Why Post-Quantum Cryptography from Day One
The cryptographic algorithms that protect most of the internet today, RSA and elliptic-curve cryptography, will be broken by sufficiently powerful quantum computers. This is not speculation. It is a mathematical certainty. The only question is when. The NSA’s CNSA 2.0 guidelines now require agencies to begin transitioning to post-quantum algorithms, with full adoption mandated by 2035. But the real threat is not in the future. It is happening right now.
Harvest-now, decrypt-later attacks are a well-documented strategy where adversaries collect encrypted data today with the intention of decrypting it once quantum computers become available. Every piece of sensitive data transmitted using classical encryption is potentially vulnerable to future decryption. For organizations handling medical records, financial data, legal communications, or national security information, the shelf life of that data far exceeds the timeline for quantum computing to mature.
This is why AOSentry implements post-quantum cryptography from day one. We use ML-KEM (formerly CRYSTALS-Kyber) for key encapsulation and ML-DSA (formerly CRYSTALS-Dilithium) for digital signatures. These are the algorithms selected by NIST through their multi-year post-quantum standardization process. They are not experimental. They are production-ready standards designed to resist both classical and quantum attacks.
Waiting to adopt post-quantum cryptography is itself a risk. Every day that data is transmitted using only classical encryption is a day that data could be harvested for future decryption. Organizations that delay migration are accumulating cryptographic debt that will only become more expensive and more dangerous to address over time. AOSentry exists so that organizations do not have to wait. Quantum-resistant security is available today, and it works alongside classical algorithms in a hybrid approach that provides defense in depth without sacrificing compatibility or performance.