<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Bertrand Carlier, Auteur</title>
	<atom:link href="https://www.riskinsight-wavestone.com/en/author/bertrand-carlier_/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.riskinsight-wavestone.com/author/bertrand-carlier_/</link>
	<description>The cybersecurity &#38; digital trust blog by Wavestone&#039;s consultants</description>
	<lastBuildDate>Mon, 16 Mar 2026 12:45:09 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/Blogs-2024_RI-39x39.png</url>
	<title>Bertrand Carlier, Auteur</title>
	<link>https://www.riskinsight-wavestone.com/author/bertrand-carlier_/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Radar 2026 of Post-quantum Migration Solutions </title>
		<link>https://www.riskinsight-wavestone.com/en/2026/03/radar-2026-of-post-quantum-migration-solutions/</link>
					<comments>https://www.riskinsight-wavestone.com/en/2026/03/radar-2026-of-post-quantum-migration-solutions/#respond</comments>
		
		<dc:creator><![CDATA[Bertrand Carlier]]></dc:creator>
		<pubDate>Wed, 11 Mar 2026 17:18:49 +0000</pubDate>
				<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[Focus]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=29391</guid>

					<description><![CDATA[<p>The Quantum Threat Is Becoming Clearer  Quantum computing poses a serious threat to today’s asymmetric cryptography and is expected to render widely used algorithms such as RSA and ECC obsolete. By contrast, symmetric cryptography (such as AES) and hash functions, maintaining an equivalent level of security...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2026/03/radar-2026-of-post-quantum-migration-solutions/">Radar 2026 of Post-quantum Migration Solutions </a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<h1>The Quantum Threat Is Becoming Clearer </h1>
<p><span data-contrast="auto">Quantum computing poses a serious threat to today’s asymmetric cryptography and is expected to render widely used algorithms such as RSA and ECC obsolete. By contrast, symmetric cryptography (such as AES) and hash functions, maintaining an equivalent level of security can be achieved by increasing key sizes or security parameters.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p><span data-contrast="auto">In response to this emerging risk, the NIST standardized four post-quantum asymmetric algorithms in August 2024, specifically designed to withstand attacks from quantum computers.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p><span data-contrast="auto">While quantum computers are not yet powerful enough to carry out such attacks, estimates vary as to when this capability will be reached, with many experts anticipating a timeframe between 2033 and 2037.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p><span data-contrast="auto">Nevertheless, the “Harvest Now, Decrypt Later” (HNDL) threat—where attackers collect encrypted data today with the intent of decrypting it in the future using quantum computers—makes it critical to protect sensitive, long-lived data well before such machines become operational.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<h1>2025: Regulatory Acceleration </h1>
<p><span data-contrast="auto">While 2024 marked the completion of technical standards with the publication of the NIST specifications, 2025 stands out for the acceleration of institutional and regulatory roadmaps. In recent months, several major stakeholders have released their recommendations:</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<ul>
<li><span data-contrast="auto">The </span><a href="https://digital-strategy.ec.europa.eu/en/library/coordinated-implementation-roadmap-transition-post-quantum-cryptography"><b><span data-contrast="none">European Union</span></b></a><span data-contrast="auto"> has defined a roadmap for Member States and entities subject to NIS 2</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></li>
<li><a href="https://www.gov.uk/government/publications/advancing-a-coordinated-roadmap-for-the-transition-to-post-quantum-cryptography-in-the-financial-sector/g7-cyber-expert-group-statement-on-advancing-a-coordinated-roadmap-for-the-transition-to-post-quantum-cryptography-in-the-financial-sector-january-20"><b><span data-contrast="none">G7 Finance</span></b></a><span data-contrast="auto"> has formally integrated the post-quantum transition into its priorities</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></li>
<li><span data-contrast="auto">The </span><a href="https://www.bis.org/publ/bppdf/bispap158.htm"><b><span data-contrast="none">Bank for International Settlements (BIS)</span></b></a><span data-contrast="auto"> has raised awareness within the banking sector</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></li>
<li><span data-contrast="auto">The </span><a href="https://www.ncsc.gov.uk/guidance/pqc-migration-timelines"><b><span data-contrast="none">UK government</span></b></a><span data-contrast="auto"> has published its national post-quantum roadmap</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></li>
</ul>
<p><span data-contrast="auto">These announcements build on previously communicated timelines: the NIST released a draft targeting 2035, while the Australian Signals Directorate (ASD) set a 2030 deadline. We expect additional countries to issue similar announcements in the coming months.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p><span data-contrast="auto">As a result, the post-quantum transition is no longer solely a technological challenge. It is becoming a regulatory and institutional imperative, comparable to past largescale digital transformations. Regardless of the exact timeline for the emergence of quantum computers capable of breaking current cryptographic algorithms, a transition is unavoidable.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p><span data-contrast="auto">Migrating a complex IT infrastructure is far from trivial. According to a 2022 memorandum, the Biden administration estimated the cost of migrating all U.S. federal agencies at over $7 billion. Such a program spans multiple dimensions—from risk assessment to technical execution—and involves numerous intermediate steps. Dedicated solutions already exist to support and accelerate each phase of this transition.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<h1>The Wavestone Radar: A Market Overview of Solutions </h1>
<p><span data-contrast="auto">The 2026 Wavestone Radar of post-quantum migration solutions provides a visual overview of the leading solutions available on the market to support this transition. It has been—and will continue to be—regularly updated and enriched over the coming months. Any company that believes it should be featured is encouraged to contact us.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p><span data-contrast="auto">The objective of this radar is not to list solutions that have already completed their post-quantum transition, but rather to highlight those that actively support and accelerate the migration process.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p><img fetchpriority="high" decoding="async" class="size-full wp-image-29398 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2026/03/radar_1-1.png" alt="" width="1828" height="1032" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2026/03/radar_1-1.png 1828w, https://www.riskinsight-wavestone.com/wp-content/uploads/2026/03/radar_1-1-338x191.png 338w, https://www.riskinsight-wavestone.com/wp-content/uploads/2026/03/radar_1-1-69x39.png 69w, https://www.riskinsight-wavestone.com/wp-content/uploads/2026/03/radar_1-1-768x434.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2026/03/radar_1-1-1536x867.png 1536w" sizes="(max-width: 1828px) 100vw, 1828px" /></p>
<h1>Radar Categories </h1>
<p><span data-contrast="auto">Quantum Key Distribution (QKD) was considered but ultimately excluded as a category. While QKD is resistant to quantum computers, it is not technically a post-quantum cryptography technology and is not recommended by regulatory bodies.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<ul>
<li><b><span data-contrast="auto">Inventory</span></b><span data-contrast="auto">: Automating the identification of all cryptographic assets, including the types of cryptography used and their locations</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;469777462&quot;:[720],&quot;469777927&quot;:[0],&quot;469777928&quot;:[8]}"> </span></li>
<li><b><span data-contrast="auto">Network Analysis</span></b><span data-contrast="auto">: Detecting network traffic that relies on obsolete cryptography using network probes</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;469777462&quot;:[720],&quot;469777927&quot;:[0],&quot;469777928&quot;:[8]}"> </span></li>
<li><b><span data-contrast="auto">Migration Management</span></b><span data-contrast="auto">: Providing an end-to-end view of the post-quantum transition, often based on inventory or network analysis results</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;469777462&quot;:[720],&quot;469777927&quot;:[0],&quot;469777928&quot;:[8]}"> </span></li>
<li><b><span data-contrast="auto">PQC compliant HSM / PKI / CLM</span></b><span data-contrast="auto">: Delivering essential digital trust components for most services that are resistant to quantum attacks</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;469777462&quot;:[720],&quot;469777927&quot;:[0],&quot;469777928&quot;:[8]}"> </span></li>
<li><b><span data-contrast="auto">Libraries / Embedded Services</span></b><span data-contrast="auto">: Encrypting and signing data using versatile cryptographic libraries or cloud integrated solutions</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;469777462&quot;:[720],&quot;469777927&quot;:[0],&quot;469777928&quot;:[8]}"> </span></li>
<li><b><span data-contrast="auto">Perimeter Protection</span></b><span data-contrast="auto">: Adding an additional layer of security against quantum threats, notably through traffic encapsulation and application wrappers for critical systems</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;469777462&quot;:[720],&quot;469777927&quot;:[0],&quot;469777928&quot;:[8]}"> </span></li>
</ul>
<h1>Inventory: The Cornerstone of Any Migration </h1>
<p><span data-contrast="auto">Our initial feedback from supporting post-quantum migration programs highlights a clear reality: it is impossible to plan and budget a migration without visibility into the existing environment. </span><span data-contrast="auto">Concretely, organizations need to understand :</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<ul>
<li><span data-contrast="auto">Which use cases and data are involved?</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></li>
<li><span data-contrast="auto">Where is cryptography used across the information system?</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></li>
<li><span data-contrast="auto">Which algorithms are currently deployed?</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></li>
</ul>
<p><span data-contrast="auto">Conducting an exhaustive inventory of a complex IT infrastructure represents a significant investment. It is therefore critical to prioritize the areas where inventory tools should be deployed first, based on three key criteria: data exposure (data accessible via the internet, exchanged with partners, etc.), long-term data sensitivity and vulnerability to HNDL attacks, and the technical components used to secure this data. Without this upfront visibility—understanding which algorithms are used, for which purposes, and to protect which data-effective migration planning becomes impossible.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p><span data-contrast="auto">However, cryptographic inventory cannot rely on a single source. Organizations must combine multiple complementary approaches: network probes enable real-time observation of traffic, code analysis identifies cryptographic usage within applications and internal developments, SaaS specific tools and interfaces with external providers reveal third-party dependencies, while existing CMDBs and reference repositories map the overall infrastructure. This multiplicity of sources creates a new strategic need for tools capable of centralizing heterogeneous information and providing a consolidated, actionable view to effectively manage migration. A trend is emerging around the CBOM (Cryptography Bill of Materials) format to standardize these inventories, although it is still too early to assess its actual adoption across the market.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p><span data-contrast="auto">Inventory thus becomes the foundation of post-quantum migration governance. Without it, organizations are effectively navigating blind.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p><span data-contrast="auto">Since 2024, the market for digital asset inventory solutions has experienced strong growth, driven by the emergence of highly specialized players focused exclusively on the detection, mapping, and management of IT assets (hardware, software, cryptographic certificates, etc.). These vendors stand out for their deep expertise and ability to address complex environments.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p><span data-contrast="auto">At the same time, established players in the network and infrastructure space – such as IBM, Samsung, Cisco, and Microsoft – are leveraging their deep knowledge of IT environments to deliver robust solutions. These offerings increasingly integrate advanced network probes and cryptographic inventory capabilities, with growing attention paid to post-quantum cryptography challenges.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<h1>CryptoAgility: A Long Term Objective of the Post-quantum Transition </h1>
<p><span data-contrast="auto">Cryptoagility is not merely a technical feature; it is a strategic capability that enables organizations to adapt to cryptographic evolutions without operational disruption. As post-quantum cryptographic (PQC) algorithms increasingly become a regulatory standard, cryptoagility allows business logic to be decoupled from the underlying cryptography, thereby facilitating updates without requiring a complete overhaul of existing infrastructures.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p><span data-contrast="auto">To adopt a crypto agile approach, organizations must embed flexible and scalable mechanisms from the design phase, capable of adapting to cryptographic advances—whether driven by the quantum threat or by the rapid deprecation of algorithms.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p><span data-contrast="auto">On the library side, solutions offering a modular approach are now widely available. Tools such as </span><b><span data-contrast="auto">Open Quantum Safe (OQS)</span></b><span data-contrast="auto">, compatible with OpenSSL and BoringSSL, or </span><b><span data-contrast="auto">liboqs</span></b><span data-contrast="auto"> (Intel), optimized for x86 architectures, enable the integration of NIST standardized post-quantum algorithms (Kyber, Dilithium, SPHINCS+). </span><b><span data-contrast="auto">Bouncy Castle</span></b><span data-contrast="auto">, for its part, provides a unified API for Java and C#, easing the transition between classical and post-quantum cryptography.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p><span data-contrast="auto">However, the modular approach offered by these libraries must be integrated into a broader ecosystem of specialized tools. In this context, inventory solutions and cryptographic key and certificate lifecycle management tools play a critical role. They enable the establishment of an exhaustive mapping of the cryptographic environment, providing full visibility into all assets that need to be protected. This comprehensive view forms an essential foundation for ensuring data security and implementing truly effective risk management.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p><span data-contrast="auto">Ultimately, crypto agility goes beyond the technical domain. It is a strategic capability that allows organizations to secure their data sustainably, reduce quantum related risks, and approach the future with greater confidence. The technological building blocks are already in place; what remains is to integrate them today into cybersecurity strategies.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<h1>Perimeter Protection: A Rapid Mitigation Strategy </h1>
<p><span data-contrast="auto">Given the scale and complexity of post-quantum migration programs, perimeter protection (edge protection) solutions provide a pragmatic and fast acting approach to reducing exposure across critical data flows.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p><span data-contrast="auto">These solutions enable the rapid securing of sensitive communication channels—such as VPNs, email, and file transfers – by encapsulating traffic within a post-quantum cryptographic layer, without requiring changes to the underlying applications. This makes it possible to deploy wrappers around critical applications without waiting for their full redesign or migration.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p><span data-contrast="auto">The primary advantage of this approach lies in the significant time savings it delivers. While a comprehensive application-level migration remains necessary in the medium term and may span several years, perimeter protection offers immediate security for the most exposed assets. This strategy allows organizations to intelligently prioritize the protection of their most sensitive data, while methodically preparing for the broader, long-term migration of their IT infrastructure.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<h1>HSMs and Certifications: A Turning Point in 2025 </h1>
<p><span data-contrast="auto">In the first version of our radar, we highlighted the lack of certifications for post-quantum Hardware Security Modules (HSMs), which represented a major barrier to their deployment in production environments.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p><span data-contrast="auto">This situation has since evolved positively. Both the </span><a href="https://cyber.gouv.fr/actualites/pour-lanssi-la-cryptographie-post-quantique-post-quantum-cryptography-ou-pqc-repr%C3%A9sente-la-voie-la-plus-prometteuse-pour-se-pr%C3%A9munir-contre-la-menace-quantique-la-transition-post-quantique-repose-notamment-sur-la-mise-%C3%A0-disposition-pour-les-uti/"><b><span data-contrast="none">ANSSI</span></b></a><span data-contrast="auto"> and the </span><a href="https://www.infineon.com/press-release/2025/infcss202501-043"><b><span data-contrast="none">BSI</span></b></a><span data-contrast="auto"> have now issued three Common Criteria certifications for PQC compatible HSMs (from </span><b><span data-contrast="auto">Samsung</span></b><span data-contrast="auto">, </span><b><span data-contrast="auto">Thales</span></b><span data-contrast="auto">, and </span><b><span data-contrast="auto">Infineon</span></b><span data-contrast="auto">). These certifications mark a significant turning point and pave the way for real-world deployments under operational conditions.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p><span data-contrast="auto">HSMs play a critical role in the digital trust chain, particularly for:</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<ul>
<li><span data-contrast="auto">The secure generation and storage of PQC keys, which are significantly larger than their classical counterparts</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;469777462&quot;:[720],&quot;469777927&quot;:[0],&quot;469777928&quot;:[8]}"> </span></li>
<li><span data-contrast="auto">Signature operations within Public Key Infrastructures (PKIs)</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;469777462&quot;:[720],&quot;469777927&quot;:[0],&quot;469777928&quot;:[8]}"> </span></li>
<li><span data-contrast="auto">End-to-end key lifecycle management (rotation, revocation, archiving), ensuring integrity and traceability to maintain the chain of trust</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;469777462&quot;:[720],&quot;469777927&quot;:[0],&quot;469777928&quot;:[8]}"> </span></li>
</ul>
<p><span data-contrast="auto">However, even when certified, these HSMs must still address challenges related to side channel attacks, given the relative immaturity of current implementations of these new algorithms. The scientific community continues to actively assess and analyze these risks.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<h1>IoT and Embedded Systems: The Weak Link </h1>
<p><span data-contrast="auto">While the market for PQC solutions is progressing rapidly for traditional IT environments, a worrying gap is emerging for IoT and embedded systems. These devices operate under severe constraints – limited power, reduced processing capabilities, and restricted storage – which directly conflict with the requirements of post-quantum algorithms, inherently more resource intensive than their classical counterparts.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p><span data-contrast="auto">Deploying PQC on such systems often requires dedicated processors with optimized instruction sets. However, the current hardware ecosystem remains insufficient: few dedicated PQC hardware accelerators are available on the market, and hardware development cycles typically span several years. This technical complexity is compounded by the challenge of upgrading a highly decentralized and heterogeneous device landscape, including widely deployed and hard to access connected objects, mission critical industrial systems where downtime is costly, smart cards with long renewal cycles, and legacy equipment with limited or no update capabilities.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p><span data-contrast="auto">The risk is clear: a lasting gap could emerge between traditional IT environments, which will progressively migrate to PQC, and embedded IoT systems, which may remain vulnerable for a much longer period. Organizations must anticipate this challenge now by embedding PQC compatibility requirements into their specifications for all new deployments of embedded and connected equipment.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<h1>A Nuanced Market Outlook </h1>
<p><span data-contrast="auto">The market has now clearly acknowledged that the post-quantum transition will necessarily begin with a systematic inventory phase and a comprehensive risk assessment, a realization that has reshaped the structure of the ecosystem. This growing awareness is reflected in several encouraging developments: the proliferation of specialized solutions for mapping cryptographic assets; the first official certifications for PQC compatible security modules, confirming their readiness for operational deployment; and the maturity of opensource libraries, now widely supported by the industry. Migration support tools further complement this landscape. In parallel, perimeter security approaches already make it possible to protect sensitive data flows without waiting for a full system overhaul.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p><span data-contrast="auto">However, this momentum continues to face persistent challenges. Delays in the development of suitable hardware – particularly for IoT and embedded systems – remain a major obstacle, with a still limited availability of low power, PQC compatible processors. Certifications, while promising, remain limited in number and cover only part of the available technological spectrum. Finally, inventory tools, despite becoming increasingly sophisticated, have yet to fully demonstrate their ability to effectively address the complexity and heterogeneity of large enterprise IT environments.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p><span data-contrast="auto">As a result, while the market has clearly oriented its efforts toward inventory and risk analysis as essential prerequisites for migration, technological and industrial challenges continue to slow largescale adoption.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2026/03/radar-2026-of-post-quantum-migration-solutions/">Radar 2026 of Post-quantum Migration Solutions </a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.riskinsight-wavestone.com/en/2026/03/radar-2026-of-post-quantum-migration-solutions/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Post-Quantum Cryptography for products &#038; OT: From trends to industrial reality</title>
		<link>https://www.riskinsight-wavestone.com/en/2026/02/post-quantum-cryptography-for-products-ot-from-trends-to-industrial-reality/</link>
					<comments>https://www.riskinsight-wavestone.com/en/2026/02/post-quantum-cryptography-for-products-ot-from-trends-to-industrial-reality/#respond</comments>
		
		<dc:creator><![CDATA[Bertrand Carlier]]></dc:creator>
		<pubDate>Wed, 18 Feb 2026 15:42:58 +0000</pubDate>
				<category><![CDATA[Deep-dive]]></category>
		<category><![CDATA[Manufacturing & Industry 4.0]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=29022</guid>

					<description><![CDATA[<p>Post-Quantum Cryptography (PQC) has fueled debates for years, but since the European Commission’s June 2025 communication on the PQC transition roadmap, the acceleration is undeniable. It is no longer a question of “if” but rather “when”, quantum computing will disrupt our cryptographic foundations. As the Wavestone RiskInsight article  « Quantum computing and post-quantum cryptography: what strategy should companies adopt to deal with these issues? » reminds us, this subject shifts...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2026/02/post-quantum-cryptography-for-products-ot-from-trends-to-industrial-reality/">Post-Quantum Cryptography for products &amp; OT: From trends to industrial reality</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p><b><span data-contrast="auto">Post-Quantum Cryptography</span></b><span data-contrast="auto"> </span><b><span data-contrast="auto">(PQC)</span></b><span data-contrast="auto"> has fueled debates for years, but since the </span><b><span data-contrast="auto">European Commission’s June 2025 communication </span></b><a href="https://digital-strategy.ec.europa.eu/en/library/coordinated-implementation-roadmap-transition-post-quantum-cryptography"><b><span data-contrast="none">on the PQC transition roadmap</span></b></a><span data-contrast="auto">, the acceleration is undeniable. It is no longer a question of “if” but rather “when”, quantum computing will disrupt our cryptographic foundations. As the Wavestone RiskInsight article  </span><a href="https://www.riskinsight-wavestone.com/en/2025/03/quantum-computing-and-post-quantum-cryptography-how-to-deal-with-these-issues/"><span data-contrast="none">« Quantum computing and post-quantum cryptography: what strategy should companies adopt to deal with these issues? »</span></a><span data-contrast="auto"> </span><span data-contrast="auto">reminds us, this subject shifts from a long-term perspective to a </span><b><span data-contrast="auto">strategic imperative </span></b><span data-contrast="auto">for CISOs, CTOs and product teams. How does that change your </span><b><span data-contrast="auto">industrial environments </span></b><span data-contrast="auto">as well as your </span><b><span data-contrast="auto">smart products</span></b><span data-contrast="auto">, and how to act as of now?</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<h1><span data-contrast="none">Quantum Threats: a new era for industrial cryptography</span><span data-ccp-props="{}"> </span></h1>
<p><span data-contrast="auto">Quantum computing represents a threat to traditional cryptographic algorithms which guarantee integrity, authenticity and confidentiality of communications, including those of OT systems and products. Even if “</span><b><span data-contrast="auto">Q-Day</span></b><span data-contrast="auto">” (the day quantum computers will break current cryptography) is still several years away, the risk is already present: threat actors can already use </span><b><span data-contrast="auto">« </span></b><b><i><span data-contrast="none">H</span></i></b><b><i><span data-contrast="auto">arvest Now, Decrypt Later</span></i></b><b><span data-contrast="auto"> »</span></b><span data-contrast="auto"> attacks by storing encrypted data today to decrypt them as soon as current cryptographic algorithms are broken. Another risk, just as critical, is already appearing: </span><b><span data-contrast="auto">«</span></b><b><span data-contrast="auto"> </span></b><b><span data-contrast="auto">Trust Now, Forge Later</span></b><b><span data-contrast="auto"> </span></b><b><span data-contrast="auto">»</span></b><span data-contrast="auto">. Digital signatures or certificates seen as reliable today could be falsified tomorrow, allowing transparent deployment of malwares or even compromising supply chains. Unlike progressive data breach, this attack triggers </span><b><span data-contrast="auto">an immediate collapse of trust and integrity</span></b><span data-contrast="auto">, with massive impacts on </span><b><span data-contrast="auto">industrial environments</span></b><span data-contrast="auto"> and </span><b><span data-contrast="auto">smart products</span></b><span data-contrast="auto">. With the </span><b><span data-contrast="auto">European roadmap</span></b><span data-contrast="auto">, structuring 2026, 2030 and 2035, the question hinges on the sequencing of the transition.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p><span data-contrast="auto">Within the industrial sector, where assets are used for </span><b><span data-contrast="auto">multiple decades</span></b><span data-contrast="auto">, this represents a major concern: OT environments and embedded products depend on critical cryptographic usage that will be directly impacted by the arrival of post-quantum algorithms.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p><span data-contrast="auto">Key OT and product use cases include:</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<ul>
<li><b><span data-contrast="auto">Secure administration of OT systems and products</span></b><span data-contrast="auto">: guarantee the integrity and confidentiality of operations.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></li>
<li><b><span data-contrast="auto">Digital signatures and firmware integrity</span></b><span data-contrast="auto">: guarantee the reliability of software updates (secure boot, code signing, X.509…).</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></li>
<li><b><span data-contrast="auto">Secure remote access to industrial assets and products</span></b><span data-contrast="auto">: protect VPN, SSH, RDP connections as well as other protocols from future attacks.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></li>
<li><b><span data-contrast="auto">Data exchanges IT/OT</span></b><span data-contrast="auto">: secure flows between information systems and industrial environments (TLS, MQTTS, HTTPS…).</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></li>
<li><b><span data-contrast="auto">Data confidentiality of industrial processes</span></b><span data-contrast="auto">: preserve the confidentiality of sensitive data in transit or at rest.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></li>
<li><b><span data-contrast="auto">Secure logging and event history</span></b><span data-contrast="auto">: ensure the traceability and integrity of logs and historical data.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></li>
</ul>
<p><span data-ccp-props="{&quot;335551550&quot;:2,&quot;335551620&quot;:2}"> <img decoding="async" class="alignnone  wp-image-29019 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2026/02/PQC_en1.png" alt="" width="687" height="368" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2026/02/PQC_en1.png 1027w, https://www.riskinsight-wavestone.com/wp-content/uploads/2026/02/PQC_en1-357x191.png 357w, https://www.riskinsight-wavestone.com/wp-content/uploads/2026/02/PQC_en1-71x39.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2026/02/PQC_en1-768x411.png 768w" sizes="(max-width: 687px) 100vw, 687px" /></span></p>
<h1><span data-contrast="none">PQC for OT &amp; Products: Address the constraints while preserving crypto-agility</span><span data-ccp-props="{}"> </span></h1>
<h2><span data-contrast="none">OT &amp; Products context: specific constraints</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></h2>
<p><span data-contrast="auto">OT systems and products were never conceived for </span><b><span data-contrast="auto">crypto-agility</span></b><span data-contrast="auto">. Numerous industrial protocols, for instance DNP3, Modbus or MQTT, are not encrypted as of today because OT architecture historically depends more on network isolation than on cryptography, thus there is no reason to think they will be encrypted tomorrow with post-quantum algorithms.</span><span data-ccp-props="{}"> </span></p>
<p><span data-contrast="auto">Nevertheless, encrypted communications will undergo this cryptographic disruption.</span><span data-ccp-props="{}"> </span></p>
<p><span data-contrast="auto">In a second step, multiple OT devices face significant hardware constraints (CPU, memory, storage capacity) and have a very long lifespan, often between 10 and 30 years. Those characteristics make updates difficult and expensive: secure remote update mechanisms are still rare, and firmware signing is not consistently implemented, which is in fact bad practice.</span><span data-ccp-props="{}"> </span></p>
<p><span data-contrast="auto">Those constraints explain why OT environments cannot integrate new cryptographic primitives at the same speed as IT, and why PQC isn’t yet natively considered.</span><span data-ccp-props="{}"> </span></p>
<p><strong>Nevertheless, even if current products and OT systems aren’t conceived for post-quantum cryptography, the emergence of PQC standards, the evolution of regulatory obligations and the rise of risks linked to quantum computing make this transition essential in the medium term. </strong></p>
<p><span data-ccp-props="{&quot;335551550&quot;:2,&quot;335551620&quot;:2}"><img decoding="async" class=" wp-image-29017 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2026/02/PQC_en2.png" alt="" width="743" height="285" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2026/02/PQC_en2.png 1402w, https://www.riskinsight-wavestone.com/wp-content/uploads/2026/02/PQC_en2-437x168.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2026/02/PQC_en2-71x27.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2026/02/PQC_en2-768x295.png 768w" sizes="(max-width: 743px) 100vw, 743px" /></span></p>
<h2><span data-contrast="none">Making crypto-agility operational for the industry and products</span><span data-ccp-props="{}"> </span></h2>
<p><span data-contrast="auto">The scoping of the PQC project for Products and OT can be broken down into four main components:</span><span data-ccp-props="{}"> </span></p>
<p><b><span data-contrast="auto">1. Conduct the cryptographical inventory and prioritize critical assets </span></b><span data-ccp-props="{}"> </span></p>
<p><span data-contrast="auto">Start the dialogue with your cryptographic platform providers (PKI, KMS, HSM) now, to anticipate the migration.</span><span data-ccp-props="{&quot;335559685&quot;:720}"> </span></p>
<p><b><span data-contrast="auto">2. Conceive and deploy crypto-agile architectures</span></b><span data-ccp-props="{}"> </span></p>
<p><span data-contrast="auto">Rely exclusively on NIST-standardized algorithms (for instance: </span><b><span data-contrast="auto">ML-KEM, ML-DSA, SLH-DSA</span></b><span data-contrast="auto">) and prohibit any </span><b><span data-contrast="auto">internal development</span></b><span data-contrast="auto"> or </span><b><span data-contrast="auto">non-standard</span></b><span data-contrast="auto"> library for cryptographical components; prioritizing validated and proven solutions.</span><span data-ccp-props="{&quot;335559685&quot;:708}"> </span></p>
<p><span data-contrast="auto">Conceiving crypto-agile architecture implies accounting for the </span><b><span data-contrast="auto">embedded aspect and its constraints</span></b><span data-contrast="auto"> (limited memory, PCBs, energy resources). The implementation of PQC algorithms on those systems remains uncertain. Nevertheless, optimized algorithms for embedded systems are starting to emerge and open the way to its realistic adoption.</span><span data-ccp-props="{&quot;335559685&quot;:708}"> </span></p>
<p><span data-ccp-props="{&quot;335559685&quot;:720}"><img loading="lazy" decoding="async" class="alignnone  wp-image-29015 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2026/02/PQC_en3.png" alt="" width="747" height="258" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2026/02/PQC_en3.png 1444w, https://www.riskinsight-wavestone.com/wp-content/uploads/2026/02/PQC_en3-437x151.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2026/02/PQC_en3-71x25.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2026/02/PQC_en3-768x265.png 768w" sizes="auto, (max-width: 747px) 100vw, 747px" /></span></p>
<p><b><span data-contrast="auto">3. Progressively migrate through hybridization and iteration </span></b><span data-ccp-props="{}"> </span></p>
<p><span data-contrast="auto">Transition towards post-quantum cryptography cannot be approached as a one-off project or a “one-shot” migration. </span><span data-contrast="none">It is an iterative process that must be managed and governed over time, by starting with hybridization of algorithms:</span><span data-contrast="auto"> this is explicitly recommended by ANSSI (France’s National Cybersecurity Agency) and the European Commission.</span><span data-ccp-props="{&quot;335559685&quot;:720}"> </span></p>
<p><span data-contrast="auto">Crypto-agility isn’t an option, but a necessity to ensure resilience and compliance for industrial environments and products from the quantum threat. This depends on a </span><b><span data-contrast="none">structured approach, driven by inventory, architecture, hybrid migration and governance.</span></b><span data-contrast="auto"> </span><span data-ccp-props="{}"> </span></p>
<h1><span data-contrast="none">Operational feedback &amp; concrete use cases: stakeholders at different stages</span><span data-ccp-props="{}"> </span></h1>
<p><span data-contrast="auto">Our field experience reveals a noteworthy maturity gap between two industrial organizations when dealing with post-quantum cryptography:</span><span data-ccp-props="{}"> </span></p>
<p><b><span data-contrast="auto">1. Organizations with a rudimentary understanding</span></b><span data-ccp-props="{}"> </span></p>
<ul>
<li><b><span data-contrast="auto"> Observation</span></b><span data-contrast="auto">: In numerous industrial environments, PQC remains an abstract concept, often seen as distant or limited to experts. </span><span data-ccp-props="{}"> </span></li>
<li><b><span data-contrast="auto">Symptoms</span></b><span data-contrast="auto">: </span><span data-ccp-props="{}"> </span>
<ul>
<li><span data-contrast="auto">Operational and business teams aren’t part of strategic deliberations on cryptography.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:278}"> </span></li>
<li><b><span data-contrast="auto">Current roadmaps lack maturity and clarity</span></b><span data-contrast="auto">; the underlying projects costs are often underestimated. Priority remains on service availability; quantum security is therefore deprioritized.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:278}"> </span></li>
<li><b><span data-contrast="auto">HNDL &amp; TNFL</span></b><span data-contrast="auto"> concepts are poorly understood, if not outright ignored.</span>  </li>
</ul>
</li>
<li><b><span data-contrast="auto">Risks</span></b><span data-contrast="auto">: </span><span data-ccp-props="{}"> </span>
<ul>
<li><b><span data-contrast="auto">Disruption of industrial production processes and data breaches</span></b><span data-contrast="auto">: vulnerable communications between critical assets, based on outdated algorithms, expose sensitive data and can cause interruptions or major disturbances in industrial operations (loss of integrity of the data).</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:278}"> </span></li>
<li><b><span data-contrast="auto">Production downtime caused by abrupt migration:</span></b><span data-contrast="auto"> A forced transition towards post-quantum cryptography, without preparation nor crypto-agility, can lead to production interruptions, significant additional costs and severe impacts on operational continuity.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:278}"> </span></li>
</ul>
</li>
</ul>
<p><b><span data-contrast="auto">2. Product suppliers: pioneers already undergoing industrialization</span></b><span data-ccp-props="{}"> </span></p>
<ul>
<li><b><span data-contrast="auto">Observation: </span></b><span data-contrast="auto">On the contrary, some product suppliers are already ahead (including automotive and smart objects).</span><span data-ccp-props="{}"> </span></li>
<li><b><span data-contrast="auto">Symptoms: </span></b><span data-ccp-props="{}"> </span>
<ul>
<li><span data-contrast="auto">PQC projects are prioritized over critical use cases: firmware and update signatures (OTA), device identity management, secure remote access, etc.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:278}"> </span></li>
<li><span data-contrast="auto">Pilot projects are being launched on product lines or representative environments, with concrete feedback on performance, compatibility and robustness of hybrid solutions </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:278}"> </span></li>
<li><span data-contrast="auto">The process is being industrialized: Integration of PQC clauses in supplier contracts, automation of cryptographic inventory </span><b><span data-contrast="auto">CBOM</span></b><span data-contrast="auto">, team upskilling, and dedicated governance.</span></li>
</ul>
</li>
</ul>
<h1><span data-contrast="none">Conclusion &amp; Roadmap: Take action to build a quantum-safe future</span><span data-ccp-props="{}"> </span></h1>
<p><span data-contrast="auto">Quantum threat is no longer a distant prospect: it already demands a significant transformation of industrial and product cybersecurity.</span><span data-ccp-props="{}"> </span></p>
<ol>
<li><b><span data-contrast="auto">Plan ahead to protect the future</span></b><span data-ccp-props="{}"> </span></li>
</ol>
<p><span data-contrast="auto">Demystify quantum concepts and incorporate them in your cybersecurity processes, including your products, your OT environments or your IT systems. Planning ahead is the key to preventing a major disruption.</span><span data-ccp-props="{&quot;335559685&quot;:708}"> </span></p>
<ol start="2">
<li><b><span data-contrast="auto"> Make crypto-agility a strategic vision</span></b></li>
</ol>
<p><span data-contrast="auto">Stop viewing it as merely a technical project, but as a pillar of your resilience and of your digital sovereignty. Build a clear roadmap, with milestones in the short, medium and long term.</span><span data-ccp-props="{&quot;335559685&quot;:708}"> </span></p>
<ol start="3">
<li><b><span data-contrast="auto">Rely on trusted partners</span></b><span data-ccp-props="{}"> </span></li>
</ol>
<p><span data-contrast="auto">The market is ready: experts and solutions exist to support you through the modernization and securing of your critical infrastructure. Don’t face complexity on your own. </span><span data-ccp-props="{&quot;335559685&quot;:708}"> </span></p>
<ol start="4">
<li><b><span data-contrast="auto"> Industrialize the process</span></b></li>
</ol>
<p><span data-contrast="auto">Move from pilot projects to broader rollout: </span><span data-ccp-props="{}"> </span></p>
<ul>
<li><span data-contrast="auto">Implement a PQC strategy to map out, prioritize and pilot the migration of critical uses (include PQC clauses in contracts).</span><span data-ccp-props="{}"> </span></li>
<li><span data-contrast="auto">Start a transition program to modernize trust infrastructure components (PKI, CLM, HSM), automate the inventory and ensure the operational continuity.</span><span data-ccp-props="{}"> </span></li>
<li><span data-contrast="auto">Rely on peers’ feedback as well as feedback from sectors already engaged in PQC.</span><span data-ccp-props="{}"> </span></li>
</ul>
<h6><strong>Quantum risk is already there: weakened asymmetric encryption, leaving signatures and data exposed. </strong></h6>
<p><span data-contrast="auto">As mentioned previously, we start from the observation that elements that aren’t encrypted today in OT environments are not meant to be encrypted tomorrow with post-quantum algorithms, because already existing measures ensure a risk level judged acceptable.</span><span data-ccp-props="{}"> </span></p>
<p><span data-contrast="auto">In other words, PQC doesn’t aim to transform the entirety of OT, but to protect the uses that </span><b><span data-contrast="none">really rely on cryptographical components exposed to quantum risk.</span></b><span data-ccp-props="{}"> </span></p>
<p><b><span data-contrast="none">However, this observation doesn’t reduce the importance of planning.</span></b><span data-ccp-props="{}"> </span></p>
<h6><strong>The two priorities remain as follows: </strong></h6>
<ul>
<li><span data-contrast="none">Migrate your assets before 2030 and act today to protect data confidentiality</span><span data-ccp-props="{}"> </span></li>
<li><span data-contrast="none">Define your perimeter, build your roadmap, and above all, begin the migration process today.</span><span data-ccp-props="{}"> </span></li>
</ul>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2026/02/post-quantum-cryptography-for-products-ot-from-trends-to-industrial-reality/">Post-Quantum Cryptography for products &amp; OT: From trends to industrial reality</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.riskinsight-wavestone.com/en/2026/02/post-quantum-cryptography-for-products-ot-from-trends-to-industrial-reality/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
