That power could unlock major advances in medicine, climate science, and research. But it also comes with a downside: the risk of breaking the encryption systems that protect our data every day, from bank transactions and health records to industrial secrets and sensitive communications. This potential turning point, often referred to as Q-Day, could arrive as early as 2030. And it raises a simple but critical question: how do we secure our systems before today’s protections become obsolete? One of the answers lies in post-quantum cryptography (PQC), which is a new generation of encryption designed to stand up to quantum computing and protect data for the long term. Here’s more.

 

What is the quantum threat and why does it matter for today’s cryptography?

A quantum computer isn’t just a faster version of a traditional one. It operates under the laws of quantum physics, using concepts like superposition and entanglement, which allow it to tackle problems that are simply out of reach for classical machines.

That’s exactly why current encryption methods are under threat. Today’s digital security relies on mathematical problems that classical computers can’t realistically solve. Quantum computers, however, could change the game and crack these protections far more easily.

The differences between classic and quantum computers

Learn out more

 

 

From around 2030 onward, today’s encryption could start to break down. Some attackers are already preparing for this future by harvesting encrypted data now, using a “store now, decrypt later” strategy. The idea is simple: collect data today, then decrypt it later once quantum capabilities are available, before post-quantum cryptography becomes widespread.

The good news? We still have a window of opportunity. Roughly five years to make the shift to PQC.

We have less than five years to move toward post-quantum cryptography.

Vivien Mura CTO
Orange Cyberdefense
 

Post-quantum cryptography today: where do we stand on international initiatives and standards?

The move toward post-quantum cryptography is already well underway, guided by solid and widely recognized international standards.

In 2024, the U.S. National Institute of Standards and Technology (NIST) finalized its first PQC standards, validating algorithms such as Kyber for encryption and Dilithium for digital signatures. These selections followed years of rigorous testing and global competition, ensuring they are robust against quantum attacks.

In Europe, agencies like ENISA and ANSSI are also calling for a proactive approach. France’s national cybersecurity agency, ANSSI, emphasizes the need to map cryptographic usage to identify vulnerabilities and adopt crypto-agility, the ability to switch quickly between cryptographic algorithms as standards evolve.

These PQC standards aren’t just recommendations. They’re a roadmap, which is essential for building the post-quantum security we’ll need tomorrow.

PQC + QKD: our dual strategy for the quantum era

Since 2017, our research teams have been working on two complementary pillars of quantum-safe security: Post-quantum cryptography (PQC), which is essential for large-scale migration Quantum key distribution (QKD), designed for the most sensitive use cases.

Through projects like ParisRegionQCI and FranceQCI, as well as bilateral partnerships, we’ve already demonstrated how these technologies can be integrated into existing networks. This work directly feeds into Orange Business solutions and Orange Cyberdefense’s approach, combining crypto-agility, network interoperability, and practical quantum-safe roadmaps for our customers.

How to prepare for a PQC migration

Preparing for post-quantum security is a bit like reinforcing a building before an earthquake: the earlier you act, the more resilient the structure becomes. Here are a few essential steps. This pragmatic, step-by-step approach lets organizations start building quantum-safe security today, without waiting for the crisis to hit.

What changes?

How to prepare for a PQC migration

Preparing for post-quantum security is a bit like reinforcing a building before an earthquake: the earlier you act, the more resilient the structure becomes. Here are a few essential steps. This pragmatic, step-by-step approach lets organizations start building quantum-safe security today, without waiting for the crisis to hit.

Our action plan
for a successful migration

Orange Cyberdefense is already supporting organizations through this transformation with a proven methodology called Quantum Safe Migration. The goal is simple. Protect critical data today while ensuring full continuity of business operations.

Right content

Our approach integrates crypto-agility to ensure that systems remain resilience as cryptographic standards continue to evolve.

Benjamin Thomas
Cybersecurity Consultant, Orange Cyberdefense

Our action plan

for a successful migration

Right content

Our approach integrates crypto-agility to ensure that systems remain resilience as cryptographic standards continue to evolve.

Benjamin Thomas
Cybersecurity Consultant, Orange Cyberdefense

Orange Cyberdefense is already supporting organizations through this transformation with a proven methodology called Quantum Safe Migration. The goal is simple. Protect critical data today while ensuring full continuity of business operations.

The key steps in our action plan: 
  • Anticipate. Start now with a comprehensive risk assessment and define a clear, budgeted roadmap for the transition to post quantum cryptography.
     
  • Raise awareness and mobilize. Raise awareness and mobilize. This is also a cultural challenge. Leadership teams and business units must understand why this transition matters. That requires mobilizing post quantum security experts who can translate technical complexity into clear strategic value.
     
  • Inventory and map. Identify all cryptographic assets across the organization, including keys, certificates, signatures, and protocols, as well as how they are used internally and with partners.
     
  • Integrate crypto-agility. Adopt a flexible approach that makes it possible to replace an algorithm quickly when it becomes vulnerable, without disrupting operations.
     
  • Remediate. Integrate hardware and software that are compatible with post quantum cryptography, reduce existing cryptographic debt, and rely on networks and services that already embed this level of protection.
 

What does this look like in practice?

 

In the Greater Paris metropolitan area, Orange Cyberdefense has deployed a secure network called Ring. This network enables public authorities, private organizations, and strategic companies to protect their most critical communications against both current and future threats.

Quantum threat: anticipate the technological tsunami

Read our white paper

 

Orange Cyberdefense
a strategic partner for the post-quantum era

That is exactly what Orange Cyberdefense delivers by combining deep cybersecurity expertise, cryptographic innovation, and powerful infrastructure. Our ambition is clear: protect sensitive data over time

Right content
Bloc Exergue Item

Preparing for the quantum revolution cannot be improvised. It requires specialized expertise, robust infrastructure, and a long term vision.

Orange Cyberdefense

a strategic partner for the post-quantum era

Right content
Bloc Exergue Item

Preparing for the quantum revolution cannot be improvised. It requires specialized expertise, robust infrastructure, and a long term vision.

That is exactly what Orange Cyberdefense delivers by combining deep cybersecurity expertise, cryptographic innovation, and powerful infrastructure. Our ambition is clear: protect sensitive data over time

Orange Cyberdefense, a European leader in cybersecurity
Bloc Exergue Item
36 detection centers

around the world.

Bloc Exergue Item
24h a day

Constant monitoring of emerging threats.

 

Bloc Exergue Item
3,200

experts in 12 countries in a a private CERT (Computer Emergency Response Team)

Bloc Exergue Item
50 K

organizations and nearly 500,000 individuals already protected by Orange Cyberdefense.

 
 
 

We support leading organizations as they move toward controlled and sustainable post quantum security.

Our strengths

  • Recognized expertise in cybersecurity and post quantum cryptography.

  • Research teams developing robust, ready to deploy solutions.
     
  • Secure infrastructures supported by a sovereign European cloud.
     
  • Tailored support for every sector, whether healthcare, public administration, or strategic industries.

 

 

Turning the quantum revolution into a strategic opportunity


The quantum revolution is already underway, and with it comes an urgent need to act. Migrating to post quantum cryptography is not a technological luxury. It is a critical step to secure strategic data before today’s protections become obsolete.

Right content
Bloc Exergue Item

In short, acting now means securing the future. And with Orange Cyberdefense, this transition becomes not just possible, but truly strategic.

Right content
Bloc Exergue Item

In short, acting now means securing the future. And with Orange Cyberdefense, this transition becomes not just possible, but truly strategic.

The quantum revolution is already underway, and with it comes an urgent need to act. Migrating to post quantum cryptography is not a technological luxury. It is a critical step to secure strategic data before today’s protections become obsolete.

When anticipated early, the transition to post quantum cryptography turns the risk of Q Day into three major benefits:

  • Long-term protection of critical assets. Sensitive data is protected proactively, hidden vulnerabilities in legacy systems are reduced, and crypto agility ensures lasting resilience.
     
  • Regulatory readiness and stronger digital sovereignty. Organizations can prepare now for future European regulations and reinforce digital sovereignty, particularly through the use of Orange’s sovereign cloud.
     
  • Gain a Competitive advantage. Organizations that move early will lower future compliance costs and position post quantum security as a powerful driver of trust and innovation.