SEALSQ CEO Urges PQC, SKA and QKD Adoption to Counter 10-15 Year Quantum Threat
SEALSQ CEO Carlos Moreira urged firms at a New York quantum security event to migrate to post-quantum cryptography by deploying PQC, secure key agreement, and quantum key distribution solutions. He cautioned that quantum computers could break RSA within 10-15 years, enabling attackers to collect and decrypt long-lived sensitive data later.
1. CEO Presentation at Quantum Security Event
SEALSQ CEO Carlos Moreira spoke at a New York quantum security gathering, stressing the need for immediate transition to post-quantum protection. He highlighted the urgency of removing vulnerable cryptography from high-value systems before quantum capabilities mature.
2. Three-Pillar Post-Quantum Strategy
Moreira outlined three complementary approaches: Post-Quantum Cryptography (PQC) standards finalized in August 2024, Secure Key Agreement (SKA) for dynamic symmetric key negotiation, and Quantum Key Distribution (QKD) for high-assurance environments with infrastructure constraints.
3. Quantum Threat Timeline and Harvesting Risk
He warned that quantum computers capable of breaking RSA or elliptic-curve cryptography could emerge in 10-15 years, but attackers can already harvest encrypted data today to decrypt later, posing significant risks for data with long confidentiality lifetimes.
4. Priority Sectors and Crypto-Agility Imperative
Government, defense, critical infrastructure, financial, healthcare and large enterprise platforms were named top migration priorities. Moreira emphasized crypto-agility—comprehensive inventory, planning, hardware roots of trust and robust key management—as essential for successful post-quantum transformation.