Quantum Security Cryptography

Post-quantum cryptography and its real-world impact on everyday security

Priyanka Gahilot
Placeholder for PriyankaPriyanka

Priyanka Gahilot , Managed Services Engineer , Nomios Netherlands

5 min. read
Placeholder for Daily impact of PQC on cybersecurityDaily impact of PQC on cybersecurity

Share

Most teams treat post-quantum cryptography (PQC) as a future standards exercise. The practical issue is that your exposure is already shaped by decisions you have made over the past decade: how long you retain traffic, where you terminate TLS, which platforms own your identity layer, and how you validate signatures over time.

PQC is not a single upgrade you schedule once. It will arrive unevenly. In practice, it starts with changes in the cryptographic building blocks used by protocols you already run, then ripples out into certificates, platforms, and operational processes. If you want a refresher on what is changing at the algorithm and protocol level, you can start here.

This blog maps PQC to everyday security controls so you can see where change will show up first, where it will be hidden, and where it will become unavoidable.

1. Secure web traffic and TLS: the handshake changes first

Most of the time, when people say “web encryption”, they mean HTTPS. In practice, that means TLS, and the first place PQC lands is the TLS handshake. Even when the bulk traffic is protected with symmetric encryption, the session keys and authentication depend on public-key mechanisms that quantum systems are expected to break.

What changes

The immediate pattern is hybrid key exchange. You keep a classical key exchange for compatibility and add a post-quantum key establishment alongside it, then combine the results into the session keys. This reduces exposure to harvest now, decrypt later while avoiding a flag day cutover. The IETF has been standardizing how to do hybrid key exchange in TLS 1.3.

At the internet's edge, this is already visible in large-scale deployments. Cloudflare has published its rollouts of hybrid post-quantum key agreement for connections it handles, including what it describes as a majority milestone for human-initiated traffic by late October 2025.

What stays the same

From a user perspective, nothing looks different. Browsers still show the padlock. Applications still open TLS sessions as before. The “impact” is operational: libraries, endpoints, and middleboxes now need to handle new key share formats, larger handshake messages, and new failure modes.

What teams should watch

  • Handshake size and network behaviour: Larger handshakes can change fragmentation patterns and can expose brittle assumptions in firewalls, TLS inspection, and legacy proxies.
  • Library and platform readiness: PQC support tends to arrive via cryptographic libraries and platform updates. The integration point is often the TLS stack, not the application code.
  • Negotiation and policy: Hybrid is not just “turn it on”. You need clear rules about when it is offered, when it is required, and how you measure coverage.

2. Messaging and email: protecting long-lived confidentiality and authenticity

End-to-end encrypted messaging is a natural target for early PQC adoption because the threat model is explicit: intercepted traffic can be stored for later decryption if key establishment is not post-quantum safe.

Messaging

Apple’s PQ3 is a good example of what “behind the scenes” looks like at scale. Apple describes PQ3 as a post-quantum upgrade to iMessage’s end-to-end protocol, built to raise the bar against future quantum-capable adversaries without changing user workflows.

The main point for most organisations is not whether you run iMessage. It is that major platforms are already treating post-quantum key agreement and ongoing re-keying as something that can be deployed incrementally, at scale, via software updates.

Email and file-level encryption

Email encryption and signing tends to move more slowly because of interoperability and ecosystem inertia. Still, standards work is active.

The IETF has an OpenPGP draft that defines post-quantum extensions using hybrid constructions, combining ML-KEM and ML-DSA with classical algorithms for compatibility. This matters for long-term confidentiality and for signatures that may need to validate years later, such as legal archives, audit artefacts, and software provenance.

For S/MIME and CMS-style signing, the Open Quantum Safe project documents practical post-quantum and hybrid signing workflows built around OpenSSL provider approaches.

What teams should watch

  • Signature verification lifetimes: If you need to validate signatures in the long term, the algorithm choices and certificate chains matter as much as encryption.
  • Client diversity: Messaging apps update quickly. Email clients, gateways, and DLP stacks often do not.
  • Policy and UX constraints: Users will not tolerate friction. That pushes teams towards hybrid and silent upgrades.

3. Identity systems and certificates: PQC becomes a trust-layer change

Identity, authentication, and authorisation are full of certificates: TLS server identity, device identity, user certificates, smart cards, code signing, S/MIME, VPN authentication, and more.

PQC affects this space in two ways:

  1. The keys inside certificates change (new public keys, new signature algorithms).
  2. The trust anchors and issuing processes change (how CAs sign, how clients validate, how revocation and renewal behave).

There is active IETF work describing how post-quantum signatures such as Dilithium can be represented in X.509 artefacts. There is also an ongoing CA/Browser Forum discussion and working group activity that touches S/MIME and broader readiness.

Identity systems tend to be the slowest part of PQC adoption. Certificates sit underneath TLS, device identity, user authentication, and signing, and they are tied to trust stores, certificate lifetimes, hardware dependencies, and third-party interoperability.

Placeholder for Two network engineers cybersecurity datacenterTwo network engineers cybersecurity datacenter

4. The change you will actually feel: integration, performance, and compatibility

PQC is mostly invisible to end users, but not to engineering and security operations.

Integration points you will touch

  • Cryptographic libraries and platform stacks: TLS libraries, SSH stacks, VPN implementations, and signing tooling.
  • Key management and HSMs: Key generation, storage, signing APIs, and support for new algorithm identifiers.
  • Intermediaries: Load balancers, CDNs, TLS inspection, WAFs, and monitoring tooling that parses handshakes or certificates.

Performance and sizing realities

PQC often changes message sizes and CPU profiles. The first-order effect in many environments is not raw throughput, but handshake behaviour and memory pressure in hot paths. This is why large-scale deployments have focused on hybrid for key establishment first, while signatures and certificate ecosystem changes follow more cautiously.

Standards are moving, not finished

NIST’s first PQC standards are published as FIPS for key establishment and signatures, which has shifted PQC from “pilot” to procurement-grade planning.

NIST also selected HQC in March 2025 as a backup post-quantum encryption algorithm, explicitly to diversify in case weaknesses are found in the primary approach over time. This is a useful reminder for architects: algorithm agility is not an abstract requirement. It is how you avoid painting yourself into a corner.

5. Mapping PQC to your environment

If you want to anchor PQC in everyday systems, start by mapping these three buckets to your estate:

  1. Web and API traffic (TLS): Internet-facing services, partner APIs, and internal service mesh.
  2. Human communications: Messaging, email, document signing, and secure collaboration.
  3. Identity and trust: Certificates, device identity, code signing, VPN auth, and anything chained to PKI.

Then identify what can adopt hybrid quickly, what depends on third parties, and what has long validation or data retention requirements.

Talk to a PQC specialist

If you want to understand how PQC influences everyday security in your environment, it helps to talk it through with someone who works on PQC in practice. Reach out to discuss where PQC is likely to appear first in your stack, which dependencies will slow adoption, and how to build a realistic plan that fits your risk profile and timelines.

Get in touch

Do you want to know more about this topic?

Our experts and sales teams are at your service. Leave your contact information and we will get back to you shortly.

Call now
Placeholder for Portrait of french manPortrait of french man