{"id":11850,"date":"2025-10-21T13:00:00","date_gmt":"2025-10-21T13:00:00","guid":{"rendered":"https:\/\/eperi.com\/?p=11850"},"modified":"2025-10-01T11:24:01","modified_gmt":"2025-10-01T11:24:01","slug":"quantum-resilience","status":"publish","type":"post","link":"https:\/\/eperi.com\/en\/newsroom\/blog\/quantum-resilience\/","title":{"rendered":"Post-Quantum Cryptography: Transition to Quantum Resilience Now"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"11850\" class=\"elementor elementor-11850 elementor-11849\" data-elementor-post-type=\"post\">\n\t\t\t\t<div class=\"elementor-element elementor-element-936024a e-flex e-con-boxed e-con e-parent\" data-id=\"936024a\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-bf883d6 elementor-widget elementor-widget-tertiaryStage\" data-id=\"bf883d6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"tertiaryStage.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"tertiaryStage top_padding_56 \">\n\t\t\t<div>\n\t\t\t\t\t\t\t\t<h1 class=\"title_size_1 top_margin_12 teaserHeadline\">Post-Quantum Cryptography: Transition to Quantum Resilience Now<\/h1>\n\t\t\t<\/div>\n\n\t\t\t<div class=\"top_margin_40 teaser-wrapper\">\n\t\t\t\t<div class=\"style-element\">\n\t\t\t\t\t<div class=\"copy_medium\" style=\"width:100%; max-width:450px\">Quantum computers are changing the rules of IT security\u2014traditional methods such as RSA and ECC are becoming vulnerable. Post-quantum cryptography (PQC) offers companies the opportunity to encrypt their data in a future-proof manner today and comply with regulatory requirements such as DORA and NIS2.<\/div>\n\t\t\t\t\t<div class=\"top_margin_24 stageLinks\">\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t<div style=\"position:absolute; top:0px; left:0px; background-color:#00B4B4; width:4px; height:24px; border-radius: 0 0 4px 0\"><\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\n\t\t\t<div class=\"teaserImage\">\n\t\t\t\t<div><img decoding=\"async\" src=\"https:\/\/eperi.com\/wp-content\/uploads\/2024\/04\/Graphic.png\" alt=\"\" class=\"default_image border_radius_24\"><\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-066a4da e-flex e-con-boxed e-con e-parent\" data-id=\"066a4da\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-0841647 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"0841647\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-9805088 e-con-full e-flex e-con e-child\" data-id=\"9805088\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-55df0c7 elementor-widget elementor-widget-post-info\" data-id=\"55df0c7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"post-info.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-inline-items elementor-icon-list-items elementor-post-info\">\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item elementor-repeater-item-7065232 elementor-inline-item\" itemprop=\"author\">\n\t\t\t\t\t\t<a href=\"https:\/\/eperi.com\/en\/author\/ricardo-izzieperi-com\/\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-pen-nib\"><\/i>\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text elementor-post-info__item elementor-post-info__item--type-author\">\n\t\t\t\t\t\t\t\t\t\tRicardo Izzi\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t<\/li>\n\t\t\t\t<li class=\"elementor-icon-list-item elementor-repeater-item-432626c elementor-inline-item\" itemprop=\"datePublished\">\n\t\t\t\t\t\t<a href=\"https:\/\/eperi.com\/en\/2025\/10\/21\/\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-calendar-alt\"><\/i>\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text elementor-post-info__item elementor-post-info__item--type-date\">\n\t\t\t\t\t\t\t\t\t\t<time>October 21, 2025<\/time>\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t<\/li>\n\t\t\t\t<li class=\"elementor-icon-list-item elementor-repeater-item-391e0d6 elementor-inline-item\" itemprop=\"about\">\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-tags\"><\/i>\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text elementor-post-info__item elementor-post-info__item--type-terms\">\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-post-info__terms-list\">\n\t\t\t\t<a href=\"https:\/\/eperi.com\/de\/category\/newsroom\/blog\/\" class=\"elementor-post-info__terms-list-item\">blog<\/a>\t\t\t\t<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d180988 elementor-widget elementor-widget-betterdocs-reading-time\" data-id=\"d180988\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"betterdocs-reading-time.default\">\n\t\t\t\t\t<div class=\"reading-time betterdocs\">\n\t<p>\n\t\t<svg width=\"14\" viewBox=\"0 0 14 15\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n\t\t\t<mask id=\"mask0_6195_23752\" style=\"mask-type:alpha\" maskUnits=\"userSpaceOnUse\" x=\"0\" y=\"0\">\n\t\t\t<rect y=\"0.5\" width=\"14\" height=\"14\" fill=\"#D9D9D9\"\/>\n\t\t\t<\/mask>\n\t\t\t<g mask=\"url(#mask0_6195_23752)\">\n\t\t\t<path d=\"M8.92508 10.241L9.74175 9.42435L7.58341 7.26602V4.58268H6.41675V7.73268L8.92508 10.241ZM7.00008 13.3327C6.19314 13.3327 5.4348 13.1796 4.72508 12.8733C4.01536 12.5671 3.398 12.1514 2.873 11.6264C2.348 11.1014 1.93237 10.4841 1.62612 9.77435C1.31987 9.06463 1.16675 8.30629 1.16675 7.49935C1.16675 6.6924 1.31987 5.93407 1.62612 5.22435C1.93237 4.51463 2.348 3.89727 2.873 3.37227C3.398 2.84727 4.01536 2.43164 4.72508 2.12539C5.4348 1.81914 6.19314 1.66602 7.00008 1.66602C7.80703 1.66602 8.56536 1.81914 9.27508 2.12539C9.9848 2.43164 10.6022 2.84727 11.1272 3.37227C11.6522 3.89727 12.0678 4.51463 12.374 5.22435C12.6803 5.93407 12.8334 6.6924 12.8334 7.49935C12.8334 8.30629 12.6803 9.06463 12.374 9.77435C12.0678 10.4841 11.6522 11.1014 11.1272 11.6264C10.6022 12.1514 9.9848 12.5671 9.27508 12.8733C8.56536 13.1796 7.80703 13.3327 7.00008 13.3327ZM7.00008 12.166C8.29314 12.166 9.39418 11.7115 10.3032 10.8025C11.2122 9.89345 11.6667 8.7924 11.6667 7.49935C11.6667 6.20629 11.2122 5.10525 10.3032 4.19622C9.39418 3.2872 8.29314 2.83268 7.00008 2.83268C5.70703 2.83268 4.60598 3.2872 3.69696 4.19622C2.78793 5.10525 2.33341 6.20629 2.33341 7.49935C2.33341 8.7924 2.78793 9.89345 3.69696 10.8025C4.60598 11.7115 5.70703 12.166 7.00008 12.166Z\" fill=\"#667085\"\/>\n\t\t\t<\/g>\n\t\t<\/svg>\n\t\t6 min\t<\/p>\n<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ffc66b5 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"ffc66b5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-3cc01c0 e-flex e-con-boxed e-con e-parent\" data-id=\"3cc01c0\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-8b4083c e-con-full e-flex e-con e-child\" data-id=\"8b4083c\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-bff4b87 elementor-widget elementor-widget-richText\" data-id=\"bff4b87\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"richText.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\n\n        <style>\n            .customBulletList ol {\n                list-style-type: decimal;\n                padding-left: 30px;\n            }\n\n            .customBulletList ol li {\n                padding-left: 5px;\n                margin-bottom: 16px;\n\n            }\n\n            .customBulletList ul {\n                list-style: none;\n                padding-left: 0;\n            }\n\n            .customBulletList ul li {\n                display: flex;\n                align-items: start;\n                gap: 30px;\n                margin-bottom: 16px;\n            }\n\n            .customBulletList ul li .listIcon {\n                width: 24px;\n                height: 24px;\n\n            }\n\n            .customBulletList ul li svg {\n                width: 24px !important;\n                fill: #00B4B4;\n                margin-top: 0px;\n\n            }\n\n            .customBulletList ol li .listIcon {\n                display: none !important\n            }\n\n            .customBulletList li a {\n                display: inline-flex !important;\n                text-decoration: underline !important;\n                color: #00B4B4;\n            }\n\n            .richText a {\n                color: #00B4B4;\n                text-decoration: underline;\n            }\n\n            .richText p {\n                margin: 0;\n                margin-bottom: 20px;\n            }\n\n            .richText p:last-child {\n                margin-bottom: 0 !important;\n            }\n        <\/style>\n        <div class=\"richText customBulletList copy_medium text-color\"><h2>Post-Quantum Cryptography: How Companies Can Protect Themselves Now<\/h2>\n<p><br \/>Quantum computers challenge traditional encryption methods such as RSA, ECC, or DSA. Many of today\u2019s standard algorithms could be broken by quantum machines within a few years. The solution: Post-Quantum Cryptography (PQC) \u2013 quantum-secure algorithms designed to withstand future quantum attacks.<br \/>We take a closer look at this topic in our Cybersecurity Academy as part of Cybersecurity Awareness Month.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-675e23a elementor-widget elementor-widget-richText\" data-id=\"675e23a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"richText.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\n\n        <style>\n            .customBulletList ol {\n                list-style-type: decimal;\n                padding-left: 30px;\n            }\n\n            .customBulletList ol li {\n                padding-left: 5px;\n                margin-bottom: 16px;\n\n            }\n\n            .customBulletList ul {\n                list-style: none;\n                padding-left: 0;\n            }\n\n            .customBulletList ul li {\n                display: flex;\n                align-items: start;\n                gap: 30px;\n                margin-bottom: 16px;\n            }\n\n            .customBulletList ul li .listIcon {\n                width: 24px;\n                height: 24px;\n\n            }\n\n            .customBulletList ul li svg {\n                width: 24px !important;\n                fill: #00B4B4;\n                margin-top: 0px;\n\n            }\n\n            .customBulletList ol li .listIcon {\n                display: none !important\n            }\n\n            .customBulletList li a {\n                display: inline-flex !important;\n                text-decoration: underline !important;\n                color: #00B4B4;\n            }\n\n            .richText a {\n                color: #00B4B4;\n                text-decoration: underline;\n            }\n\n            .richText p {\n                margin: 0;\n                margin-bottom: 20px;\n            }\n\n            .richText p:last-child {\n                margin-bottom: 0 !important;\n            }\n        <\/style>\n        <div class=\"richText customBulletList copy_medium text-color\"><h2>What is Post-Quantum Cryptography (PQC)?<\/h2>\n<p><br \/>PQC describes a new generation of encryption algorithms specifically developed to withstand mathematical attacks by quantum computers. The goal is to replace proven algorithms such as RSA, ECC, or Diffie-Hellman with quantum-resistant alternatives like Kyber or Dilithium.<br \/>Relevant actors and standards:<\/p>\n<ul>\n<li><div class=\"listIcon\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" id=\"uuid-5c1f5060-c79f-455b-951c-fdfba722c0a4\" data-name=\"Ebene 1\" viewBox=\"0 0 18 18\"><defs><style>      .uuid-07fe4fd6-62f4-4301-bf52-28d26aeefbf1 {        stroke-width: 0px;      }    <\/style><\/defs><path class=\"uuid-07fe4fd6-62f4-4301-bf52-28d26aeefbf1\" d=\"m17.15,8.14h-7.29s0-7.29,0-7.29c0-.22-.09-.44-.26-.6-.16-.16-.38-.25-.6-.25h0c-.23,0-.45.09-.61.25-.16.16-.25.38-.25.61v7.29H.86c-.23,0-.44.09-.6.25-.16.16-.25.38-.25.61,0,.23.09.44.25.6.16.16.38.25.61.25h7.29s0,7.29,0,7.29c0,.47.38.85.86.85.23,0,.44-.09.61-.25s.25-.38.25-.6v-7.29s7.29,0,7.29,0c.23,0,.44-.09.61-.25s.25-.38.25-.61c0-.47-.38-.85-.85-.85Z\"><\/path><\/svg><\/div>NIST: Leading the standardization of PQC algorithms (e.g., Kyber, Dilithium, SPHINCS+)<\/li>\n<li><div class=\"listIcon\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" id=\"uuid-5c1f5060-c79f-455b-951c-fdfba722c0a4\" data-name=\"Ebene 1\" viewBox=\"0 0 18 18\"><defs><style>      .uuid-07fe4fd6-62f4-4301-bf52-28d26aeefbf1 {        stroke-width: 0px;      }    <\/style><\/defs><path class=\"uuid-07fe4fd6-62f4-4301-bf52-28d26aeefbf1\" d=\"m17.15,8.14h-7.29s0-7.29,0-7.29c0-.22-.09-.44-.26-.6-.16-.16-.38-.25-.6-.25h0c-.23,0-.45.09-.61.25-.16.16-.25.38-.25.61v7.29H.86c-.23,0-.44.09-.6.25-.16.16-.25.38-.25.61,0,.23.09.44.25.6.16.16.38.25.61.25h7.29s0,7.29,0,7.29c0,.47.38.85.86.85.23,0,.44-.09.61-.25s.25-.38.25-.6v-7.29s7.29,0,7.29,0c.23,0,.44-.09.61-.25s.25-.38.25-.61c0-.47-.38-.85-.85-.85Z\"><\/path><\/svg><\/div>BSI: Provides recommendations for PQC readiness for German enterprises<\/li>\n<li><div class=\"listIcon\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" id=\"uuid-5c1f5060-c79f-455b-951c-fdfba722c0a4\" data-name=\"Ebene 1\" viewBox=\"0 0 18 18\"><defs><style>      .uuid-07fe4fd6-62f4-4301-bf52-28d26aeefbf1 {        stroke-width: 0px;      }    <\/style><\/defs><path class=\"uuid-07fe4fd6-62f4-4301-bf52-28d26aeefbf1\" d=\"m17.15,8.14h-7.29s0-7.29,0-7.29c0-.22-.09-.44-.26-.6-.16-.16-.38-.25-.6-.25h0c-.23,0-.45.09-.61.25-.16.16-.25.38-.25.61v7.29H.86c-.23,0-.44.09-.6.25-.16.16-.25.38-.25.61,0,.23.09.44.25.6.16.16.38.25.61.25h7.29s0,7.29,0,7.29c0,.47.38.85.86.85.23,0,.44-.09.61-.25s.25-.38.25-.6v-7.29s7.29,0,7.29,0c.23,0,.44-.09.61-.25s.25-.38.25-.61c0-.47-.38-.85-.85-.85Z\"><\/path><\/svg><\/div>EU \/ DORA: Require quantum-secure cryptography for regulated companies in finance, energy, and infrastructure sectors<\/li>\n<\/ul><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-149098f elementor-widget elementor-widget-richText\" data-id=\"149098f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"richText.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\n\n        <style>\n            .customBulletList ol {\n                list-style-type: decimal;\n                padding-left: 30px;\n            }\n\n            .customBulletList ol li {\n                padding-left: 5px;\n                margin-bottom: 16px;\n\n            }\n\n            .customBulletList ul {\n                list-style: none;\n                padding-left: 0;\n            }\n\n            .customBulletList ul li {\n                display: flex;\n                align-items: start;\n                gap: 30px;\n                margin-bottom: 16px;\n            }\n\n            .customBulletList ul li .listIcon {\n                width: 24px;\n                height: 24px;\n\n            }\n\n            .customBulletList ul li svg {\n                width: 24px !important;\n                fill: #00B4B4;\n                margin-top: 0px;\n\n            }\n\n            .customBulletList ol li .listIcon {\n                display: none !important\n            }\n\n            .customBulletList li a {\n                display: inline-flex !important;\n                text-decoration: underline !important;\n                color: #00B4B4;\n            }\n\n            .richText a {\n                color: #00B4B4;\n                text-decoration: underline;\n            }\n\n            .richText p {\n                margin: 0;\n                margin-bottom: 20px;\n            }\n\n            .richText p:last-child {\n                margin-bottom: 0 !important;\n            }\n        <\/style>\n        <div class=\"richText customBulletList copy_medium text-color\"><h2>Why Transition to PQC Now \u2013 Not Later<\/h2>\n<p><br \/>The risks are real \u2013 and growing with each quantum computing breakthrough:<\/p>\n<ul>\n<li><div class=\"listIcon\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" id=\"uuid-5c1f5060-c79f-455b-951c-fdfba722c0a4\" data-name=\"Ebene 1\" viewBox=\"0 0 18 18\"><defs><style>      .uuid-07fe4fd6-62f4-4301-bf52-28d26aeefbf1 {        stroke-width: 0px;      }    <\/style><\/defs><path class=\"uuid-07fe4fd6-62f4-4301-bf52-28d26aeefbf1\" d=\"m17.15,8.14h-7.29s0-7.29,0-7.29c0-.22-.09-.44-.26-.6-.16-.16-.38-.25-.6-.25h0c-.23,0-.45.09-.61.25-.16.16-.25.38-.25.61v7.29H.86c-.23,0-.44.09-.6.25-.16.16-.25.38-.25.61,0,.23.09.44.25.6.16.16.38.25.61.25h7.29s0,7.29,0,7.29c0,.47.38.85.86.85.23,0,.44-.09.61-.25s.25-.38.25-.6v-7.29s7.29,0,7.29,0c.23,0,.44-.09.61-.25s.25-.38.25-.61c0-.47-.38-.85-.85-.85Z\"><\/path><\/svg><\/div>Harvest now, decrypt later: Attackers are storing encrypted data today to decrypt it later with quantum computers<\/li>\n<li><div class=\"listIcon\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" id=\"uuid-5c1f5060-c79f-455b-951c-fdfba722c0a4\" data-name=\"Ebene 1\" viewBox=\"0 0 18 18\"><defs><style>      .uuid-07fe4fd6-62f4-4301-bf52-28d26aeefbf1 {        stroke-width: 0px;      }    <\/style><\/defs><path class=\"uuid-07fe4fd6-62f4-4301-bf52-28d26aeefbf1\" d=\"m17.15,8.14h-7.29s0-7.29,0-7.29c0-.22-.09-.44-.26-.6-.16-.16-.38-.25-.6-.25h0c-.23,0-.45.09-.61.25-.16.16-.25.38-.25.61v7.29H.86c-.23,0-.44.09-.6.25-.16.16-.25.38-.25.61,0,.23.09.44.25.6.16.16.38.25.61.25h7.29s0,7.29,0,7.29c0,.47.38.85.86.85.23,0,.44-.09.61-.25s.25-.38.25-.6v-7.29s7.29,0,7.29,0c.23,0,.44-.09.61-.25s.25-.38.25-.61c0-.47-.38-.85-.85-.85Z\"><\/path><\/svg><\/div>Long-term migration needs: PQC transition impacts systems, keys, certificates, applications \u2013 a multi-year undertaking<\/li>\n<li><div class=\"listIcon\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" id=\"uuid-5c1f5060-c79f-455b-951c-fdfba722c0a4\" data-name=\"Ebene 1\" viewBox=\"0 0 18 18\"><defs><style>      .uuid-07fe4fd6-62f4-4301-bf52-28d26aeefbf1 {        stroke-width: 0px;      }    <\/style><\/defs><path class=\"uuid-07fe4fd6-62f4-4301-bf52-28d26aeefbf1\" d=\"m17.15,8.14h-7.29s0-7.29,0-7.29c0-.22-.09-.44-.26-.6-.16-.16-.38-.25-.6-.25h0c-.23,0-.45.09-.61.25-.16.16-.25.38-.25.61v7.29H.86c-.23,0-.44.09-.6.25-.16.16-.25.38-.25.61,0,.23.09.44.25.6.16.16.38.25.61.25h7.29s0,7.29,0,7.29c0,.47.38.85.86.85.23,0,.44-.09.61-.25s.25-.38.25-.6v-7.29s7.29,0,7.29,0c.23,0,.44-.09.61-.25s.25-.38.25-.61c0-.47-.38-.85-.85-.85Z\"><\/path><\/svg><\/div>Regulatory pressure: Frameworks such as DORA, NIS2, or the BSI IT Baseline Protection Compendium demand robust cryptographic transitions<\/li>\n<\/ul>\n<p><strong>Conclusion:<\/strong> Those who wait until quantum computers reach market maturity will already be too late.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-08d9ad9 elementor-widget elementor-widget-richText\" data-id=\"08d9ad9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"richText.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\n\n        <style>\n            .customBulletList ol {\n                list-style-type: decimal;\n                padding-left: 30px;\n            }\n\n            .customBulletList ol li {\n                padding-left: 5px;\n                margin-bottom: 16px;\n\n            }\n\n            .customBulletList ul {\n                list-style: none;\n                padding-left: 0;\n            }\n\n            .customBulletList ul li {\n                display: flex;\n                align-items: start;\n                gap: 30px;\n                margin-bottom: 16px;\n            }\n\n            .customBulletList ul li .listIcon {\n                width: 24px;\n                height: 24px;\n\n            }\n\n            .customBulletList ul li svg {\n                width: 24px !important;\n                fill: #00B4B4;\n                margin-top: 0px;\n\n            }\n\n            .customBulletList ol li .listIcon {\n                display: none !important\n            }\n\n            .customBulletList li a {\n                display: inline-flex !important;\n                text-decoration: underline !important;\n                color: #00B4B4;\n            }\n\n            .richText a {\n                color: #00B4B4;\n                text-decoration: underline;\n            }\n\n            .richText p {\n                margin: 0;\n                margin-bottom: 20px;\n            }\n\n            .richText p:last-child {\n                margin-bottom: 0 !important;\n            }\n        <\/style>\n        <div class=\"richText customBulletList copy_medium text-color\"><h2>eperi QuantumEdge: Strategically Address PQC Readiness Now<\/h2>\n<p><br \/><strong>QuantumEdge<\/strong> is the specialized extension module of the eperi\u00ae sEcure platform. It helps companies implement quantum-secure encryption in a controlled, compliant, and technically seamless manner.<\/p>\n<table>\n<thead>\n<tr>\n<th>Function<\/th>\n<th>Description<\/th>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td>Cryptography Scan<\/td>\n<td>Analysis of all deployed encryption methods<\/td>\n<\/tr>\n<tr>\n<td>Shadow IT Detection<\/td>\n<td>Identification of insecure systems and outdated algorithms<\/td>\n<\/tr>\n<tr>\n<td>Hybrid TLS Encryption<\/td>\n<td>Parallel use of classical and PQC-based algorithms<\/td>\n<\/tr>\n<tr>\n<td>PQC Dashboard<\/td>\n<td>Overview of systems, endpoints, and migration status<\/td>\n<\/tr>\n<tr>\n<td>Policy Engine<\/td>\n<td>Rule-based management of PQC rollout<\/td>\n<\/tr>\n<tr>\n<td>Infrastructure Integration<\/td>\n<td>Compatible with KMS, certificate, and identity systems<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h3><br \/>Migration Without Disruption<\/h3>\n<p><br \/>QuantumEdge enables a hybrid migration path \u2013 PQC algorithms are introduced in parallel with classical methods. Critical systems can be prioritized, while non-critical components are transitioned step by step. This ensures availability and functionality of the IT landscape at all times.<\/p>\n<p><strong>Benefits of QuantumEdge at a Glance<\/strong><\/p>\n<ul>\n<li><div class=\"listIcon\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" id=\"uuid-5c1f5060-c79f-455b-951c-fdfba722c0a4\" data-name=\"Ebene 1\" viewBox=\"0 0 18 18\"><defs><style>      .uuid-07fe4fd6-62f4-4301-bf52-28d26aeefbf1 {        stroke-width: 0px;      }    <\/style><\/defs><path class=\"uuid-07fe4fd6-62f4-4301-bf52-28d26aeefbf1\" d=\"m17.15,8.14h-7.29s0-7.29,0-7.29c0-.22-.09-.44-.26-.6-.16-.16-.38-.25-.6-.25h0c-.23,0-.45.09-.61.25-.16.16-.25.38-.25.61v7.29H.86c-.23,0-.44.09-.6.25-.16.16-.25.38-.25.61,0,.23.09.44.25.6.16.16.38.25.61.25h7.29s0,7.29,0,7.29c0,.47.38.85.86.85.23,0,.44-.09.61-.25s.25-.38.25-.6v-7.29s7.29,0,7.29,0c.23,0,.44-.09.61-.25s.25-.38.25-.61c0-.47-.38-.85-.85-.85Z\"><\/path><\/svg><\/div>Future-proof cryptography against quantum attacks<\/li>\n<li><div class=\"listIcon\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" id=\"uuid-5c1f5060-c79f-455b-951c-fdfba722c0a4\" data-name=\"Ebene 1\" viewBox=\"0 0 18 18\"><defs><style>      .uuid-07fe4fd6-62f4-4301-bf52-28d26aeefbf1 {        stroke-width: 0px;      }    <\/style><\/defs><path class=\"uuid-07fe4fd6-62f4-4301-bf52-28d26aeefbf1\" d=\"m17.15,8.14h-7.29s0-7.29,0-7.29c0-.22-.09-.44-.26-.6-.16-.16-.38-.25-.6-.25h0c-.23,0-.45.09-.61.25-.16.16-.25.38-.25.61v7.29H.86c-.23,0-.44.09-.6.25-.16.16-.25.38-.25.61,0,.23.09.44.25.6.16.16.38.25.61.25h7.29s0,7.29,0,7.29c0,.47.38.85.86.85.23,0,.44-.09.61-.25s.25-.38.25-.6v-7.29s7.29,0,7.29,0c.23,0,.44-.09.61-.25s.25-.38.25-.61c0-.47-.38-.85-.85-.85Z\"><\/path><\/svg><\/div>Full transparency on cryptographic risks and vulnerabilities<\/li>\n<li><div class=\"listIcon\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" id=\"uuid-5c1f5060-c79f-455b-951c-fdfba722c0a4\" data-name=\"Ebene 1\" viewBox=\"0 0 18 18\"><defs><style>      .uuid-07fe4fd6-62f4-4301-bf52-28d26aeefbf1 {        stroke-width: 0px;      }    <\/style><\/defs><path class=\"uuid-07fe4fd6-62f4-4301-bf52-28d26aeefbf1\" d=\"m17.15,8.14h-7.29s0-7.29,0-7.29c0-.22-.09-.44-.26-.6-.16-.16-.38-.25-.6-.25h0c-.23,0-.45.09-.61.25-.16.16-.25.38-.25.61v7.29H.86c-.23,0-.44.09-.6.25-.16.16-.25.38-.25.61,0,.23.09.44.25.6.16.16.38.25.61.25h7.29s0,7.29,0,7.29c0,.47.38.85.86.85.23,0,.44-.09.61-.25s.25-.38.25-.6v-7.29s7.29,0,7.29,0c.23,0,.44-.09.61-.25s.25-.38.25-.61c0-.47-.38-.85-.85-.85Z\"><\/path><\/svg><\/div>Regulatory compliance with NIST, BSI, and EU frameworks (DORA, NIS2)<\/li>\n<li><div class=\"listIcon\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" id=\"uuid-5c1f5060-c79f-455b-951c-fdfba722c0a4\" data-name=\"Ebene 1\" viewBox=\"0 0 18 18\"><defs><style>      .uuid-07fe4fd6-62f4-4301-bf52-28d26aeefbf1 {        stroke-width: 0px;      }    <\/style><\/defs><path class=\"uuid-07fe4fd6-62f4-4301-bf52-28d26aeefbf1\" d=\"m17.15,8.14h-7.29s0-7.29,0-7.29c0-.22-.09-.44-.26-.6-.16-.16-.38-.25-.6-.25h0c-.23,0-.45.09-.61.25-.16.16-.25.38-.25.61v7.29H.86c-.23,0-.44.09-.6.25-.16.16-.25.38-.25.61,0,.23.09.44.25.6.16.16.38.25.61.25h7.29s0,7.29,0,7.29c0,.47.38.85.86.85.23,0,.44-.09.61-.25s.25-.38.25-.6v-7.29s7.29,0,7.29,0c.23,0,.44-.09.61-.25s.25-.38.25-.61c0-.47-.38-.85-.85-.85Z\"><\/path><\/svg><\/div>Easy integration into existing infrastructure<\/li>\n<li><div class=\"listIcon\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" id=\"uuid-5c1f5060-c79f-455b-951c-fdfba722c0a4\" data-name=\"Ebene 1\" viewBox=\"0 0 18 18\"><defs><style>      .uuid-07fe4fd6-62f4-4301-bf52-28d26aeefbf1 {        stroke-width: 0px;      }    <\/style><\/defs><path class=\"uuid-07fe4fd6-62f4-4301-bf52-28d26aeefbf1\" d=\"m17.15,8.14h-7.29s0-7.29,0-7.29c0-.22-.09-.44-.26-.6-.16-.16-.38-.25-.6-.25h0c-.23,0-.45.09-.61.25-.16.16-.25.38-.25.61v7.29H.86c-.23,0-.44.09-.6.25-.16.16-.25.38-.25.61,0,.23.09.44.25.6.16.16.38.25.61.25h7.29s0,7.29,0,7.29c0,.47.38.85.86.85.23,0,.44-.09.61-.25s.25-.38.25-.6v-7.29s7.29,0,7.29,0c.23,0,.44-.09.61-.25s.25-.38.25-.61c0-.47-.38-.85-.85-.85Z\"><\/path><\/svg><\/div>Strategically controlled PQC roadmap including audit readiness<\/li>\n<\/ul><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-47bbfd6 elementor-widget elementor-widget-richText\" data-id=\"47bbfd6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"richText.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\n\n        <style>\n            .customBulletList ol {\n                list-style-type: decimal;\n                padding-left: 30px;\n            }\n\n            .customBulletList ol li {\n                padding-left: 5px;\n                margin-bottom: 16px;\n\n            }\n\n            .customBulletList ul {\n                list-style: none;\n                padding-left: 0;\n            }\n\n            .customBulletList ul li {\n                display: flex;\n                align-items: start;\n                gap: 30px;\n                margin-bottom: 16px;\n            }\n\n            .customBulletList ul li .listIcon {\n                width: 24px;\n                height: 24px;\n\n            }\n\n            .customBulletList ul li svg {\n                width: 24px !important;\n                fill: #00B4B4;\n                margin-top: 0px;\n\n            }\n\n            .customBulletList ol li .listIcon {\n                display: none !important\n            }\n\n            .customBulletList li a {\n                display: inline-flex !important;\n                text-decoration: underline !important;\n                color: #00B4B4;\n            }\n\n            .richText a {\n                color: #00B4B4;\n                text-decoration: underline;\n            }\n\n            .richText p {\n                margin: 0;\n                margin-bottom: 20px;\n            }\n\n            .richText p:last-child {\n                margin-bottom: 0 !important;\n            }\n        <\/style>\n        <div class=\"richText customBulletList copy_medium text-color\"><h2>FAQ: Frequently Asked Questions on Post-Quantum Cryptography<\/h2>\n<p><br \/><strong>Is PQC already mandatory?<\/strong><br \/>Not across the board. However, DORA, BSI, and NIS2 already require concrete measures from critical infrastructure and financial organizations.<\/p>\n<p><strong>Why is hybrid encryption sufficient for now?<\/strong><br \/>It enables parallel operation of classical and PQC algorithms \u2013 ideal for risk-based migration strategies without loss of functionality.<\/p>\n<p><strong>How long does a PQC transition take?<\/strong><br \/>Depending on the system landscape, several years. The earlier companies begin, the better they can meet regulatory deadlines.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-1692c60c e-con-full e-flex e-con e-child\" data-id=\"1692c60c\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d63e9e2 elementor-widget elementor-widget-richText\" data-id=\"d63e9e2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"richText.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\n\n        <style>\n            .customBulletList ol {\n                list-style-type: decimal;\n                padding-left: 30px;\n            }\n\n            .customBulletList ol li {\n                padding-left: 5px;\n                margin-bottom: 16px;\n\n            }\n\n            .customBulletList ul {\n                list-style: none;\n                padding-left: 0;\n            }\n\n            .customBulletList ul li {\n                display: flex;\n                align-items: start;\n                gap: 30px;\n                margin-bottom: 16px;\n            }\n\n            .customBulletList ul li .listIcon {\n                width: 24px;\n                height: 24px;\n\n            }\n\n            .customBulletList ul li svg {\n                width: 24px !important;\n                fill: #00B4B4;\n                margin-top: 0px;\n\n            }\n\n            .customBulletList ol li .listIcon {\n                display: none !important\n            }\n\n            .customBulletList li a {\n                display: inline-flex !important;\n                text-decoration: underline !important;\n                color: #00B4B4;\n            }\n\n            .richText a {\n                color: #00B4B4;\n                text-decoration: underline;\n            }\n\n            .richText p {\n                margin: 0;\n                margin-bottom: 20px;\n            }\n\n            .richText p:last-child {\n                margin-bottom: 0 !important;\n            }\n        <\/style>\n        <div class=\"richText customBulletList copy_medium text-color\"><h2>Did you like this article?<\/h2><p><br \/>Then like it now or share it with colleagues, business partners, and friends.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-45688440 e-grid e-con-full e-con e-child\" data-id=\"45688440\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-26a5e7a4 elementor-share-buttons--shape-rounded elementor-share-buttons--view-icon-text elementor-share-buttons--skin-gradient elementor-grid-0 elementor-share-buttons--color-official elementor-widget elementor-widget-share-buttons\" data-id=\"26a5e7a4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"share-buttons.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-grid\" role=\"list\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-grid-item\" role=\"listitem\">\n\t\t\t\t\t\t<div class=\"elementor-share-btn elementor-share-btn_email\" role=\"button\" tabindex=\"0\" aria-label=\"Share on email\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-share-btn__icon\">\n\t\t\t\t\t\t\t\t<i class=\"fas fa-envelope\" aria-hidden=\"true\"><\/i>\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-share-btn__text\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-share-btn__title\">\n\t\t\t\t\t\t\t\t\t\tEmail\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-grid-item\" role=\"listitem\">\n\t\t\t\t\t\t<div class=\"elementor-share-btn elementor-share-btn_facebook\" role=\"button\" tabindex=\"0\" aria-label=\"Share on facebook\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-share-btn__icon\">\n\t\t\t\t\t\t\t\t<i class=\"fab fa-facebook\" aria-hidden=\"true\"><\/i>\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-share-btn__text\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-share-btn__title\">\n\t\t\t\t\t\t\t\t\t\tFacebook\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-grid-item\" role=\"listitem\">\n\t\t\t\t\t\t<div class=\"elementor-share-btn elementor-share-btn_linkedin\" role=\"button\" tabindex=\"0\" aria-label=\"Share on linkedin\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-share-btn__icon\">\n\t\t\t\t\t\t\t\t<i class=\"fab fa-linkedin\" aria-hidden=\"true\"><\/i>\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-share-btn__text\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-share-btn__title\">\n\t\t\t\t\t\t\t\t\t\tLinkedIn\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-grid-item\" role=\"listitem\">\n\t\t\t\t\t\t<div class=\"elementor-share-btn elementor-share-btn_x-twitter\" role=\"button\" tabindex=\"0\" aria-label=\"Share on x-twitter\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-share-btn__icon\">\n\t\t\t\t\t\t\t\t<i class=\"fab fa-x-twitter\" aria-hidden=\"true\"><\/i>\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-share-btn__text\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-share-btn__title\">\n\t\t\t\t\t\t\t\t\t\tX\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-47cf944d elementor-widget elementor-widget-shortcode\" data-id=\"47cf944d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\">\t\t<div class=\"wpulike wpulike-default \" ><div class=\"wp_ulike_general_class wp_ulike_is_restricted\"><button type=\"button\"\n\t\t\t\t\taria-label=\"Like Button\"\n\t\t\t\t\tdata-ulike-id=\"11850\"\n\t\t\t\t\tdata-ulike-nonce=\"1b76faa22d\"\n\t\t\t\t\tdata-ulike-type=\"post\"\n\t\t\t\t\tdata-ulike-template=\"wpulike-default\"\n\t\t\t\t\tdata-ulike-display-likers=\"0\"\n\t\t\t\t\tdata-ulike-likers-style=\"default\"\n\t\t\t\t\tclass=\"wp_ulike_btn wp_ulike_put_image wp_post_btn_11850\"><\/button><span class=\"count-box wp_ulike_counter_up\" data-ulike-counter-value=\"0\"><\/span>\t\t\t<\/div><\/div>\n\t\n<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-59262833 e-flex e-con-boxed e-con e-parent\" data-id=\"59262833\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-2b5cfda6 e-grid e-con-boxed e-con e-child\" data-id=\"2b5cfda6\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-59c84c14 e-con-full e-flex e-con e-child\" data-id=\"59c84c14\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-216912f0 elementor-widget elementor-widget-h2\" data-id=\"216912f0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"h2.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n        <!-- <div style=\"background-color:red; color:white; display:inline; padding:0px 5px\">H2 Headline<\/div> -->\n        <h2 class=\"title_size_2 headline-color\">Knowledge that protects \u2013 your next step toward greater data security<\/h2>\n\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e268cf7 elementor-widget elementor-widget-richText\" data-id=\"e268cf7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"richText.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\n\n        <style>\n            .customBulletList ol {\n                list-style-type: decimal;\n                padding-left: 30px;\n            }\n\n            .customBulletList ol li {\n                padding-left: 5px;\n                margin-bottom: 16px;\n\n            }\n\n            .customBulletList ul {\n                list-style: none;\n                padding-left: 0;\n            }\n\n            .customBulletList ul li {\n                display: flex;\n                align-items: start;\n                gap: 30px;\n                margin-bottom: 16px;\n            }\n\n            .customBulletList ul li .listIcon {\n                width: 24px;\n                height: 24px;\n\n            }\n\n            .customBulletList ul li svg {\n                width: 24px !important;\n                fill: #00B4B4;\n                margin-top: 0px;\n\n            }\n\n            .customBulletList ol li .listIcon {\n                display: none !important\n            }\n\n            .customBulletList li a {\n                display: inline-flex !important;\n                text-decoration: underline !important;\n                color: #00B4B4;\n            }\n\n            .richText a {\n                color: #00B4B4;\n                text-decoration: underline;\n            }\n\n            .richText p {\n                margin: 0;\n                margin-bottom: 20px;\n            }\n\n            .richText p:last-child {\n                margin-bottom: 0 !important;\n            }\n        <\/style>\n        <div class=\"richText customBulletList copy_medium text-color\"><p>On our download page, you will find free white papers and fact sheets on data protection, data encryption, and compliance \u2013 specifically for IT managers and decision-makers.<\/p>\n<p>Get concise knowledge, strategic recommendations, and practical tips to effectively protect your data and securely comply with regulatory requirements such as GDPR, NIS2, and DORA.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1897c014 elementor-widget elementor-widget-primaryButton\" data-id=\"1897c014\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"primaryButton.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n                    <div class=\"button button_light_primary\">\n                                <a href=\"https:\/\/eperi.com\/en\/info-hub\/downloads\/\" class=\"button_link\" id=\"\">\n                    Inform now &amp; download free of charge                <\/a>\n            <\/div>\n        \n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-11b24f34 elementor-widget elementor-widget-image\" data-id=\"11b24f34\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<!-- <div style=\"background-color:red; color:white; display:inline; padding:0px 5px\">Image<\/div> -->\n\t\t<img decoding=\"async\" src=\"https:\/\/eperi.com\/wp-content\/uploads\/2025\/08\/mockup-whitepaper-cyberrisks-tablet-ebook.jpg\" alt=\"\" class=\"default_image border_radius_24\">\n\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Post-Quantum Cryptography (PQC) refers to encryption algorithms resistant to attacks by quantum computers. eperi QuantumEdge supports enterprises in gradually migrating to PQC through real-time analysis of deployed cryptography, hybrid encryption, and centralized management via a Policy Engine. The goal is the secure and predictable implementation of quantum-secure encryption in compliance with NIST, BSI, and DORA.<\/p>\n","protected":false},"author":6,"featured_media":11833,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"content-type":"","footnotes":""},"categories":[13],"tags":[],"class_list":["post-11850","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Post-Quantum Cryptography: Transition to Quantum Resilience Now<\/title>\n<meta name=\"description\" content=\"Quantum-resistant encryption with eperi QuantumEdge \u2013 assess, plan, and securely implement PQC readiness in line with NIST, DORA, and BSI.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/eperi.com\/de\/newsroom\/blog\/quantenresistenz\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Post-Quantum Cryptography: Transition to Quantum Resilience Now\" \/>\n<meta property=\"og:description\" content=\"Quantum-resistant encryption with eperi QuantumEdge \u2013 assess, plan, and securely implement PQC readiness in line with NIST, DORA, and BSI.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/eperi.com\/de\/newsroom\/blog\/quantenresistenz\/\" \/>\n<meta property=\"og:site_name\" content=\"EPERI\" \/>\n<meta property=\"article:published_time\" content=\"2025-10-21T13:00:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/eperi.com\/wp-content\/uploads\/2025\/09\/Cybersecurity-academy-visual-blog-eperi.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"800\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Ricardo Izzi\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Ricardo Izzi\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/eperi.com\\\/de\\\/newsroom\\\/blog\\\/quantenresistenz\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/eperi.com\\\/de\\\/newsroom\\\/blog\\\/quantenresistenz\\\/\"},\"author\":{\"name\":\"Ricardo Izzi\",\"@id\":\"https:\\\/\\\/eperi.com\\\/de\\\/#\\\/schema\\\/person\\\/44a9b3a3f683b96f301707dfdd95fcff\"},\"headline\":\"Post-Quantum Cryptography: Transition to Quantum Resilience Now\",\"datePublished\":\"2025-10-21T13:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/eperi.com\\\/de\\\/newsroom\\\/blog\\\/quantenresistenz\\\/\"},\"wordCount\":634,\"publisher\":{\"@id\":\"https:\\\/\\\/eperi.com\\\/de\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/eperi.com\\\/de\\\/newsroom\\\/blog\\\/quantenresistenz\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/eperi.com\\\/wp-content\\\/uploads\\\/2025\\\/09\\\/Cybersecurity-academy-visual-blog-eperi.jpg\",\"articleSection\":[\"blog\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/eperi.com\\\/de\\\/newsroom\\\/blog\\\/quantenresistenz\\\/\",\"url\":\"https:\\\/\\\/eperi.com\\\/de\\\/newsroom\\\/blog\\\/quantenresistenz\\\/\",\"name\":\"Post-Quantum Cryptography: Transition to Quantum Resilience Now\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/eperi.com\\\/de\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/eperi.com\\\/de\\\/newsroom\\\/blog\\\/quantenresistenz\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/eperi.com\\\/de\\\/newsroom\\\/blog\\\/quantenresistenz\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/eperi.com\\\/wp-content\\\/uploads\\\/2025\\\/09\\\/Cybersecurity-academy-visual-blog-eperi.jpg\",\"datePublished\":\"2025-10-21T13:00:00+00:00\",\"description\":\"Quantum-resistant encryption with eperi QuantumEdge \u2013 assess, plan, and securely implement PQC readiness in line with NIST, DORA, and BSI.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/eperi.com\\\/de\\\/newsroom\\\/blog\\\/quantenresistenz\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/eperi.com\\\/de\\\/newsroom\\\/blog\\\/quantenresistenz\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/eperi.com\\\/de\\\/newsroom\\\/blog\\\/quantenresistenz\\\/#primaryimage\",\"url\":\"https:\\\/\\\/eperi.com\\\/wp-content\\\/uploads\\\/2025\\\/09\\\/Cybersecurity-academy-visual-blog-eperi.jpg\",\"contentUrl\":\"https:\\\/\\\/eperi.com\\\/wp-content\\\/uploads\\\/2025\\\/09\\\/Cybersecurity-academy-visual-blog-eperi.jpg\",\"width\":1200,\"height\":800},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/eperi.com\\\/de\\\/newsroom\\\/blog\\\/quantenresistenz\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\\\/\\\/eperi.com\\\/en\\\/home-2\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Post-Quantum Cryptography: Transition to Quantum Resilience Now\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/eperi.com\\\/de\\\/#website\",\"url\":\"https:\\\/\\\/eperi.com\\\/de\\\/\",\"name\":\"EPERI\",\"description\":\"Empower your Data. Keep control.\",\"publisher\":{\"@id\":\"https:\\\/\\\/eperi.com\\\/de\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/eperi.com\\\/de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/eperi.com\\\/de\\\/#organization\",\"name\":\"EPERI\",\"url\":\"https:\\\/\\\/eperi.com\\\/de\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/eperi.com\\\/de\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/eperi.com\\\/wp-content\\\/uploads\\\/2024\\\/07\\\/cropped-cropped-LogoEperi.png\",\"contentUrl\":\"https:\\\/\\\/eperi.com\\\/wp-content\\\/uploads\\\/2024\\\/07\\\/cropped-cropped-LogoEperi.png\",\"width\":512,\"height\":512,\"caption\":\"EPERI\"},\"image\":{\"@id\":\"https:\\\/\\\/eperi.com\\\/de\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/eperi.com\\\/de\\\/#\\\/schema\\\/person\\\/44a9b3a3f683b96f301707dfdd95fcff\",\"name\":\"Ricardo Izzi\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/6ff0a1928369c96643a7d20b43dbb811724e991a5def7ec8ebd4039552cfa154?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/6ff0a1928369c96643a7d20b43dbb811724e991a5def7ec8ebd4039552cfa154?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/6ff0a1928369c96643a7d20b43dbb811724e991a5def7ec8ebd4039552cfa154?s=96&d=mm&r=g\",\"caption\":\"Ricardo Izzi\"},\"url\":\"https:\\\/\\\/eperi.com\\\/en\\\/author\\\/ricardo-izzieperi-com\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Post-Quantum Cryptography: Transition to Quantum Resilience Now","description":"Quantum-resistant encryption with eperi QuantumEdge \u2013 assess, plan, and securely implement PQC readiness in line with NIST, DORA, and BSI.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/eperi.com\/de\/newsroom\/blog\/quantenresistenz\/","og_locale":"en_US","og_type":"article","og_title":"Post-Quantum Cryptography: Transition to Quantum Resilience Now","og_description":"Quantum-resistant encryption with eperi QuantumEdge \u2013 assess, plan, and securely implement PQC readiness in line with NIST, DORA, and BSI.","og_url":"https:\/\/eperi.com\/de\/newsroom\/blog\/quantenresistenz\/","og_site_name":"EPERI","article_published_time":"2025-10-21T13:00:00+00:00","og_image":[{"width":1200,"height":800,"url":"https:\/\/eperi.com\/wp-content\/uploads\/2025\/09\/Cybersecurity-academy-visual-blog-eperi.jpg","type":"image\/jpeg"}],"author":"Ricardo Izzi","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Ricardo Izzi","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/eperi.com\/de\/newsroom\/blog\/quantenresistenz\/#article","isPartOf":{"@id":"https:\/\/eperi.com\/de\/newsroom\/blog\/quantenresistenz\/"},"author":{"name":"Ricardo Izzi","@id":"https:\/\/eperi.com\/de\/#\/schema\/person\/44a9b3a3f683b96f301707dfdd95fcff"},"headline":"Post-Quantum Cryptography: Transition to Quantum Resilience Now","datePublished":"2025-10-21T13:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/eperi.com\/de\/newsroom\/blog\/quantenresistenz\/"},"wordCount":634,"publisher":{"@id":"https:\/\/eperi.com\/de\/#organization"},"image":{"@id":"https:\/\/eperi.com\/de\/newsroom\/blog\/quantenresistenz\/#primaryimage"},"thumbnailUrl":"https:\/\/eperi.com\/wp-content\/uploads\/2025\/09\/Cybersecurity-academy-visual-blog-eperi.jpg","articleSection":["blog"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/eperi.com\/de\/newsroom\/blog\/quantenresistenz\/","url":"https:\/\/eperi.com\/de\/newsroom\/blog\/quantenresistenz\/","name":"Post-Quantum Cryptography: Transition to Quantum Resilience Now","isPartOf":{"@id":"https:\/\/eperi.com\/de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/eperi.com\/de\/newsroom\/blog\/quantenresistenz\/#primaryimage"},"image":{"@id":"https:\/\/eperi.com\/de\/newsroom\/blog\/quantenresistenz\/#primaryimage"},"thumbnailUrl":"https:\/\/eperi.com\/wp-content\/uploads\/2025\/09\/Cybersecurity-academy-visual-blog-eperi.jpg","datePublished":"2025-10-21T13:00:00+00:00","description":"Quantum-resistant encryption with eperi QuantumEdge \u2013 assess, plan, and securely implement PQC readiness in line with NIST, DORA, and BSI.","breadcrumb":{"@id":"https:\/\/eperi.com\/de\/newsroom\/blog\/quantenresistenz\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/eperi.com\/de\/newsroom\/blog\/quantenresistenz\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/eperi.com\/de\/newsroom\/blog\/quantenresistenz\/#primaryimage","url":"https:\/\/eperi.com\/wp-content\/uploads\/2025\/09\/Cybersecurity-academy-visual-blog-eperi.jpg","contentUrl":"https:\/\/eperi.com\/wp-content\/uploads\/2025\/09\/Cybersecurity-academy-visual-blog-eperi.jpg","width":1200,"height":800},{"@type":"BreadcrumbList","@id":"https:\/\/eperi.com\/de\/newsroom\/blog\/quantenresistenz\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/eperi.com\/en\/home-2\/"},{"@type":"ListItem","position":2,"name":"Post-Quantum Cryptography: Transition to Quantum Resilience Now"}]},{"@type":"WebSite","@id":"https:\/\/eperi.com\/de\/#website","url":"https:\/\/eperi.com\/de\/","name":"EPERI","description":"Empower your Data. Keep control.","publisher":{"@id":"https:\/\/eperi.com\/de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/eperi.com\/de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/eperi.com\/de\/#organization","name":"EPERI","url":"https:\/\/eperi.com\/de\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/eperi.com\/de\/#\/schema\/logo\/image\/","url":"https:\/\/eperi.com\/wp-content\/uploads\/2024\/07\/cropped-cropped-LogoEperi.png","contentUrl":"https:\/\/eperi.com\/wp-content\/uploads\/2024\/07\/cropped-cropped-LogoEperi.png","width":512,"height":512,"caption":"EPERI"},"image":{"@id":"https:\/\/eperi.com\/de\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/eperi.com\/de\/#\/schema\/person\/44a9b3a3f683b96f301707dfdd95fcff","name":"Ricardo Izzi","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/6ff0a1928369c96643a7d20b43dbb811724e991a5def7ec8ebd4039552cfa154?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/6ff0a1928369c96643a7d20b43dbb811724e991a5def7ec8ebd4039552cfa154?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/6ff0a1928369c96643a7d20b43dbb811724e991a5def7ec8ebd4039552cfa154?s=96&d=mm&r=g","caption":"Ricardo Izzi"},"url":"https:\/\/eperi.com\/en\/author\/ricardo-izzieperi-com\/"}]}},"_links":{"self":[{"href":"https:\/\/eperi.com\/en\/wp-json\/wp\/v2\/posts\/11850","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/eperi.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/eperi.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/eperi.com\/en\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/eperi.com\/en\/wp-json\/wp\/v2\/comments?post=11850"}],"version-history":[{"count":5,"href":"https:\/\/eperi.com\/en\/wp-json\/wp\/v2\/posts\/11850\/revisions"}],"predecessor-version":[{"id":12199,"href":"https:\/\/eperi.com\/en\/wp-json\/wp\/v2\/posts\/11850\/revisions\/12199"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/eperi.com\/en\/wp-json\/wp\/v2\/media\/11833"}],"wp:attachment":[{"href":"https:\/\/eperi.com\/en\/wp-json\/wp\/v2\/media?parent=11850"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/eperi.com\/en\/wp-json\/wp\/v2\/categories?post=11850"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/eperi.com\/en\/wp-json\/wp\/v2\/tags?post=11850"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}