p>\n<p>In 2022, NIST selected Kyber for Key Encapsulation Mechanism (KEM), as well as Dilithium, SPHINCS+, and Falcon for digital signatures as the first PQC algorithms to be standardized. The first three final standards were <a href=\"https:\/\/www.nist.gov\/news-events\/news\/2024\/08\/nist-releases-first-3-finalized-post-quantum-encryption-standards\" target=\"_blank\" rel=\"noopener\">published in August 2024<\/a> as:<\/p>\n<ul>\n<li><a href=\"https:\/\/csrc.nist.gov\/pubs\/fips\/203\/final\" target=\"_blank\" rel=\"noopener\">ML-KEM<\/a>, based on Kyber<\/li>\n<li><a href=\"https:\/\/csrc.nist.gov\/pubs\/fips\/204\/final\" target=\"_blank\" rel=\"noopener\">ML-DSA<\/a>, based on Dilithium<\/li>\n<li><a href=\"https:\/\/csrc.nist.gov\/pubs\/fips\/205\/final\" target=\"_blank\" rel=\"noopener\">SLH-DSA<\/a>, based on SPHINCS+<\/li>\n<\/ul>\n<p>Other PQC algorithms exist, although they have not been standardized by NIST. Most notably, the <a href=\"https:\/\/www.bsi.bund.de\/SharedDocs\/Downloads\/EN\/BSI\/Publications\/TechGuidelines\/TG02102\/BSI-TR-02102-1.html\" target=\"_blank\" rel=\"noopener\">German BSI<\/a> additionally recommends the use of FrodoKEM and Classic McEliece for KEM, as well as LMS\/HSS and XMSS\/XMSS^MT for digital signatures. Similarly, <a href=\"https:\/\/ntruprime.cr.yp.to\/\" target=\"_blank\" rel=\"noopener\">Streamlined NTRU Prime<\/a> (SNTRUP) has been used by SSH applications since 2022.<\/p>\n<p>After NIST finalized the standards, IANA added the standardized parameters for ML-KEM and hybrid schemes using ML-KEM in <a href=\"https:\/\/www.iana.org\/assignments\/tls-parameters\/tls-parameters.xhtml\" target=\"_blank\" rel=\"noopener\">TLSv1.3<\/a>, as well as ML-KEM and SNTRUP in <a href=\"https:\/\/www.iana.org\/assignments\/ssh-parameters\/ssh-parameters.xhtml\" target=\"_blank\" rel=\"noopener\">SSH<\/a>. The last step to enable end users to start the migration was including these new standardized algorithms in applications, which is already happening:<\/p>\n<ul>\n<li><a href=\"https:\/\/www.openssh.com\/txt\/release-8.9\" target=\"_blank\" rel=\"noopener\">OpenSSH 8.9<\/a>, released in February 2022, added support for SNTRUP, which became the default key exchange method in the <a href=\"https:\/\/www.openssh.com\/txt\/release-9.0\" target=\"_blank\" rel=\"noopener\">9.0 release<\/a> (April 2022). ML-KEM support was added on <a href=\"https:\/\/www.openssh.com\/txt\/release-9.9\" target=\"_blank\" rel=\"noopener\">OpenSSH 9.9<\/a> (September 2024) and made the default KEM in the <a href=\"https:\/\/www.openssh.com\/txt\/release-10.0\" target=\"_blank\" rel=\"noopener\">10.0 release<\/a> (April 2025).<\/li>\n<li><a href=\"https:\/\/blog.chromium.org\/2023\/08\/protecting-chrome-traffic-with-hybrid.html\" target=\"_blank\" rel=\"noopener\">Chrome 115<\/a>, released in July 2023, added experimental support for hybrid Kyber as a TLSv1.3 client. This was deprecated in <a href=\"https:\/\/security.googleblog.com\/2024\/09\/a-new-path-for-kyber-on-web.html\" target=\"_blank\" rel=\"noopener\">Chrome 131<\/a> (September 2024) in favor of the standardized ML-KEM.<\/li>\n<li><a href=\"https:\/\/techcommunity.microsoft.com\/blog\/microsoft-security-blog\/microsofts-quantum-resistant-cryptography-is-here\/4238780\" target=\"_blank\" rel=\"noopener\">Microsoft SymCrypt<\/a>, the crypto library used in Windows and other Microsoft products, started adding support for PQC in September 2024.<\/li>\n<li><a href=\"https:\/\/github.com\/openssl\/openssl\/releases\/tag\/openssl-3.5.0\" target=\"_blank\" rel=\"noopener\">OpenSSL 3.5<\/a>, released in April 2025, added full support for the three NIST standards ML-KEM, ML-DSA and SLH-DSA.<\/li>\n<\/ul>\n<p>Beyond libraries and applications, <a href=\"https:\/\/www.darkreading.com\/endpoint-security\/hp-brings-quantum-safe-encryption-printers\" target=\"_blank\" rel=\"noopener\">consumer products, such as PCs and printers<\/a>, have started adding support for quantum-safe algorithms in the last year, especially in secure boot capabilities.<\/p>\n<figure class=\"video-player\"><div data-video-url=\"https:\/\/forescout.wistia.com\/medias\/byan751tmq\"><\/div>\n<\/figure>\n\n<h2>Status: What Is the Prevalence of PQC on the Internet?<\/h2>\n<p>Since quantum migration has already started, we wanted to understand how it is progressing. To understand the current use of PQC, we used two internet scanning tools, <a href=\"https:\/\/search.censys.io\/\" target=\"_blank\" rel=\"noopener\">Censys<\/a> and <a href=\"https:\/\/www.shodan.io\/\" target=\"_blank\" rel=\"noopener\">Shodan<\/a>, to examine two relevant protocols: SSH and TLS.<\/p>\n<h3>SSH<\/h3>\n<p>Using a <a href=\"https:\/\/search.censys.io\/search\/report?resource=hosts&amp;q=services%3Assh&amp;virtual_hosts=EXCLUDE&amp;field=services.ssh.kex_init_message.kex_algorithms&amp;num_buckets=50\" target=\"_blank\" rel=\"noopener\">Censys query<\/a> to list the most used SSH key exchange algorithms results in over 186 million hosts on the Internet. These hosts use OpenSSH and other servers, such as Dropbear, which is very common in embedded devices \u2014 and also added support for PQC in its latest <a href=\"https:\/\/matt.ucc.asn.au\/dropbear\/CHANGES\" target=\"_blank\" rel=\"noopener\">version 2025.87<\/a>.<\/p>\n<p>The most popular algorithms currently are curve25519-sha256, diffie-hellman-group-exchange-sha256, and ecdh-sha2-*. These are all quantum-unsafe and run on around 30 million hosts each (16% of the total).<\/p>\n<p>The table below presents the most popular PQC methods currently in use.<\/p>\n<div class=\"c-responsive-table td-min-width-0 padding-slim th-no-wrap\">\n<table>\n<tbody>\n<tr>\n<th><strong>PQC KEM<\/strong><\/th>\n<th><strong>#Hosts<\/strong><\/th>\n<th><strong>%Hosts<\/strong><\/th>\n<\/tr>\n<tr>\n<td>sntrup761x25519-sha512@openssh.com<\/td>\n<td>9,815,725<\/td>\n<td>5.27%<\/td>\n<\/tr>\n<tr>\n<td>sntrup761x25519-sha512<\/td>\n<td>1,460,306<\/td>\n<td>0.78%<\/td>\n<\/tr>\n<tr>\n<td>mlkem768x25519-sha256<\/td>\n<td>188,157<\/td>\n<td>0.10%<\/td>\n<\/tr>\n<tr>\n<td>sntrup4591761x25519-sha512@tinyssh.org<\/td>\n<td>27,070<\/td>\n<td>0.01%<\/td>\n<\/tr>\n<tr>\n<td>ecdh-nistp256-kyber-512r3-sha256-d00@openquantumsafe.org<\/td>\n<td>19,497<\/td>\n<td>0.01%<\/td>\n<\/tr>\n<tr>\n<td>ecdh-nistp384-kyber-768r3-sha384-d00@openquantumsafe.org<\/td>\n<td>19,497<\/td>\n<td>0.01%<\/td>\n<\/tr>\n<tr>\n<td>ecdh-nistp521-kyber-1024r3-sha512-d00@openquantumsafe.org<\/td>\n<td>19,497<\/td>\n<td>0.01%<\/td>\n<\/tr>\n<tr>\n<td>x25519-kyber-512r3-sha256-d00@amazon.com<\/td>\n<td>18,463<\/td>\n<td>0.01%<\/td>\n<\/tr>\n<tr>\n<td>mlkem1024nistp384-sha384<\/td>\n<td>244<\/td>\n<td>&lt;0.01%<\/td>\n<\/tr>\n<tr>\n<td>mlkem768nistp256-sha256<\/td>\n<td>243<\/td>\n<td>&lt;0.01%<\/td>\n<\/tr>\n<tr>\n<td>curve25519-frodokem1344-sha512@ssh.com<\/td>\n<td>13<\/td>\n<td>&lt;0.01%<\/td>\n<\/tr>\n<tr>\n<td>ecdh-nistp521-kyber1024-sha512@ssh.com<\/td>\n<td>13<\/td>\n<td>&lt;0.01%<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>The first, second, and fourth entries are the same algorithm (hybrid <a href=\"https:\/\/datatracker.ietf.org\/doc\/draft-ietf-sshm-ntruprime-ssh\/\" target=\"_blank\" rel=\"noopener\">SNTRUP+x25519<\/a>). The first and fourth use vendor extension names \u201c@openssh.com\u201d and \u201c@tinyssh.org\u201d that pre-date IANA\u2019s assignment. The second uses the IANA-assigned parameter. Entries with \u201c@openquantumsafe.org\u201d are experimental implementations from the <a href=\"https:\/\/openquantumsafe.org\/\" target=\"_blank\" rel=\"noopener\">OQS project<\/a>.<\/p>\n<p><strong>The table shows that more than 11 million hosts \u2013 around 6% of the total SSH servers \u2013 currently support PQC.<\/strong><\/p>\n<p>That number is growing fast despite it not being a large percentage. The figures below track the evolution of hosts supporting the two most popular PQC algorithms:<\/p>\n<ul>\n<li>sntrup761x25519-sha512 grew by 30% in the six months between April and October 2024 \u2014 and by a further 21% in the six months between October 2024 and March 2025.<\/li>\n<li>mlkem768x25519-sha256 grew by 554% in the six months between October 2024 and March 2025. It is expected to continue growing, but at a lower pace.<\/li>\n<\/ul>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-107248\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2025\/07\/blog-PostQuantum_Graphics_1_HostsS_Ver1_2025.jpg\" alt=\"\" width=\"1411\" height=\"966\" srcset=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2025\/07\/blog-PostQuantum_Graphics_1_HostsS_Ver1_2025.jpg 1411w, https:\/\/www.forescout.com\/wp-content\/uploads\/2025\/07\/blog-PostQuantum_Graphics_1_HostsS_Ver1_2025-300x205.jpg 300w, https:\/\/www.forescout.com\/wp-content\/uploads\/2025\/07\/blog-PostQuantum_Graphics_1_HostsS_Ver1_2025-1024x701.jpg 1024w, https:\/\/www.forescout.com\/wp-content\/uploads\/2025\/07\/blog-PostQuantum_Graphics_1_HostsS_Ver1_2025-768x526.jpg 768w\" sizes=\"auto, (max-width: 1411px) 100vw, 1411px\" \/><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-107247\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2025\/07\/blog-PostQuantum_Graphics_2_HostsM_Ver1_2025.jpg\" alt=\"\" width=\"1411\" height=\"838\" srcset=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2025\/07\/blog-PostQuantum_Graphics_2_HostsM_Ver1_2025.jpg 1411w, https:\/\/www.forescout.com\/wp-content\/uploads\/2025\/07\/blog-PostQuantum_Graphics_2_HostsM_Ver1_2025-300x178.jpg 300w, https:\/\/www.forescout.com\/wp-content\/uploads\/2025\/07\/blog-PostQuantum_Graphics_2_HostsM_Ver1_2025-1024x608.jpg 1024w, https:\/\/www.forescout.com\/wp-content\/uploads\/2025\/07\/blog-PostQuantum_Graphics_2_HostsM_Ver1_2025-768x456.jpg 768w\" sizes=\"auto, (max-width: 1411px) 100vw, 1411px\" \/><\/p>\n<p>Note that the figures start at different points in time because that is when each algorithm was added to OpenSSH. They also end with different numbers than what was shown in the table above because this data comes from Shodan, while that came from Censys.<\/p>\n<p>The decreasing rate of growth as time passes by is normal, since the \u201cearly adopters\u201d will update as soon as possible and then the number of people who can easily update servers\/devices decreases. It\u2019s the usual problem of legacy devices we so often face in both IT and OT security.<\/p>\n<p>This is evidenced in the chart below \u2013 again using <a href=\"https:\/\/search.censys.io\/search\/report?resource=hosts&amp;q=services%3Assh&amp;virtual_hosts=EXCLUDE&amp;field=services.ssh.endpoint_id.software_version&amp;num_buckets=500\" target=\"_blank\" rel=\"noopener\">Censys data<\/a>. Almost three quarters of OpenSSH servers on the Internet nowadays run versions between 7.0 and 8.9, which were released between 2015 and 2022, just before OpenSSH added support for PQC by default. Even older versions are still common. Versions 9.0 until 10, which have SNTRUP and then ML-KEM as default key exchange mechanisms are around 21% of OpenSSH servers.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-107249\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2025\/07\/blog-PostQuantum_Graphics_3_Distribution_Ver1_2025.jpg\" alt=\"\" width=\"967\" height=\"643\" srcset=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2025\/07\/blog-PostQuantum_Graphics_3_Distribution_Ver1_2025.jpg 967w, https:\/\/www.forescout.com\/wp-content\/uploads\/2025\/07\/blog-PostQuantum_Graphics_3_Distribution_Ver1_2025-300x199.jpg 300w, https:\/\/www.forescout.com\/wp-content\/uploads\/2025\/07\/blog-PostQuantum_Graphics_3_Distribution_Ver1_2025-768x511.jpg 768w\" sizes=\"auto, (max-width: 967px) 100vw, 967px\" \/><\/p>\n<p>That same 21% is seen in the next chart, which now uses Shodan data. The percentage of OpenSSH servers supporting sntrup761x25519-sha512 grew quickly until it reached the 20-25% range last year. Now it has been oscillating in that range since most servers that could be easily updated \u2013 or that had a strong reason to be update quickly \u2013 already did.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-107246\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2025\/07\/blog-PostQuantum_Graphics_4_PercentageO_Ver1_2025.jpg\" alt=\"\" width=\"1320\" height=\"838\" srcset=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2025\/07\/blog-PostQuantum_Graphics_4_PercentageO_Ver1_2025.jpg 1320w, https:\/\/www.forescout.com\/wp-content\/uploads\/2025\/07\/blog-PostQuantum_Graphics_4_PercentageO_Ver1_2025-300x190.jpg 300w, https:\/\/www.forescout.com\/wp-content\/uploads\/2025\/07\/blog-PostQuantum_Graphics_4_PercentageO_Ver1_2025-1024x650.jpg 1024w, https:\/\/www.forescout.com\/wp-content\/uploads\/2025\/07\/blog-PostQuantum_Graphics_4_PercentageO_Ver1_2025-768x488.jpg 768w\" sizes=\"auto, (max-width: 1320px) 100vw, 1320px\" \/><\/p>\n<h3>TLS<\/h3>\n<p>For TLS, we could not directly measure the new algorithms being supported by servers and clients, but we used TLS version as a proxy for that information.<\/p>\n<p>The IETF is <a href=\"https:\/\/datatracker.ietf.org\/doc\/draft-ietf-tls-tls12-frozen\/\" target=\"_blank\" rel=\"noopener\">only adding PQC support for TLSv1.3<\/a>. However, the figure below \u2013 using <a href=\"https:\/\/www.shodan.io\/search\/facet?query=has_ssl%3Atrue&amp;facet=ssl.version\" target=\"_blank\" rel=\"noopener\">data from Shodan<\/a> \u2013 shows how TLSv1.3 (released in 2018) is still only the <em>third<\/em> most popular version of the protocol supported by servers nowadays.<\/p>\n<\/div>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-107250\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2025\/07\/blog-PostQuantum_Graphics_5_TLS_Ver1_2025.jpg\" alt=\"\" width=\"967\" height=\"668\" srcset=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2025\/07\/blog-PostQuantum_Graphics_5_TLS_Ver1_2025.jpg 967w, https:\/\/www.forescout.com\/wp-content\/uploads\/2025\/07\/blog-PostQuantum_Graphics_5_TLS_Ver1_2025-300x207.jpg 300w, https:\/\/www.forescout.com\/wp-content\/uploads\/2025\/07\/blog-PostQuantum_Graphics_5_TLS_Ver1_2025-768x531.jpg 768w\" sizes=\"auto, (max-width: 967px) 100vw, 967px\" \/><\/p>\n<p>The figure below shows a phenomenon similar to what we saw for OpenSSH deployments: adoption of TLSv1.3 was very fast until early 2023, but growth has slowed considerably since then.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-107251\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2025\/07\/blog-PostQuantum_Graphics_6_TLSV_Ver1_2025.jpg\" alt=\"\" width=\"1418\" height=\"925\" srcset=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2025\/07\/blog-PostQuantum_Graphics_6_TLSV_Ver1_2025.jpg 1418w, https:\/\/www.forescout.com\/wp-content\/uploads\/2025\/07\/blog-PostQuantum_Graphics_6_TLSV_Ver1_2025-300x196.jpg 300w, https:\/\/www.forescout.com\/wp-content\/uploads\/2025\/07\/blog-PostQuantum_Graphics_6_TLSV_Ver1_2025-1024x668.jpg 1024w, https:\/\/www.forescout.com\/wp-content\/uploads\/2025\/07\/blog-PostQuantum_Graphics_6_TLSV_Ver1_2025-768x501.jpg 768w\" sizes=\"auto, (max-width: 1418px) 100vw, 1418px\" \/><\/p>\n<div style=\"margin: 10px 0 20px 0; border-top: 1px solid #CCCCCC; border-bottom: 1px solid #CCCCCC; padding: 10px 0 10px 0;\">\n<h4>Go deeper: Read \u201cPost Quantum Cryptography: An Urgent Global Cybersecurity Imperative.\u201d<\/h4>\n<p class=\"u-display-flex u-flex-wrap u-gap\"><a href=\"\/blog\/post-quantum-cryptography-an-urgent-global-cybersecurity-imperative\/\"  title=\"Read the blog\" class=\"c-btn c-btn--lblue has-icon icon-arrow-right icon-position-right has-icon-animation icon-animation-fade-in\"><span class=\"cta-button-text\">Read the blog<\/span><\/a>\n<\/div>\n<p>&nbsp;<\/p>\n<h2>Looking Ahead: How Forescout Can Help<\/h2>\n<p>The data above shows two things:<\/p>\n<ul>\n<li>The PQC migration has already started since all the basic pieces are in place for organizations to adopt quantum-safe technologies.<\/li>\n<li>Those who can easily upgrade servers and devices will likely do so fast, but we will see decreasing rates of growth of these technologies as the easy deployments are done first.<\/li>\n<\/ul>\n<p>The main difference of the PQC migration \u2013 compared to TLSv1.3 and other <a href=\"https:\/\/dl.acm.org\/doi\/10.1145\/3488932.3497762\" target=\"_blank\" rel=\"noopener\">previously slow adoption of encryption technology<\/a> \u2013 \u00a0is that this migration will soon be <a href=\"https:\/\/bidenwhitehouse.archives.gov\/briefing-room\/presidential-actions\/2025\/01\/16\/executive-order-on-strengthening-and-promoting-innovation-in-the-nations-cybersecurity\/\" target=\"_blank\" rel=\"noopener\"><em>mandated<\/em> for critical assets and organizations<\/a>.<\/p>\n<p>Therefore, organizations will need to understand what assets already support PQC, what needs to be migrated or replaced, and what risk those devices bring to the network.<\/p>\n<p>Enter the <a href=\"\/products\/\">Forescout 4D Platform\u2122<\/a>.<\/p>\n<p>The Forescout 4D Platform\u2122\u00a0continuously identifies, protects and ensures the compliance of all managed and unmanaged cyber assets \u2013 IT, IoT, IoMT and OT \u2013 without business disruption. It delivers comprehensive capabilities for network security, risk and exposure management, and extended detection and response.<\/p>\n<p>Forescout has already delivered extensive coverage for insecure cryptography and broader security posture issues, enabling organizations to monitor and manage a wide range of encryption-related risks across their environments.<\/p>\n<p>After a period of testing and patent acceptance in 2024, can detect TLS 1.3 connections that use quantum-safe, PQC, algorithms standardized by NIST and IANA\/IETF.<\/p>\n<p>This information is sent to Forescout eyeFocus, the risk exposure management component of the platform, for matching and tracking.<\/p>\n<p>While Forescout rules enable asset filtering and executive reporting to monitor PQC adoption, they do not yet impact individual asset risk scores.<\/p>\n<p>Since quantum-safe profiles are still rare, we will progressively adjust the risk scoring over time as regulatory frameworks and technology adoption evolve, ensuring alignment with emerging requirements.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-107252\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2025\/07\/blog-PostQuantum-A-screenshot-of-a-computer-AI-generated-content-may-be-incorrect.webp\" alt=\"\" width=\"884\" height=\"379\" srcset=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2025\/07\/blog-PostQuantum-A-screenshot-of-a-computer-AI-generated-content-may-be-incorrect.webp 884w, https:\/\/www.forescout.com\/wp-content\/uploads\/2025\/07\/blog-PostQuantum-A-screenshot-of-a-computer-AI-generated-content-may-be-incorrect-300x129.webp 300w, https:\/\/www.forescout.com\/wp-content\/uploads\/2025\/07\/blog-PostQuantum-A-screenshot-of-a-computer-AI-generated-content-may-be-incorrect-768x329.webp 768w\" sizes=\"auto, (max-width: 884px) 100vw, 884px\" \/><\/p>\n<div style=\"margin: 10px 0 20px 0; border-top: 1px solid #CCCCCC; border-bottom: 1px solid #CCCCCC; padding: 10px 0 10px 0;\">\n<h4>Get Forescout\u2019s Research from Vedere Labs in your inbox every month.<\/h4>\n<p class=\"u-display-flex u-flex-wrap u-gap\"><a href=\"\/research-newsletter-subscription-lp\/\"  title=\"sign up today\" class=\"c-btn c-btn--lblue has-icon icon-arrow-right icon-position-right has-icon-animation icon-animation-fade-in\"><span class=\"cta-button-text\">sign up today<\/span><\/a>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Forescout\u2019s Vedere Labs analyzes the real threats to not implementing post-quantum cryptography \u2014 and shows where real progress is being made.<\/p>\n","protected":false},"author":124,"featured_media":107226,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"ep_exclude_from_search":false,"footnotes":"","_links_to":"","_links_to_target":""},"categories":[540],"tags":[],"coauthors":[542],"class_list":["post-107225","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-research-and-cyber-alerts"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.8 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Post-Quantum Cryptography: The Real Risks of Not Adopting It<\/title>\n<meta name=\"description\" content=\"Forescout\u2019s Vedere Labs analyzes the real threats to not implementing post-quantum cryptography \u2014 and shows where real progress is being made.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.forescout.com\/blog\/post-quantum-cryptography-the-real-risks-of-not-adopting-it\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Post-Quantum Cryptography: The Real Risks of Not Adopting It\" \/>\n<meta property=\"og:description\" content=\"Forescout\u2019s Vedere Labs analyzes the real threats to not implementing post-quantum cryptography \u2014 and shows where real progress is being made.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.forescout.com\/blog\/post-quantum-cryptography-the-real-risks-of-not-adopting-it\/\" \/>\n<meta property=\"og:site_name\" content=\"Forescout\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ForescoutTechnologies\" \/>\n<meta property=\"article:published_time\" content=\"2025-07-17T12:00:42+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2025\/07\/PQC-VL-Blog-feature-V1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"629\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Forescout Research - Vedere Labs\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Forescout\" \/>\n<meta name=\"twitter:site\" content=\"@Forescout\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"10 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.forescout.com\/blog\/post-quantum-cryptography-the-real-risks-of-not-adopting-it\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.forescout.com\/blog\/post-quantum-cryptography-the-real-risks-of-not-adopting-it\/\"},\"author\":{\"name\":\"Forescout Research - Vedere Labs\",\"@id\":\"https:\/\/www.forescout.com\/#\/schema\/person\/038ef2eda17d37f87d9978fa703ee984\"},\"headline\":\"Post-Quantum Cryptography: The Real Risks of Not Adopting It\",\"datePublished\":\"2025-07-17T12:00:42+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.forescout.com\/blog\/post-quantum-cryptography-the-real-risks-of-not-adopting-it\/\"},\"wordCount\":1609,\"publisher\":{\"@id\":\"https:\/\/www.forescout.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.forescout.com\/blog\/post-quantum-cryptography-the-real-risks-of-not-adopting-it\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2025\/07\/PQC-VL-Blog-feature-V1.png\",\"articleSection\":[\"Research &amp; Cyber Alerts\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.forescout.com\/blog\/post-quantum-cryptography-the-real-risks-of-not-adopting-it\/\",\"url\":\"https:\/\/www.forescout.com\/blog\/post-quantum-cryptography-the-real-risks-of-not-adopting-it\/\",\"name\":\"Post-Quantum Cryptography: The Real Risks of Not Adopting It\",\"isPartOf\":{\"@id\":\"https:\/\/www.forescout.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.forescout.com\/blog\/post-quantum-cryptography-the-real-risks-of-not-adopting-it\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.forescout.com\/blog\/post-quantum-cryptography-the-real-risks-of-not-adopting-it\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2025\/07\/PQC-VL-Blog-feature-V1.png\",\"datePublished\":\"2025-07-17T12:00:42+00:00\",\"description\":\"Forescout\u2019s Vedere Labs analyzes the real threats to not implementing post-quantum cryptography \u2014 and shows where real progress is being made.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.forescout.com\/blog\/post-quantum-cryptography-the-real-risks-of-not-adopting-it\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.forescout.com\/blog\/post-quantum-cryptography-the-real-risks-of-not-adopting-it\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.forescout.com\/blog\/post-quantum-cryptography-the-real-risks-of-not-adopting-it\/#primaryimage\",\"url\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2025\/07\/PQC-VL-Blog-feature-V1.png\",\"contentUrl\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2025\/07\/PQC-VL-Blog-feature-V1.png\",\"width\":1200,\"height\":629},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.forescout.com\/blog\/post-quantum-cryptography-the-real-risks-of-not-adopting-it\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.forescout.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Post-Quantum Cryptography: The Real Risks of Not Adopting It\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.forescout.com\/#website\",\"url\":\"https:\/\/www.forescout.com\/\",\"name\":\"Forescout\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.forescout.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.forescout.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.forescout.com\/#organization\",\"name\":\"Forescout Technologies, Inc.\",\"url\":\"https:\/\/www.forescout.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.forescout.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2019\/01\/forescout-logo.svg\",\"contentUrl\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2019\/01\/forescout-logo.svg\",\"width\":1,\"height\":1,\"caption\":\"Forescout Technologies, Inc.\"},\"image\":{\"@id\":\"https:\/\/www.forescout.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/ForescoutTechnologies\",\"https:\/\/x.com\/Forescout\",\"https:\/\/www.instagram.com\/forescouttechnologies\/\",\"https:\/\/www.linkedin.com\/company\/forescout-technologies\",\"https:\/\/www.youtube.com\/user\/forescout1\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.forescout.com\/#\/schema\/person\/038ef2eda17d37f87d9978fa703ee984\",\"name\":\"Forescout Research - Vedere Labs\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.forescout.com\/#\/schema\/person\/image\/b4c8db5600adef8fa1a89cc86e15c781\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/6f43608a91eb86cde1564e21650235d0ed570d1ae0fbd371a265636ed603e70d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/6f43608a91eb86cde1564e21650235d0ed570d1ae0fbd371a265636ed603e70d?s=96&d=mm&r=g\",\"caption\":\"Forescout Research - Vedere Labs\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Post-Quantum Cryptography: The Real Risks of Not Adopting It","description":"Forescout\u2019s Vedere Labs analyzes the real threats to not implementing post-quantum cryptography \u2014 and shows where real progress is being made.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.forescout.com\/blog\/post-quantum-cryptography-the-real-risks-of-not-adopting-it\/","og_locale":"en_US","og_type":"article","og_title":"Post-Quantum Cryptography: The Real Risks of Not Adopting It","og_description":"Forescout\u2019s Vedere Labs analyzes the real threats to not implementing post-quantum cryptography \u2014 and shows where real progress is being made.","og_url":"https:\/\/www.forescout.com\/blog\/post-quantum-cryptography-the-real-risks-of-not-adopting-it\/","og_site_name":"Forescout","article_publisher":"https:\/\/www.facebook.com\/ForescoutTechnologies","article_published_time":"2025-07-17T12:00:42+00:00","og_image":[{"width":1200,"height":629,"url":"https:\/\/www.forescout.com\/wp-content\/uploads\/2025\/07\/PQC-VL-Blog-feature-V1.png","type":"image\/png"}],"author":"Forescout Research - Vedere Labs","twitter_card":"summary_large_image","twitter_creator":"@Forescout","twitter_site":"@Forescout","twitter_misc":{"Est. reading time":"10 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.forescout.com\/blog\/post-quantum-cryptography-the-real-risks-of-not-adopting-it\/#article","isPartOf":{"@id":"https:\/\/www.forescout.com\/blog\/post-quantum-cryptography-the-real-risks-of-not-adopting-it\/"},"author":{"name":"Forescout Research - Vedere Labs","@id":"https:\/\/www.forescout.com\/#\/schema\/person\/038ef2eda17d37f87d9978fa703ee984"},"headline":"Post-Quantum Cryptography: The Real Risks of Not Adopting It","datePublished":"2025-07-17T12:00:42+00:00","mainEntityOfPage":{"@id":"https:\/\/www.forescout.com\/blog\/post-quantum-cryptography-the-real-risks-of-not-adopting-it\/"},"wordCount":1609,"publisher":{"@id":"https:\/\/www.forescout.com\/#organization"},"image":{"@id":"https:\/\/www.forescout.com\/blog\/post-quantum-cryptography-the-real-risks-of-not-adopting-it\/#primaryimage"},"thumbnailUrl":"https:\/\/www.forescout.com\/wp-content\/uploads\/2025\/07\/PQC-VL-Blog-feature-V1.png","articleSection":["Research &amp; Cyber Alerts"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.forescout.com\/blog\/post-quantum-cryptography-the-real-risks-of-not-adopting-it\/","url":"https:\/\/www.forescout.com\/blog\/post-quantum-cryptography-the-real-risks-of-not-adopting-it\/","name":"Post-Quantum Cryptography: The Real Risks of Not Adopting It","isPartOf":{"@id":"https:\/\/www.forescout.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.forescout.com\/blog\/post-quantum-cryptography-the-real-risks-of-not-adopting-it\/#primaryimage"},"image":{"@id":"https:\/\/www.forescout.com\/blog\/post-quantum-cryptography-the-real-risks-of-not-adopting-it\/#primaryimage"},"thumbnailUrl":"https:\/\/www.forescout.com\/wp-content\/uploads\/2025\/07\/PQC-VL-Blog-feature-V1.png","datePublished":"2025-07-17T12:00:42+00:00","description":"Forescout\u2019s Vedere Labs analyzes the real threats to not implementing post-quantum cryptography \u2014 and shows where real progress is being made.","breadcrumb":{"@id":"https:\/\/www.forescout.com\/blog\/post-quantum-cryptography-the-real-risks-of-not-adopting-it\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.forescout.com\/blog\/post-quantum-cryptography-the-real-risks-of-not-adopting-it\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.forescout.com\/blog\/post-quantum-cryptography-the-real-risks-of-not-adopting-it\/#primaryimage","url":"https:\/\/www.forescout.com\/wp-content\/uploads\/2025\/07\/PQC-VL-Blog-feature-V1.png","contentUrl":"https:\/\/www.forescout.com\/wp-content\/uploads\/2025\/07\/PQC-VL-Blog-feature-V1.png","width":1200,"height":629},{"@type":"BreadcrumbList","@id":"https:\/\/www.forescout.com\/blog\/post-quantum-cryptography-the-real-risks-of-not-adopting-it\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.forescout.com\/"},{"@type":"ListItem","position":2,"name":"Post-Quantum Cryptography: The Real Risks of Not Adopting It"}]},{"@type":"WebSite","@id":"https:\/\/www.forescout.com\/#website","url":"https:\/\/www.forescout.com\/","name":"Forescout","description":"","publisher":{"@id":"https:\/\/www.forescout.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.forescout.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.forescout.com\/#organization","name":"Forescout Technologies, Inc.","url":"https:\/\/www.forescout.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.forescout.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.forescout.com\/wp-content\/uploads\/2019\/01\/forescout-logo.svg","contentUrl":"https:\/\/www.forescout.com\/wp-content\/uploads\/2019\/01\/forescout-logo.svg","width":1,"height":1,"caption":"Forescout Technologies, Inc."},"image":{"@id":"https:\/\/www.forescout.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ForescoutTechnologies","https:\/\/x.com\/Forescout","https:\/\/www.instagram.com\/forescouttechnologies\/","https:\/\/www.linkedin.com\/company\/forescout-technologies","https:\/\/www.youtube.com\/user\/forescout1"]},{"@type":"Person","@id":"https:\/\/www.forescout.com\/#\/schema\/person\/038ef2eda17d37f87d9978fa703ee984","name":"Forescout Research - Vedere Labs","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.forescout.com\/#\/schema\/person\/image\/b4c8db5600adef8fa1a89cc86e15c781","url":"https:\/\/secure.gravatar.com\/avatar\/6f43608a91eb86cde1564e21650235d0ed570d1ae0fbd371a265636ed603e70d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/6f43608a91eb86cde1564e21650235d0ed570d1ae0fbd371a265636ed603e70d?s=96&d=mm&r=g","caption":"Forescout Research - Vedere Labs"}}]}},"featured_media_url":"https:\/\/www.forescout.com\/wp-content\/uploads\/2025\/07\/PQC-VL-Blog-feature-V1.png","is_file":false,"excerpt_manually_set":true,"_links":{"self":[{"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/posts\/107225","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/users\/124"}],"replies":[{"embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/comments?post=107225"}],"version-history":[{"count":0,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/posts\/107225\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/media\/107226"}],"wp:attachment":[{"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/media?parent=107225"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/categories?post=107225"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/tags?post=107225"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/coauthors?post=107225"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}