TomorrowLab turns Living Tomorrow’s inspiration into action, helping businesses, cities, and governments shape their innovation vision.
Learn more about TomorrowlabPost-quantum cryptography: waiting isn’t an option

Quantum computers constitute a real threat to standard encryption. Given the harmful impact, Proximus experts Peter Spiegeleer and Kristof Spriet point out the need to switch to post-quantum cryptography (PQC) promptly.
Encryption algorithms protect confidential data and communication, ranging from e-mail messages to medical records and financial statements. “Cryptography is at the foundation of every security architecture,” says Peter Spiegeleer, Enterprise Security Architect at Proximus. “It’s present in all technical security checks; either a security service is a cryptographic service, or service components communicate with each other via underlying encryption algorithms. Threats or new vulnerabilities in the field of cryptography are relevant for every organization because they have a direct impact on the confidentiality and integrity of data or the authentication of communicating parties.”

Anticipating a future threat
A safe SD-WAN and SASE architecture uses standard cryptographic algorithms like ECC and RSA-2048. These are based on mathematical problems that are difficult to solve. Such asymmetric cryptography relies on those problems to make use of one-way functions, that is, functions that are easy to calculate in one direction, but whose inverse is mathematically difficult to calculate. “RSA, for example, is based on factoring large numbers, while other algorithms rely on discrete logarithms,” Peter explains.
Asymmetric algorithms are difficult to solve, but not impossible to crack. “Academics Peter Shor and Lov Grover developed algorithms three decades ago that break the cryptographic algorithms commonly used for key exchange and digital signatures to this day,” Peter recalls. “The current generation of quantum computers lacks the scale to decrypt information using the Shor and Grover algorithms. But the further development of quantum computers makes the threat acute.”
“Both state actors and espionage groups are already anticipating quantum computers. They are storing encrypted data now to crack it later as soon as the technology is available.”
Data integrity in quantum computing
“Quantum computers make use of qubits which, due to their unique properties such as superposition, interference and entanglement, are capable of working much more efficiently and faster than the most powerful standard supercomputers for certain mathematical calculations,” says Kristof Spriet, Smart Network Solutions Lead at Proximus NXT. “Especially calculations in which probability and parallel processing play a large role. An attacker with a quantum computer could, in time, decrypt encrypted information, affect the reliability of digital signatures and damage the integrity of business communication, among other things.”
Cryptographically relevant quantum computers are being developed rapidly now. When they will appear on the market is difficult to estimate precisely. Gartner expects that the progress in quantum computing will make asymmetric cryptography unsafe by 2029 and fully breakable by 2034. “That may seem far off, but it concerns every business today. Data that are still adequately secure at the moment will not be after the arrival of quantum computers. Hackers are already anticipating this. They are saving information that we communicate, process or store now, to crack it later with a quantum computer,” says Kristof.
That tactic – ‘harvest now, decrypt later’ – compels organizations and businesses to take action now. Legislatures will also contribute to that urgency. Peter Spiegeleer: “The American National Institute of Standards and Technology (NIST) stipulates that in 2030, most standards for public key cryptography – including ECDSA, RSA, EdDSA – are to be discouraged, and will be disallowed as of 2035. In addition, we assume that the NIS2 legislation will impose specific rules in the foreseeable future, among other things. So sitting back is not an option.”
“NIST foresees that standard cryptographic primitives like RSA and ECDSA will be disallowed after 2035. Together with stricter regulations like NIS2, that means one thing: it’s necessary to take action now.”
Post-quantum encryption algorithms
The key to proactively safeguarding data and communication lies in the implementation of post-quantum encryption algorithms in both hard- and software. Post-quantum cryptography is the collective name for all forms of cryptography on classical computers that will remain secure after the arrival of cryptographically relevant quantum computers.
In 2016, NIST initiated a Post-Quantum Cryptography project in which it encouraged cryptographers and academics to develop algorithms that cannot be cracked with the aid of either standard computers or quantum computers. “Experts from dozens of countries submitted approximately eighty candidate algorithms that met the requirements that NIST had set,” Peter explains. “After a third round in 2024, NIST ultimately selected three algorithms as an initial basis for its post-quantum security standards: ML-KEM, ML-DSA and SLH-DSA.”
Quantum Readiness Assessment
That milestone provided organizations with a framework to prepare for the migration towards post-quantum cryptography. For Proximus it also constituted the starting signal for the rollout of its internal post-quantum procedure. That started with a Quantum Readiness Assessment. “That exercise consisted of a series of workshops and interactive sessions to improve and share our insights and preparedness. It resulted in a quantum-safe heatmap, specific areas for action and a step-by-step plan,” Peter clarifies.
In the second phase, which is starting now, the experts from Proximus are converting the insights acquired into architecture patterns and the appropriate migration techniques. The cryptographic Bill of Materials (cBOM) is a standardized overview that maps out exactly which cryptographic components (algorithms, keys, protocols) are used where in a network or application. Kristof stresses that this inventory is crucial. “It’s on the basis of the CBOM, among other things, that a business impact analysis will determine where the priorities for migration lie. We make use of automation tools and analyze the network traffic to identify all the vulnerabilities and detect where updates or migrations are most strongly indicated. Patient data, for example, have a higher priority than messages that you send today, but that in a few years – when cryptographically-relevant quantum computers arrive – will be outdated and of little value.”
cBOM and cryptographic agility
The cBOM includes all the cryptographic assets, ranging from algorithms to key lengths to certificates, applied in software, hardware and the cloud. The cBOM helps organizations ensure that the cryptography is always standards-compliant. The communication and IT infrastructure of organizations evolves constantly. So you, as a business, need to manage the risks not just once, but constantly.
Kristof points out the importance of cryptographic agility or crypto-agility. “NIST assesses the three selected post-quantum cryptographic algorithms to be the safest, most reliable and most practical. It bases this on the current knowledge about a future threat. There is a chance that those PQC algorithms will evolve or that new mechanisms will supplement or even replace the selection. Cryptographic agility ensures that you implement the cryptographic protocols, products and systems in a way that makes it possible to still make changes with minimal effort.”
Valuable insights
Proximus’ own post-quantum assessment provided a wide range of new insights. Peter: “Such a process offers the opportunity to examine your entire cryptography. Inevitably that exercise will reveal previously unknown vulnerabilities. As a business, you are always a link within a much wider network. It comes down to auditing your providers in the area of cryptography too to ensure that they likewise operate in line with the PQC strategy.” According to Kristof, that applies in the fields of both communication and hardware. “For example, you want to avoid a situation in which your SD-WAN provider still uses outdated algorithms. I also advise striving for continuity within hybrid environments and cloud databases.”
Conclusion
Both experts agree that the road to quantum security and cryptographic agility involves considerable effort. “Doing nothing is not an option, however. I advise businesses and organizations to begin the inventory process now and lay the foundation for the actions to be taken. It’s a process that we support from Proximus NXT with our own experience in order to achieve best practices.”

Prepare your organisation today for the post-quantum era.
Join the breakout session “Approaching Q-Day: closing the cybersecurity gap” with Peter Spiegeleer at Think NXT and discover how to future-proof your data security.
Thursday 27 November 2025
Brussels Gate, Groot-Bijgaarden

Peter Spiegeleer
Peter Spiegeleer is Enterprise Security Architect at Proximus, guest lecturer at the Solvay School of Economics and an expert in the Cybersecurity Coalition.

Kristof Spriet
Kristof Spriet is Smart Network Solutions Lead at Proximus NXT. His team is responsible for the development of solutions such as SD-WAN, internet and international data connectivity.
Latest insights & stories

Strategy and security in the multicloud
Companies are increasingly choosing a multicloud approach: a combination of various public clouds, either alone or alongside private cloud or on-premise infrastructure. But that raises significant maintenance and security management challenges.

How smart water systems redefine sustainability in large buildings

7 practical lessons from over 150 AI projects
The implementation of AI is still a bumpy road in many organizations. Anyone who wants to be successful must look beyond the hype. Experts Benoît Hespel and Dirk Luyckx share the 7 most important lessons from over 150 AI projects.


