ChaptersEventsBlog
We're exploring how organizations adapt IAM to AI. Take the AI Identity and Risk Readiness Survey by September 5 →

Publication Peer Review

A Practitioner’s Guide to Post-Quantum Cryptography
A Practitioner’s Guide to Post-Quantum Cryptography

A Practitioner’s Guide to Post-Quantum Cryptography

Open Until: 09/17/2025

As quantum computing advances, the threat it poses to classical cryptographic algorithms becomes increasingly urgent. This practical guide explores how to protect sensitive data in transit and at rest using post-quantum cryptography (PQC). It begins by explaining the unique power of quantum computers and why they jeopardize widely used cipher algorithms such as RSA and ECC. The guide then examines practical strategies to safeguard Transport Layer Security (TLS), Internet Key Exchange (IKE), and data encryption keys against quantum-enabled adversaries. By presenting viable PQC options and hybrid approaches, this resource helps security professionals prepare for a post-quantum future while maintaining backward compatibility and resilience during the transition.

Contribute to Peer Review

Peer Review Agreement

By participating in this peer review, you acknowledge and agree to the following:

  • Your name will be included as a reviewer only if you provide substantive feedback (e.g., content, clarity, accuracy). Feedback limited to grammar, syntax, or formatting will not qualify for acknowledgement.
  • CSA's authors will have final descretion over which suggestions are incorporated into the document. Not all feedback will be implemented.
  • You will not plagiarize or submit unmodified AI-generated text. If using AI-generated content, you must apply your expertise to refine, reformat, or integrate it meaningfully into the document.

Open Until: 09/17/2025