Skip to contentRed Hat

Navigation

AI
  • Our approach

    • News and insights
    • Technical blog
    • Research
    • Live AI events
    • Explore AI at Red Hat
  • Our portfolio

    • Red Hat AI
    • Red Hat Enterprise Linux AI
    • Red Hat OpenShift AI
    • Red Hat AI Inference Server
  • Engage & learn

    • AI learning hub
    • AI partners
    • Services for AI
Hybrid cloud
  • Platform solutions

    • Artificial intelligence

      Build, deploy, and monitor AI models and apps.

    • Linux standardization

      Get consistency across operating environments.

    • Application development

      Simplify the way you build, deploy, and manage apps.

    • Automation

      Scale automation and unite tech, teams, and environments.

    • Explore solutions
  • Use cases

    • Virtualization

      Modernize operations for virtualized and containerized workloads.

    • Digital sovereignty

      Control and protect critical infrastructure.

    • Security

      Code, build, deploy, and monitor security-focused software.

    • Edge computing

      Deploy workloads closer to the source with edge technology.

  • Solutions by industry

    • Automotive
    • Financial services
    • Healthcare
    • Industrial sector
    • Media and entertainment
    • Public sector (Global)
    • Public sector (U.S.)
    • Telecommunications

Discover cloud technologies

Learn how to use our cloud products and solutions at your own pace in the Red Hat® Hybrid Cloud Console.

Products
  • Platforms

    • Red Hat AI

      Develop and deploy AI solutions across the hybrid cloud.

      New version
    • Red Hat Enterprise Linux

      Support hybrid cloud innovation on a flexible operating system.

    • Red Hat OpenShift

      Build, modernize, and deploy apps at scale.

    • Red Hat Ansible Automation Platform

      Implement enterprise-wide automation.

  • Featured

    • Red Hat OpenShift Virtualization Engine
    • Red Hat OpenShift Service on AWS
    • Microsoft Azure Red Hat OpenShift
    • See all products
  • Try & buy

    • Start a trial
    • Buy online
    • Integrate with major cloud providers
  • Services & support

    • Consulting
    • Product support
    • Services for AI
    • Technical Account Management
    • Explore services
Training
  • Training & certification

    • Courses and exams
    • Certifications
    • Red Hat Academy
    • Learning community
    • Learning subscription
    • Explore training
  • Featured

    • Red Hat Certified System Administrator exam
    • Red Hat System Administration I
    • Red Hat Learning Subscription trial (No cost)
    • Red Hat Certified Engineer exam
    • Red Hat Certified OpenShift Administrator exam
  • Services

    • Consulting
    • Partner training
    • Product support
    • Services for AI
    • Technical Account Management
Learn
  • Build your skills

    • Documentation
    • Hands-on labs
    • Hybrid cloud learning hub
    • Interactive learning experiences
    • Training and certification
  • More ways to learn

    • Blog
    • Events and webinars
    • Podcasts and video series
    • Red Hat TV
    • Resource library

For developers

Discover resources and tools to help you build, deliver, and manage cloud-native applications and services.

Partners
  • For customers

    • Our partners
    • Red Hat Ecosystem Catalog
    • Find a partner
  • For partners

    • Partner Connect
    • Become a partner
    • Training
    • Support
    • Access the partner portal

Build solutions powered by trusted partners

Find solutions from our collaborative community of experts and technologies in the Red Hat® Ecosystem Catalog.

Search

I'd like to:

  • Start a trial
  • Manage subscriptions
  • See Red Hat jobs
  • Explore tech topics
  • Contact sales
  • Contact customer service

Help me find:

  • Documentation
  • Developer resources
  • Skills assessments
  • Architecture center
  • Security updates
  • Support cases

I want to learn more about:

  • AI
  • Application modernization
  • Automation
  • Cloud-native applications
  • Linux
  • Virtualization
ConsoleDocsSupportNew For you

Recommended

We'll recommend resources you may like as you browse. Try these suggestions for now.

  • Product trial center
  • Courses and exams
  • All products
  • Tech topics
  • Resource library
Log in

Get more with a Red Hat account

  • Console access
  • Event registration
  • Training & trials
  • World-class support

A subscription may be required for some services.

Log in or register
Contact us
  • Home
  • Resources
  • 4 key steps to prepare for post-quantum cryptography

4 key steps to prepare for post-quantum cryptography

May 20, 2025•
Resource type: Checklist
Download PDF

Advancements in quantum computing are expected to make cryptography standards unsafe by as early as 2029.1 This means encryption resistant to quantum computing-powered decryption will soon be a necessity for every business. To address this looming threat, as well as “harvest now, decrypt later” attacks that are already a present threat, your organization should consider these 4 key steps to prepare for post-quantum cryptography.

1. Assess your organization’s sensitive data and existing cryptographic protocols

To begin preparing for post-quantum cryptography, you should assess the current vulnerability of the data your organization needs to safeguard.

This is best done by bringing together a multifaceted team (including representatives from business operations, legal and compliance, IT, and any other relevant departments) to identify and trace all access paths to that data. From these findings, your teams can begin to classify what data is considered sensitive now, in the near future, or in the distant future, among other considerations.

Next, it is important to take inventory of the cryptographic protocols your organization currently has in place, and assess which protocols are in most urgent need of updating, which can be modified, and which must remain the same due to hardware or software limitations.

2. Identify which of your assets need to be prioritized

Now that your teams have a clear understanding of your organization’s sensitive data, you can begin to prioritize which assets need to be safeguarded right away.

It is not practical, or even realistic, to address the security of all your various assets all at once. This is why it is crucial to take a pragmatic approach to planning—drawing on the insights gained from the preliminary work your teams have already done—to carefully consider which assets and systems should be a priority to address right away and which can be addressed at a later date.

3. Begin testing new quantum-resistant algorithms in your environment

Most compliance entities are advising organizations to start migrating to new post-quantum cryptographic protocols and algorithms as soon as possible; including the 1st finalized standards, released in August 2024 by the National Institute of Standards and Technology (NIST).2 

The sooner your teams can begin testing algorithms and addressing issues that could prevent your organization from successfully transitioning to them, the more prepared you will be for what will soon be mandatory compliance requirements, and the better you can mitigate risk from “harvest now, decrypt later” attacks.

To help your organization get started with testing new quantum-resistant algorithms, consider adopting or upgrading to Red Hat® Enterprise Linux® 10. This operating system (OS) includes the 1st installment of quantum-resistant algorithms— including OpenSSL, ML-KEM (FIPS 203), and ML-DSA (FIPS 204)—that provide key-exchange, encryption, and signing, with added functionality planned for subsequent releases.

4. Commence your full-scale transition and start moving into production

While it is the final step in this process, implementing new quantum-resistant algorithms is the most extensive and complex part of the process.

Rather than a quick sprint to immediate results, your organization needs to approach this step as a sustained effort, with long-term benefits as the goal.

Updating every cryptographic algorithm throughout your environment is not going to happen immediately, but the insights gained and priorities identified in the preliminary steps will set your organization up for sustainable success.

As you begin to apply changes to your cryptographic protocols and incorporate quantum-resistant algorithms in production, special attention will need to be provided to any interdependencies that were identified during the testing phase in order to mitigate unintended consequences or downtime.

  1. Horvath, Mark. “Begin Transitioning to Post-Quantum Cryptography Now.” Gartner, 30 Sept. 2024.

  2. “NIST Releases First 3 Finalized Post-Quantum Encryption Standards.” National Institute of Standards and Technology, 13 Aug. 2024

Start preparing for post-quantum cryptography today

Explore this page to learn more about how Red Hat Enterprise Linux 10 incorporates quantum-resistant algorithms that can help your organization prepare for the era of post-quantum cryptography.

Tags:Artificial intelligence

Red Hat logoLinkedInYouTubeFacebookX

Platforms

  • Red Hat AI
  • Red Hat Enterprise Linux
  • Red Hat OpenShift
  • Red Hat Ansible Automation Platform
  • See all products

Tools

  • Training and certification
  • My account
  • Customer support
  • Developer resources
  • Find a partner
  • Red Hat Ecosystem Catalog
  • Documentation

Try, buy, & sell

  • Product trial center
  • Red Hat Store
  • Buy online (Japan)
  • Console

Communicate

  • Contact sales
  • Contact customer service
  • Contact training
  • Social

About Red Hat

Red Hat is an open hybrid cloud technology leader, delivering a consistent, comprehensive foundation for transformative IT and artificial intelligence (AI) applications in the enterprise. As a trusted adviser to the Fortune 500, Red Hat offers cloud, developer, Linux, automation, and application platform technologies, as well as award-winning services.

  • Our company
  • How we work
  • Customer success stories
  • Analyst relations
  • Newsroom
  • Open source commitments
  • Our social impact
  • Jobs

Change page language

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility