Blog de Zscaler
Reciba en su bandeja de entrada las últimas actualizaciones del blog de Zscaler
SuscríbasePreparing to Meet the Challenges of the Post-Quantum Cryptography Era
Introduction to Post-Quantum Computing
Quantum computing is set to redefine the world's computational capabilities. Traditional computers manipulate data in binary 0s and 1s, but quantum computers allow for a single quantum bit (qubit) to represent multiple states simultaneously. With such power, tasks deemed computationally infeasible, like factoring large numbers, will be solved exponentially faster.
Hyperscalers are making great strides in quantum computing due to their extensive infrastructure, global reach, and expertise in advanced computing. Some examples are shown below:

While quantum computing opens up incredible opportunities, it also presents critical security challenges including the ability to break classical cryptographic algorithms used today, threatening everything from personal privacy to national security.
Challenges Quantum Cryptography Presents
Here’s the topline issue: modern key exchange and digital signature mechanisms used in TLS, SSH and IPSec will be vulnerable to attacks by quantum computers. Attackers can capture traffic now, store it and decrypt it later once quantum computing capability becomes available.
Quantum computing could significantly undermine the cryptographic underpinnings of today's digital security, including systems relying on widely adopted algorithms such as RSA and Elliptic Curve Cryptography (ECC). The challenges of the post-quantum cryptography can be broken down into four key areas:
- Harvest Now, Decrypt Later (HNDL): Malicious actors can capture encrypted data today so that it can be decrypted later using quantum computing. Sensitive information with long-term relevance—government secrets, financial records, or medical data—becomes vulnerable in this paradigm.
- Key Limitations of Classical Cryptography: Quantum computers are uniquely suited to breaking popular algorithms such as RSA and ECC, whose security relies on factoring large prime numbers or solving discrete logarithmic problems.
- Operational Overhead of Transitioning to Post-Quantum Cryptography (PQC): Implementing post-quantum cryptography involves compatibility, performance, and interoperability challenges. For example, PQC algorithms tend to have larger key sizes, increasing bandwidth and latency considerations.
- Dependencies on PQC Standardization: Although NIST has announced post-quantum resilient algorithms like ML-KEM and digital signature counterparts, the adoption of these standards into global systems and protocols (e.g., TLS) is an ongoing process.
These challenges emphasize the need for proactive security measures and transitioning towards quantum-resilient cryptography.
Zscaler: Preparing our Customers for Post-Quantum Cryptography (PQC)
Our customers' trust is dependent upon the efficacy of the security capabilities we provide. To prepare for a PQC world, we have embraced a proactive approach to address quantum computing challenges. Here are the key initiatives we have started at Zscaler to tackle the challenges of PQC:
Quantum-Safe Cryptography Readiness
Zscaler is closely monitoring the standardization processes for post-quantum cryptographic algorithms, ensuring its cloud infrastructure is prepared for seamless integration. Algorithms like ML-KEM, which offer high performance and resistance against quantum attacks, are evaluated comprehensively for security robustness and efficiency.
Hybrid Cryptographic Systems
To mitigate risks associated with potential vulnerabilities in early PQC algorithms, Zscaler supports hybrid systems that combine classical algorithms like ECC with post-quantum approaches. The hybrid design provides extra assurance, acting as a bridge towards entirely quantum-safe cryptographic methods.
Scalable Implementation
Zscaler offers a scalable vehicle for deploying post-quantum cryptographic protections for customers' traffic. As Zscaler already acts as a secure gateway for user traffic, encrypting data at global scale, it is primed to integrate quantum-resilient protocols. With its ability to refine real-time policy enforcement and enable deep visibility, customers can smoothly transition to advanced encryption techniques.
Global Collaboration and Compliance
Zscaler actively collaborates with consortia, standardization entities like NIST, and regulatory bodies worldwide to ensure adherence to the best practices in PQC adoption. Through efforts like FIPS certifications for post-quantum algorithms, Zscaler helps customers meet the requirements of security-sensitive industries.
Customer and Partner Enablement
Zscaler facilitates this transition by offering resources and education on implementing quantum-safe systems. As part of its roadmap, Zscaler supports customers with feedback loops and enablement tools to ease their readiness for the post-quantum cryptography era.
Innovation and Future-Proofing
Zscaler is committed to continuous research, ensuring it remains at the forefront of security innovation. By building our platform for crypto-agility, Zscaler ensures that changes in cryptographic standards and new advances in PQC can be adopted with minimal operational disruption. We are working currently to ensure that all components of our platform, from Zscaler Client Connector, ZIdentity and Cloud Connector and all our product offerings are PQC-ready.
Today, we’re excited to launch interactive reporting that provides visibility into post-quantum ciphers. This interactive report available in the Zscaler Admin Portal provides details on top PQC key exchange algorithms as well as PQC vs. classical key exchange used across the 500 billion transactions the Zero Trust Exchange processes daily:

Zscaler customers can learn more about our approach to a quantum-safe future by attending a breakout session at ZenithLive 25 titled “Securing the Future: Preparing for the Quantum Era of Cybersecurity.” You can register for the June 4th session in Las Vegas or June 18 in Prague. The session will provide an in-depth view into Zscaler's comprehensive roadmap and resilient approach in a post-PQC world.
Conclusion
Quantum computing represents an unprecedented shift in computational capability, one that holds both vast potential and significant security challenges. Zscaler's commitment to adopting post-quantum cryptography ensures that enterprises can confidently transition to the quantum computing era while maintaining a robust security posture. By integrating standards-based cryptographic protections, offering hybrid systems, and enabling scalable implementation of quantum-safe ciphers across the Zero Trust Exchange, Zscaler is building the foundation for a secure digital future.
¿Este post ha sido útil?
Reciba en su bandeja de entrada las últimas actualizaciones del blog de Zscaler

Al enviar el formulario, acepta nuestra política de privacidad.