Post-Quantum Cryptography

VANDAAG VEILIG, KLAAR VOOR MORGEN

“Security is geen luxe; security is een noodzaak om te overleven.”
Jeroen Scheerder, senior crypto analyst, ON2IT

Quantum computing GAAT VEEL VERANDEREN AAN ONZE SECURITY, MAAR DAT GEBEURT NIET PLOTS.
WIJ BEREIDEN ONS VOOR MET EEN NUCHTERE BLIK EN SLIMME SYSTEMEN

Quantum vernadert security

Data leeft langer dan security

verandering is ingebouwd

Ons perspectief

MEER DAN ALLEEN NIEUWE ALGORITMEN

Our PQC Playbook

Blogs

What are we doing here? Cryptography pre- and post-quantum

What are we doing here? Quantum computing challenges some of today’s cryptographic foundations. We explain the real risks, the realistic timelines, and why calm, early preparation beats last-minute scrambles.

Signed, Sealed, Subverted: What Broken Cryptography Teaches Us About Trust

Broken cryptography isn’t new, it’s a recurring theme. We show how historical cryptographic failures offer urgent lessons for avoiding brittle systems in a quantum future.

Cryptographic agility: Designing for Change, Planning for Failure

Cryptographic agility is the principle of designing systems in a way that allows cryptographic algorithms and protocols to be swapped out with minimal friction. Is opposite is hardcoding: rather than embedding a specific algorithm like RSA or SHA-256 deep within your application, you externalize it, make it configurable, modular, negotiable.