{"id":107258,"date":"2025-07-17T08:00:05","date_gmt":"2025-07-17T12:00:05","guid":{"rendered":"https:\/\/forescoutstage.wpengine.com\/?p=107258"},"modified":"2025-07-23T13:01:33","modified_gmt":"2025-07-23T17:01:33","slug":"the-future-of-encryption-in-a-quantum-cryptography-world","status":"publish","type":"post","link":"https:\/\/www.forescout.com\/blog\/the-future-of-encryption-in-a-quantum-cryptography-world\/","title":{"rendered":"The Future of Encryption in a Quantum Cryptography World"},"content":{"rendered":"<p>There is an imminent need for cryptography and detection practices to level up for what\u2019s about to happen. Quantum computing is getting closer and closer to being used in the enterprise and by bad actors.<\/p>\n<p>Some reports have it as early as next year. A recent <a href=\"https:\/\/www.iotworldtoday.com\/quantum\/quantum-computers-expected-to-be-useful-by-2026-survey\" target=\"_blank\" rel=\"noopener\">Omdia study<\/a> from manufacturers found nearly 40% expect their customers to begin using quantum for operational purposes\u00a0in 2026, according to IoT World.<\/p>\n<p>How fast true adoption will take is debatable, but the advances in quantum computing speeds are a ludicrous force multiplier for complex supercomputing and operations. What was once only in the hands of the military-industrial complex and academia will soon find a home in commercial use \u2013 in business and in critical infrastructure. We\u2019re talking processing speeds of 100 million times faster or more.<\/p>\n<p>There\u2019s more to it than that \u2013 there are \u2018qubits\u2019 that exist in superposition and can be both 0 and 1 simultaneously. Along with entanglement and quantum tunneling, quantum machines process complex calculations at speeds unattainable by classical computers.<\/p>\n<p>&nbsp;<\/p>\n<h2>The Benefits and Dangers of Quantum Cryptography<\/h2>\n<p>Quantum is fantastic news for business applications. Think AI use and adoption. But it has serious implications for the security of your business. Quantum computing \u00a0will allow the brute-force decryption of today\u2019s cryptographic models, primarily PKI (which is used by 99% of communications today).<\/p>\n<p>Cracking hashed passwords is already a cybersecurity issue as newer chips continue to blow away today\u2019s processing speeds. Hive Systems <a href=\"https:\/\/www.hivesystems.com\/blog\/are-your-passwords-in-the-green\">suggests<\/a> with a big budget to spend on the most advanced Nvidia chips, a complex 8-character password with numbers, upper\/lowercase letters, and symbols could be cracked in as little as 3 months. A numbers-only password with the right processing could be cracked instantly. This is without today\u2019s quantum speeds.<\/p>\n<p>Even if sensitive data remains secure now, it could be vulnerable in the future if it retains its value over time \u2014 a concept known as \u2018long-term confidentiality\u2019. For example, diplomatic communications, military intelligence, and proprietary corporate information could all be at risk.<\/p>\n<p>&nbsp;<\/p>\n<h2>What About PKI?<\/h2>\n<p>Today\u2019s encryption standard, PKI, still matters and will continue to matter in the future but it will diminish in its ability to be trusted. \u00a0Certificates, certificate authorities, and TLS will still rely on PKI but other technologies like SKA or post-quantum key exchange platforms will likely become a trend. PKI updates to the key exchange and the signature algorithms will be needed to ensure they are quantum safe which is a tall task for the 10B+ connected devices in the world<\/p>\n<p>Today, PKI has an implied sense of security. The verification process is deemed secure by today\u2019s standards because it used to take thousands of years for a traditional computer to factor such a large number.<\/p>\n<p>But are you sure you can fight off quantum calculation speeds? The time to act is here.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-107261\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2025\/07\/PQC-Blog_Graphs-Time-to-Break-RSA-Ver1.jpg\" alt=\"\" width=\"700\" height=\"678\" srcset=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2025\/07\/PQC-Blog_Graphs-Time-to-Break-RSA-Ver1.jpg 1713w, https:\/\/www.forescout.com\/wp-content\/uploads\/2025\/07\/PQC-Blog_Graphs-Time-to-Break-RSA-Ver1-300x291.jpg 300w, https:\/\/www.forescout.com\/wp-content\/uploads\/2025\/07\/PQC-Blog_Graphs-Time-to-Break-RSA-Ver1-1024x992.jpg 1024w, https:\/\/www.forescout.com\/wp-content\/uploads\/2025\/07\/PQC-Blog_Graphs-Time-to-Break-RSA-Ver1-768x744.jpg 768w, https:\/\/www.forescout.com\/wp-content\/uploads\/2025\/07\/PQC-Blog_Graphs-Time-to-Break-RSA-Ver1-1536x1488.jpg 1536w\" sizes=\"auto, (max-width: 700px) 100vw, 700px\" \/><\/p>\n<p>Based on what we\u2019ve been watching for many years, this security challenge is problematic. Data and secure communications as we know it are absolutely at risk because of the \u2018<strong>harvest now, decrypt later\u2019 <\/strong>movement courtesy of nation-state actors.<\/p>\n<p>There are four key actions in play today:<\/p>\n<ol>\n<li>Demand and competition for AI and its market share are driving quantum computing<\/li>\n<li>Huge volumes of data are being exfiltrated now<\/li>\n<li>In less than a year, <a href=\"https:\/\/www.iotworldtoday.com\/quantum\/quantum-computers-expected-to-be-useful-by-2026-survey\">quantum is expected to be \u2018useful and operational<\/a>\u2019<\/li>\n<li>Despite availability, not nearly enough organizations are using the right defenses<\/li>\n<\/ol>\n<p>The good news? Everyone can prepare to minimize the harm. And most importantly, there are innovative solutions, today, that are here to help. Let\u2019s explore the ideas and innovation behind <strong>Forescout\u2019s Quantum Safe Security Assurance<\/strong>.<\/p>\n<p>&nbsp;<\/p>\n<h2>Encryption History: Why It Matters<\/h2>\n<p>Encryption has been used for a very long time \u2013 and it has been an effective defensive mechanism. It was born out of the need for intelligence agencies to send secret messages. It essentially wraps or converts information into secret code that hides the information&#8217;s true meaning. The science of encrypting and decrypting this data is cryptography.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-107262\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2025\/07\/PQC-Blog_Graphs-Timeline-of-Encryption-Ver2.jpg\" alt=\"\" width=\"1566\" height=\"2288\" srcset=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2025\/07\/PQC-Blog_Graphs-Timeline-of-Encryption-Ver2.jpg 1566w, https:\/\/www.forescout.com\/wp-content\/uploads\/2025\/07\/PQC-Blog_Graphs-Timeline-of-Encryption-Ver2-205x300.jpg 205w, https:\/\/www.forescout.com\/wp-content\/uploads\/2025\/07\/PQC-Blog_Graphs-Timeline-of-Encryption-Ver2-701x1024.jpg 701w, https:\/\/www.forescout.com\/wp-content\/uploads\/2025\/07\/PQC-Blog_Graphs-Timeline-of-Encryption-Ver2-768x1122.jpg 768w, https:\/\/www.forescout.com\/wp-content\/uploads\/2025\/07\/PQC-Blog_Graphs-Timeline-of-Encryption-Ver2-1051x1536.jpg 1051w, https:\/\/www.forescout.com\/wp-content\/uploads\/2025\/07\/PQC-Blog_Graphs-Timeline-of-Encryption-Ver2-1402x2048.jpg 1402w\" sizes=\"auto, (max-width: 1566px) 100vw, 1566px\" \/><\/p>\n<p>In the early 1970s, the internet was tested and adopted by the U.S. Department of Defense and U.S. military \u2013 with work from engineers in academia. This was way before it became the engine of business that it is today. Systems for encryption made by the private sector, such as RSA, began in the late 1970s. Encryption continued to evolve in IT practices with the major adoption of TLS 1.0 using RSA and ECC in 1999 \u2014 and the explosion of consumer and business use of the internet.<\/p>\n<p>&nbsp;<\/p>\n<h2>Key Discoveries in the Evolution of Quantum Cryptography<\/h2>\n<ul>\n<li>In 2016, the National Institute for Standards and Technology (NIST) saw the potential for danger and <a href=\"https:\/\/csrc.nist.gov\/projects\/post-quantum-cryptography\">recommended the use of post-quantum cryptography<\/a> (PQC) \u2013 which can secure your data from quantum calculations.<\/li>\n<li>By 2023, adoption of PQC began.<\/li>\n<li>Harvest Now, Decrypt Later: NSA and GCHQ have warned that adversaries may be <a href=\"https:\/\/securityboulevard.com\/2025\/04\/harvest-now-decrypt-later-attacks-how-they-relate-to-the-quantum-threat\/\">collecting encrypted communications<\/a> now, anticipating that quantum computers will eventually break current encryption standards.<\/li>\n<li>That warning isn\u2019t theoretical. Look at all the data taken in <a href=\"https:\/\/industrialcyber.co\/ransomware\/fbi-issues-ic3-alert-on-salt-typhoon-activity-seeks-public-help-in-investigating-prc-linked-cyber-campaign\/\">SALT\/VOLT Typhoon breaches<\/a> from ISPs and SASEs in 2024.<\/li>\n<\/ul>\n<p><a href=\"\/blog\/post-quantum-cryptography-the-real-risks-of-not-adopting-it\/\">The latest research from Forescout\u2019s Vedere Labs shows<\/a> many early adopters migrate to quantum-safe technologies, but that rate of growth is expected to decrease.\u00a0Key data:<\/p>\n<ul>\n<li>Three-quarters of OpenSSH versions on the internet still run versions released between 2015 and 2022 that do not support quantum-safe encryption.<\/li>\n<li>Less than 20% of TLS servers use TLSv1.3 \u2014 the only version that supports PQC.<\/li>\n<li>\u2018Early adopters\u2019 will update ASAP, but the number of people who can easily update servers\/devices will decrease \u2014 a common legacy device problem in IT and OT.<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<h2>What\u2019s At Risk?<\/h2>\n<p>As we wrote last year in <a href=\"https:\/\/www.forescout.com\/blog\/post-quantum-cryptography-an-urgent-global-cybersecurity-imperative\/\">Post-Quantum Cryptography: An Urgent Global Cybersecurity Imperative<\/a>: \u201cThe transition from classical to quantum-resistant cryptography is not merely a technical upgrade but a fundamental overhaul of our security infrastructure. The time and resources required to implement new cryptographic standards across global networks are substantial, and the window to do so before quantum computers become a practical threat is narrowing.\u201d<\/p>\n<p>For individuals and corporations, the threat extends to privacy violations, intellectual property theft, and financial fraud. Personal data, trade secrets, and financial transactions could be exposed, leading to a loss of trust in digital systems and severe economic repercussions.<\/p>\n<p><strong>\u00a0<\/strong>But more specifically, here\u2019s a short list of the kind of assets you see every day \u2013 and common scenarios you encounter:<strong>\u00a0<\/strong><\/p>\n<ul>\n<li>Devices with older operating systems<\/li>\n<li>Unpatchable IoT devices<\/li>\n<li>Custom-built applications<\/li>\n<li>Most OT systems\n<ul>\n<li>Many are on 20-year upgrade cycles<\/li>\n<li>Most have slow patching cycles every 6 to 12 months<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>At-Risk Scenarios:<\/p>\n<ul>\n<li>Communications from public networks including ISPs<\/li>\n<li>SASE solutions or public shared networks (you need to provide a private encryption key)<\/li>\n<li>An attacker inside a trusted network<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<h2>What\u2019s Quantum Safe Already?<\/h2>\n<p>Not enough. Today, PQC adoption is nascent.<\/p>\n<p>Around 6% of global devices are using PQC \u2013 and less than 20% of global communications use Transport Layer Systems (TLS) 1.3 \u2013 which is the most secure version for handshake communication, based on <a href=\"https:\/\/www.forescout.com\/blog\/post-quantum-cryptography-the-real-risks-of-not-adopting-it\/\">Forescout\u2019s research<\/a>. The main security benefit is that TLS 1.3 doesn\u2019t allow older, vulnerable cryptographic versions to connect.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-107264\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2025\/07\/PQC-Blog_Graphs-What-is-Quantum-Safe-Ver1.jpg\" alt=\"\" width=\"700\" height=\"574\" srcset=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2025\/07\/PQC-Blog_Graphs-What-is-Quantum-Safe-Ver1.jpg 1721w, https:\/\/www.forescout.com\/wp-content\/uploads\/2025\/07\/PQC-Blog_Graphs-What-is-Quantum-Safe-Ver1-300x246.jpg 300w, https:\/\/www.forescout.com\/wp-content\/uploads\/2025\/07\/PQC-Blog_Graphs-What-is-Quantum-Safe-Ver1-1024x840.jpg 1024w, https:\/\/www.forescout.com\/wp-content\/uploads\/2025\/07\/PQC-Blog_Graphs-What-is-Quantum-Safe-Ver1-768x630.jpg 768w, https:\/\/www.forescout.com\/wp-content\/uploads\/2025\/07\/PQC-Blog_Graphs-What-is-Quantum-Safe-Ver1-1536x1259.jpg 1536w\" sizes=\"auto, (max-width: 700px) 100vw, 700px\" \/><\/p>\n<p>But with over 80% of organizations not using it, there is a fair amount of migration work still to be done. Using a PQC-safe cypher is certainly the move.<br \/>\n&nbsp;\n<h2>Forescout\u2019s Four-Pronged Approach to Handling Quantum Threats<\/h2>\n<p>Forescout\u2019s patented technology analyzes the ciphers used in communications internally and externally. Those ciphers are benchmarked against their quantum computing safety. The result is risk scoring of every asset, including their ability to communicate using quantum-safe encryption.<\/p>\n<p>But we don\u2019t just detect if they \u2018support quantum safe\u2019. Instead, we detect if they are communicating \u2018non-quantum safe\u2019 in real time. Forescout gives you actual behavior analysis versus a static assessment. <\/p>\n<p>There are scenarios where devices could be quantum safe but be tricked to fall back and use an unsafe cipher. Forescout will detect these kinds of issues since the true threat are communications flowing from inside the network to outside \u2013 or over a public network \u2013 where they are susceptible to the threat.<\/p>\n<p>Positioned at the network layer, Forescout can detect risky encryption usage even when devices attempt to hide their identity or posture. The Forescout 4D Platform\u2122 provides a four-pronged, quantum-safe strategy \u2014 detect, enforce, mitigate, control:<\/p>\n<ul>\n<li><strong>Detect<\/strong>: Forescout invented and patented a method to identify PQC-safe assets in real time, offering cryptographic posture visibility across hybrid networks.<br \/>\n&nbsp;<br \/>\n<figure class=\"video-player\"><div data-video-url=\"https:\/\/forescout.wistia.com\/medias\/a1hm382hyt\"><\/div>\n<\/figure>\n\n<\/li>\n<li><strong>Enforce<\/strong>: With Forescout eyeSegment, organizations can isolate critical systems and secure communication pathways with network segmentation.<\/li>\n<li><strong>Mitigate<\/strong>: Backed by threat intelligence from Vedere Labs, Forescout helps detect rogue assets or misconfigurations to swiftly target policy enforcement.<\/li>\n<li><strong>Control<\/strong>: Forescout protects any devices that could be at risk by limiting their traffic.<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<h2>What Can You Do About It Today<\/h2>\n<ol>\n<li>Adopt PQC for devices which must communicate over third party infrastructure.<\/li>\n<li>Ensure trusted network infrastructure is protected from attackers or use network tools who that can access SPAN ports.<\/li>\n<li>Avoid the use of ISP\u2019s and SASE tools for critical applications and highly secured systems.<\/li>\n<\/ol>\n<p class=\"u-flex-wrap u-gap\" style=\"margin: auto; display: block; text-align: center;\"><a href=\"\/demo\/\"  title=\"See How\" class=\"c-btn c-btn--lblue has-icon icon-arrow-right icon-position-right has-icon-animation icon-animation-fade-in\"><span class=\"cta-button-text\">See How<\/span><\/a>\n","protected":false},"excerpt":{"rendered":"<p>Security leaders, take note: Quantum cryptography is coming to decrypt today\u2019s data. A patented innovation can tell you if you\u2019re safe or not.<\/p>\n","protected":false},"author":20,"featured_media":107260,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"ep_exclude_from_search":false,"footnotes":"","_links_to":"","_links_to_target":""},"categories":[562],"tags":[],"coauthors":[492],"class_list":["post-107258","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news-and-views"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.8 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Future of Encryption in a Quantum Cryptography World<\/title>\n<meta name=\"description\" content=\"Security leaders, take note: Quantum cryptography is coming to decrypt today\u2019s data. A patented innovation can tell you if you\u2019re safe or not.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.forescout.com\/blog\/the-future-of-encryption-in-a-quantum-cryptography-world\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Future of Encryption in a Quantum Cryptography World\" \/>\n<meta property=\"og:description\" content=\"Security leaders, take note: Quantum cryptography is coming to decrypt today\u2019s data. A patented innovation can tell you if you\u2019re safe or not.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.forescout.com\/blog\/the-future-of-encryption-in-a-quantum-cryptography-world\/\" \/>\n<meta property=\"og:site_name\" content=\"Forescout\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ForescoutTechnologies\" \/>\n<meta property=\"article:published_time\" content=\"2025-07-17T12:00:05+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-07-23T17:01:33+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2025\/07\/PQC-Product-Blog-feature-V1.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"628\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"author\" content=\"Robert McNutt\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Forescout\" \/>\n<meta name=\"twitter:site\" content=\"@Forescout\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.forescout.com\/blog\/the-future-of-encryption-in-a-quantum-cryptography-world\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.forescout.com\/blog\/the-future-of-encryption-in-a-quantum-cryptography-world\/\"},\"author\":{\"name\":\"Robert McNutt\",\"@id\":\"https:\/\/www.forescout.com\/#\/schema\/person\/bdbf749c8662ec781730f3a32deeeb99\"},\"headline\":\"The Future of Encryption in a Quantum Cryptography World\",\"datePublished\":\"2025-07-17T12:00:05+00:00\",\"dateModified\":\"2025-07-23T17:01:33+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.forescout.com\/blog\/the-future-of-encryption-in-a-quantum-cryptography-world\/\"},\"wordCount\":1530,\"publisher\":{\"@id\":\"https:\/\/www.forescout.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.forescout.com\/blog\/the-future-of-encryption-in-a-quantum-cryptography-world\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2025\/07\/PQC-Product-Blog-feature-V1.webp\",\"articleSection\":[\"News &amp; Views\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.forescout.com\/blog\/the-future-of-encryption-in-a-quantum-cryptography-world\/\",\"url\":\"https:\/\/www.forescout.com\/blog\/the-future-of-encryption-in-a-quantum-cryptography-world\/\",\"name\":\"Future of Encryption in a Quantum Cryptography World\",\"isPartOf\":{\"@id\":\"https:\/\/www.forescout.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.forescout.com\/blog\/the-future-of-encryption-in-a-quantum-cryptography-world\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.forescout.com\/blog\/the-future-of-encryption-in-a-quantum-cryptography-world\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2025\/07\/PQC-Product-Blog-feature-V1.webp\",\"datePublished\":\"2025-07-17T12:00:05+00:00\",\"dateModified\":\"2025-07-23T17:01:33+00:00\",\"description\":\"Security leaders, take note: Quantum cryptography is coming to decrypt today\u2019s data. A patented innovation can tell you if you\u2019re safe or not.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.forescout.com\/blog\/the-future-of-encryption-in-a-quantum-cryptography-world\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.forescout.com\/blog\/the-future-of-encryption-in-a-quantum-cryptography-world\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.forescout.com\/blog\/the-future-of-encryption-in-a-quantum-cryptography-world\/#primaryimage\",\"url\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2025\/07\/PQC-Product-Blog-feature-V1.webp\",\"contentUrl\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2025\/07\/PQC-Product-Blog-feature-V1.webp\",\"width\":1200,\"height\":628},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.forescout.com\/blog\/the-future-of-encryption-in-a-quantum-cryptography-world\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.forescout.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The Future of Encryption in a Quantum Cryptography World\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.forescout.com\/#website\",\"url\":\"https:\/\/www.forescout.com\/\",\"name\":\"Forescout\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.forescout.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.forescout.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.forescout.com\/#organization\",\"name\":\"Forescout Technologies, Inc.\",\"url\":\"https:\/\/www.forescout.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.forescout.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2019\/01\/forescout-logo.svg\",\"contentUrl\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2019\/01\/forescout-logo.svg\",\"width\":1,\"height\":1,\"caption\":\"Forescout Technologies, Inc.\"},\"image\":{\"@id\":\"https:\/\/www.forescout.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/ForescoutTechnologies\",\"https:\/\/x.com\/Forescout\",\"https:\/\/www.instagram.com\/forescouttechnologies\/\",\"https:\/\/www.linkedin.com\/company\/forescout-technologies\",\"https:\/\/www.youtube.com\/user\/forescout1\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.forescout.com\/#\/schema\/person\/bdbf749c8662ec781730f3a32deeeb99\",\"name\":\"Robert McNutt\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.forescout.com\/#\/schema\/person\/image\/accfb26a5a07295f2ad0787c339592a0\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/fe8d6c564dca54792881913fc1f0b5a0ea821cdcf5602ba28a5a5209a87e9f8d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/fe8d6c564dca54792881913fc1f0b5a0ea821cdcf5602ba28a5a5209a87e9f8d?s=96&d=mm&r=g\",\"caption\":\"Robert McNutt\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Future of Encryption in a Quantum Cryptography World","description":"Security leaders, take note: Quantum cryptography is coming to decrypt today\u2019s data. A patented innovation can tell you if you\u2019re safe or not.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.forescout.com\/blog\/the-future-of-encryption-in-a-quantum-cryptography-world\/","og_locale":"en_US","og_type":"article","og_title":"Future of Encryption in a Quantum Cryptography World","og_description":"Security leaders, take note: Quantum cryptography is coming to decrypt today\u2019s data. A patented innovation can tell you if you\u2019re safe or not.","og_url":"https:\/\/www.forescout.com\/blog\/the-future-of-encryption-in-a-quantum-cryptography-world\/","og_site_name":"Forescout","article_publisher":"https:\/\/www.facebook.com\/ForescoutTechnologies","article_published_time":"2025-07-17T12:00:05+00:00","article_modified_time":"2025-07-23T17:01:33+00:00","og_image":[{"width":1200,"height":628,"url":"https:\/\/www.forescout.com\/wp-content\/uploads\/2025\/07\/PQC-Product-Blog-feature-V1.webp","type":"image\/webp"}],"author":"Robert McNutt","twitter_card":"summary_large_image","twitter_creator":"@Forescout","twitter_site":"@Forescout","twitter_misc":{"Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.forescout.com\/blog\/the-future-of-encryption-in-a-quantum-cryptography-world\/#article","isPartOf":{"@id":"https:\/\/www.forescout.com\/blog\/the-future-of-encryption-in-a-quantum-cryptography-world\/"},"author":{"name":"Robert McNutt","@id":"https:\/\/www.forescout.com\/#\/schema\/person\/bdbf749c8662ec781730f3a32deeeb99"},"headline":"The Future of Encryption in a Quantum Cryptography World","datePublished":"2025-07-17T12:00:05+00:00","dateModified":"2025-07-23T17:01:33+00:00","mainEntityOfPage":{"@id":"https:\/\/www.forescout.com\/blog\/the-future-of-encryption-in-a-quantum-cryptography-world\/"},"wordCount":1530,"publisher":{"@id":"https:\/\/www.forescout.com\/#organization"},"image":{"@id":"https:\/\/www.forescout.com\/blog\/the-future-of-encryption-in-a-quantum-cryptography-world\/#primaryimage"},"thumbnailUrl":"https:\/\/www.forescout.com\/wp-content\/uploads\/2025\/07\/PQC-Product-Blog-feature-V1.webp","articleSection":["News &amp; Views"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.forescout.com\/blog\/the-future-of-encryption-in-a-quantum-cryptography-world\/","url":"https:\/\/www.forescout.com\/blog\/the-future-of-encryption-in-a-quantum-cryptography-world\/","name":"Future of Encryption in a Quantum Cryptography World","isPartOf":{"@id":"https:\/\/www.forescout.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.forescout.com\/blog\/the-future-of-encryption-in-a-quantum-cryptography-world\/#primaryimage"},"image":{"@id":"https:\/\/www.forescout.com\/blog\/the-future-of-encryption-in-a-quantum-cryptography-world\/#primaryimage"},"thumbnailUrl":"https:\/\/www.forescout.com\/wp-content\/uploads\/2025\/07\/PQC-Product-Blog-feature-V1.webp","datePublished":"2025-07-17T12:00:05+00:00","dateModified":"2025-07-23T17:01:33+00:00","description":"Security leaders, take note: Quantum cryptography is coming to decrypt today\u2019s data. A patented innovation can tell you if you\u2019re safe or not.","breadcrumb":{"@id":"https:\/\/www.forescout.com\/blog\/the-future-of-encryption-in-a-quantum-cryptography-world\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.forescout.com\/blog\/the-future-of-encryption-in-a-quantum-cryptography-world\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.forescout.com\/blog\/the-future-of-encryption-in-a-quantum-cryptography-world\/#primaryimage","url":"https:\/\/www.forescout.com\/wp-content\/uploads\/2025\/07\/PQC-Product-Blog-feature-V1.webp","contentUrl":"https:\/\/www.forescout.com\/wp-content\/uploads\/2025\/07\/PQC-Product-Blog-feature-V1.webp","width":1200,"height":628},{"@type":"BreadcrumbList","@id":"https:\/\/www.forescout.com\/blog\/the-future-of-encryption-in-a-quantum-cryptography-world\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.forescout.com\/"},{"@type":"ListItem","position":2,"name":"The Future of Encryption in a Quantum Cryptography World"}]},{"@type":"WebSite","@id":"https:\/\/www.forescout.com\/#website","url":"https:\/\/www.forescout.com\/","name":"Forescout","description":"","publisher":{"@id":"https:\/\/www.forescout.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.forescout.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.forescout.com\/#organization","name":"Forescout Technologies, Inc.","url":"https:\/\/www.forescout.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.forescout.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.forescout.com\/wp-content\/uploads\/2019\/01\/forescout-logo.svg","contentUrl":"https:\/\/www.forescout.com\/wp-content\/uploads\/2019\/01\/forescout-logo.svg","width":1,"height":1,"caption":"Forescout Technologies, Inc."},"image":{"@id":"https:\/\/www.forescout.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ForescoutTechnologies","https:\/\/x.com\/Forescout","https:\/\/www.instagram.com\/forescouttechnologies\/","https:\/\/www.linkedin.com\/company\/forescout-technologies","https:\/\/www.youtube.com\/user\/forescout1"]},{"@type":"Person","@id":"https:\/\/www.forescout.com\/#\/schema\/person\/bdbf749c8662ec781730f3a32deeeb99","name":"Robert McNutt","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.forescout.com\/#\/schema\/person\/image\/accfb26a5a07295f2ad0787c339592a0","url":"https:\/\/secure.gravatar.com\/avatar\/fe8d6c564dca54792881913fc1f0b5a0ea821cdcf5602ba28a5a5209a87e9f8d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/fe8d6c564dca54792881913fc1f0b5a0ea821cdcf5602ba28a5a5209a87e9f8d?s=96&d=mm&r=g","caption":"Robert McNutt"}}]}},"featured_media_url":"https:\/\/www.forescout.com\/wp-content\/uploads\/2025\/07\/PQC-Product-Blog-feature-V1.webp","is_file":false,"excerpt_manually_set":true,"_links":{"self":[{"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/posts\/107258","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/users\/20"}],"replies":[{"embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/comments?post=107258"}],"version-history":[{"count":1,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/posts\/107258\/revisions"}],"predecessor-version":[{"id":107450,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/posts\/107258\/revisions\/107450"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/media\/107260"}],"wp:attachment":[{"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/media?parent=107258"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/categories?post=107258"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/tags?post=107258"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/coauthors?post=107258"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}