The Rise of Crypto Agility: Preparing for the Quantum Era

IBM Distinguished Engineer Jeff Crume discusses the critical need for 'crypto agility' to prepare for the quantum computing era, highlighting historical examples of obsolete cryptography and a roadmap for organizations.

Jeff Crume, Distinguished Engineer at IBM, speaking in front of a graphic illustrating a cycle of change.
Image credit: IBM· IBM

In the rapidly evolving world of technology, the only constant is change. This adage holds particularly true for cybersecurity, where the advent of quantum computing presents a significant, albeit future, threat to current cryptographic standards. Jeff Crume, a Distinguished Engineer at IBM, delves into this critical issue in a recent video, emphasizing the necessity of "crypto agility" to secure systems for the quantum era.

Understanding the Threat: Cryptography's Finite Lifespan

Crume begins by illustrating the cyclical nature of cryptographic algorithms. He highlights historical examples like DES (Data Encryption Standard), invented in 1977, which was the gold standard for many years but was eventually proven vulnerable and deprecated by 1998. Similarly, RC4, a widely used stream cipher invented in 1987, was later found to have significant weaknesses and was deprecated by 2013. These instances demonstrate that even robust cryptographic methods have a limited lifespan and will inevitably be superseded by more advanced techniques or due to discovered vulnerabilities.

The primary driver for this ongoing evolution is the relentless march of technological progress. As computing power increases, algorithms that were once considered secure can become susceptible to attack. The most significant impending shift, according to Crume, is the rise of quantum computers. These machines, with their fundamentally different approach to computation, are expected to break many of the asymmetric encryption algorithms currently in widespread use, posing a profound risk to data security.

Related startups

The full discussion can be found on IBM's YouTube channel.

The Rise of Crypto Agility: How to Secure Systems for the Quantum Era - IBM
The Rise of Crypto Agility: How to Secure Systems for the Quantum Era — from IBM

The Imperative of Crypto Agility

Given this predictable obsolescence of cryptographic algorithms, Crume stresses the importance of developing "crypto agility." This refers to the ability of an organization to efficiently and effectively update its cryptographic algorithms, protocols, and implementations. A system that is not crypto-agile will struggle to adapt when current standards become compromised or when new, more secure algorithms emerge.

The challenge lies in the sheer volume and complexity of cryptographic usage within modern organizations. Crume illustrates this with a diagram showing multiple applications, each relying on various cryptographic functions. When a cryptographic algorithm needs to be replaced, it often requires updates across numerous systems and applications. A modular and agile approach to cryptography allows for these updates to be made more seamlessly, reducing the risk of errors, downtime, and security breaches during the transition.

Discover, Evaluate, Prioritize, Remediate (DEPR)

To achieve crypto agility and prepare for the quantum threat, Crume outlines a strategic process that organizations must undertake:

  • Discovery: The first step is to understand the organization's current cryptographic inventory. This involves identifying all instances where cryptography is used, including the specific algorithms, key sizes, and their locations within systems and applications. Crume notes that many organizations lack a clear understanding of their entire cryptographic footprint.
  • Evaluation: Once discovered, each cryptographic instance needs to be evaluated. This assessment should determine the strength of the algorithm and key size against current and anticipated threats, including the potential impact of quantum computing. Organizations need to categorize their cryptography as quantum-safe, vulnerable, or needing further analysis.
  • Prioritization: Not all cryptographic instances pose the same level of risk. Organizations must prioritize remediation efforts based on the criticality of the data being protected, the potential impact of a compromise, and the likelihood of an attack. High-value assets and widely used algorithms should typically be addressed first.
  • Remediation: The final and most crucial step is to implement the necessary changes. This involves replacing vulnerable algorithms with more secure, quantum-resistant alternatives. Crume emphasizes that this process should be managed with an eye towards "crypto agility," meaning the systems should be designed to make future transitions easier. He suggests a modular approach where cryptographic functions are abstracted and can be updated independently of the core application logic.

The Quantum Computing Timeline and the Urgency of Action

While the exact timeline for when quantum computers will be powerful enough to break current encryption is still debated, the consensus is that it is not a matter of if, but when. Crume points out that organizations cannot afford to wait until quantum computers are a present threat. The process of discovering, evaluating, and replacing cryptographic algorithms is complex, time-consuming, and resource-intensive. Proactive planning and phased implementation are essential to ensure a smooth and secure transition.

The video highlights that organizations that fail to prepare for the quantum era risk significant security vulnerabilities, data breaches, and operational disruptions. By embracing crypto agility and following a structured approach to cryptographic inventory management, businesses can better position themselves to navigate the evolving threat landscape and maintain the integrity and confidentiality of their data in the face of future technological advancements.

© 2026 StartupHub.ai. All rights reserved. Do not enter, scrape, copy, reproduce, or republish this article in whole or in part. Use as input to AI training, fine-tuning, retrieval-augmented generation, or any machine-learning system is prohibited without written license. Substantially-similar derivative works will be pursued to the fullest extent of applicable copyright, database, and computer-misuse laws. See our terms.