Quantum Cryptography · Act Now

Your Encryption Will Be Broken.
The Question Is When.

Adversaries are already collecting encrypted data today — to decrypt it once quantum computers are powerful enough. For organisations with long-lived sensitive data, the window to act on Post-Quantum Cryptography is already open.

The Threat

The Attack Is
Already Happening.

Quantum computers cannot yet break today's encryption. But attackers do not need to wait.

The harvest now, decrypt later strategy means adversaries are collecting encrypted data today — financial records, patient data, communications, contracts — storing it until a sufficiently powerful quantum computer exists to decrypt it.

If your data must stay confidential for 10+ years, this problem belongs in your 2026 planning — not your 2035 planning.

Two Approaches

PQC and QKD:
What's the Difference?

Two complementary approaches to quantum-safe cryptography. PQC is the baseline for everyone — QKD adds the highest level of protection for critical infrastructure. Click each row to learn more.

PQC
QKD
CLICK TO EXPAND
PQC
  • Replaces today’s encryption with new algorithms designed to resist quantum attacks
  • Runs on existing hardware — it’s a software update, not a hardware investment
  • The universal upgrade path for every organisation
QKD
  • Uses quantum states (photons) to share encryption keys
  • Any eavesdropping attempt is physically detectable
  • Security guaranteed by the laws of physics, not mathematics
PQC
  • Your IT team updates the encryption libraries your systems already use
  • Compatible with existing infrastructure
  • No new hardware needed
QKD
  • Requires dedicated dark fibre and specialised transmitters/receivers
  • Point-to-point only, approx. 100 km range per link
  • Significant installation and integration effort
PQC
  • Main cost: cryptographic inventory, code migration, testing
  • No new hardware required for most systems
  • Can be done incrementally alongside existing IT projects
QKD
  • Equipment from €50k+ per link pair
  • Ongoing fibre and operational costs
  • Justified only for highest-sensitivity connections
PQC
  • Relies on problems believed unsolvable even for quantum computers
  • Could theoretically be broken by future breakthroughs
  • No indication this is likely — but not physically impossible
QKD
  • Information-theoretic security guaranteed by quantum mechanics
  • No computational breakthrough can break it
  • The strongest security guarantee available today
PQC
  • International standards finalised in 2024 (NIST FIPS 203–205)
  • Major technology vendors are already integrating the new standards
  • EU targets 2030 for migration of high-risk systems
  • Ready for enterprise rollout today
QKD
  • Commercially available from several vendors globally
  • Live networks operating in Vienna, Geneva, and China
  • Still primarily point-to-point deployments
PQC
  • Email, cloud, online transactions, internal networks
  • Anywhere your organisation uses encryption today
  • Relevant for every enterprise, regardless of size or industry
QKD
  • Government backbone, banking trunk lines, critical infrastructure
  • Where the cost of a breach justifies the investment
  • Primarily relevant for banks, energy, telecom, government
Bottom Line

PQC is the baseline — a software upgrade every organisation needs. QKD is the advanced layer for critical infrastructure where the highest security guarantees are required. For banks, energy, and government, the answer is often a hybrid approach — PQC across the board, QKD for the most sensitive links.

The Broader Picture

Quantum Communication Beyond Cryptography

PQC and QKD are the most business-relevant applications today. The broader field is expanding — three adjacent technologies to watch over the next 5–10 years:

Satellite-Based QKD

Sovereign communication across borders via EuroQCI — where fibre doesn’t reach.

Quantum Networks

Multi-node networks with quantum repeaters — precursor to a future Quantum Internet.

Quantum Random Number Generators

Already commercially available — certifiably secure randomness for any cryptographic system.

Your Action Plan

Three Steps.
Starting This Quarter.

Step 1

Now

Make It a Leadership Topic

Quantum risk isn't an IT problem — it affects every system that protects customer data, financial transactions, and intellectual property. Assign executive ownership and bring your CISO, CTO, and business leads to the same table. This decision can't wait for the next strategy cycle.

Effort: 1 leadership decision

Step 2

2026

Understand Your Cryptographic Exposure

You likely know your critical systems — but not where cryptography is embedded across your supply chain, legacy infrastructure, and third-party dependencies. A full cryptographic inventory is more complex than most organisations expect and will be a continuous effort over the coming years, not a one-off audit.

Effort: Ongoing programme, not a project

Step 3

2027 – 2030

Start Migrating — Beginning With What Matters Most

Systems that handle long-lived sensitive data go first: customer records, financial transactions, IP. Upgrade to NIST-standardised PQC algorithms where vendor support is ready. For the highest-sensitivity links, consider adding physics-based security layers like QKD. This is a multi-year transformation — but every quarter you wait compresses the runway.

Effort: Phased, multi-year programme

Austria Is Already Moving

Commercial QKD Has Arrived in Vienna.

In early 2026, Erste Group, A1 Telekom, and Vienna-based zerothird completed Austria's first integration of entanglement-based Quantum Key Distribution (eQKD) into live banking infrastructure — based on Austrian Nobel Prize-winning research.

The pilot runs on Erste Group's existing fibre network, demonstrating that quantum-secured encryption works in real-world banking environments.

For Austrian corporates, this means the ecosystem, the expertise, and the technology are available locally — no need to look to the US or China.

  • zerothird

    eQKD systems · Vienna

  • qtlabs

    Quantum communication infrastructure · Vienna

  • Erste Group

    First corporate QKD deployment · Austria

  • A1 Telekom

    Network infrastructure partner

Regulatory Timeline

The Deadlines Are Set.

2024

Standards Finalised

NIST FIPS 203, 204, 205 published. EU Commission Recommendation 2024/1101 on a Coordinated Implementation Roadmap published.

2026

National Roadmaps Due

EU Member States to submit national PQC transition roadmaps via the NIS Cooperation Group.

2030

High-Risk Migration

High-risk systems and critical infrastructure to complete PQC migration (EU target).

2035

Full Transition

Full transition to post-quantum cryptography for all systems (EU Recommendation).

Note: The EU Recommendation (2024/1101) is a recommendation, not a regulation. However, NIS2 and DORA require risk-appropriate cybersecurity measures — as quantum risk becomes established, this is expected to make PQC migration a practical necessity for many Austrian organisations.

Next Step

Work Through Your Cryptography
Roadmap With Peers.

The Quantum Reality Check — Roundtable on Cryptography. A focused format for Austrian corporate innovation leaders — no physics knowledge required. The focus: what does your organisation need to do, and in what order?

Invite-only. Limited places to keep the group focused and personal.