The biggest risk to PQC migration is you (and other humans)
MP3•Episode home
Manage episode 494942340 series 3652091
Content provided by Cath Firmin. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Cath Firmin or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://ppacc.player.fm/legal.
As quantum computing inches closer to real-world impact, organizations can no longer afford to treat post-quantum cryptography as a future concern. In this episode of Shielded: The Last Line of Cyber Defense, host Johannes Lintzen speaks with Professor Bill Buchanan, OBE, FRSE, to examine what it takes to transition into the post-quantum era. They explore the importance of cryptographic agility, the myths around PQC performance, and why human error remains the biggest vulnerability in cybersecurity. From hybrid adoption to hardware integration and upcoming regulatory mandates, Bill offers a candid and practical look at how organizations can prepare for the next generation of encryption before it’s too late.
What You’ll Learn:
- Why cryptographic methods are near-perfect and humans are the real weakness
- How TLS exemplifies cryptographic agility (and why you should learn from it)
- What Apple vs the UK Government reveals about trust and end-to-end encryption
- Why hybrid approaches are more than a stepping stone—and how to do them right
- The real performance and key size implications of PQC (Hint: it’s not scary)
- How to think about certificates, signatures, and dual-key infrastructure
- What’s coming next: homomorphic encryption, multi-party computation, and privacy-preserving design
- Bill’s top 3 priorities for organizations starting their post-quantum journey
Professor Bill Buchanan, OBE, FRSE, is a cybersecurity professor at Edinburgh Napier University and one of the most recognized voices in applied cryptography and digital trust. With over 30 books, 400+ research papers, and multiple spin-out companies to his name, Buchanan has dedicated his career to bridging the gap between theoretical cryptography and real-world implementation. His work spans homomorphic encryption, digital identity, secure system design, and blockchain-based trust frameworks. As a passionate advocate for privacy, fairness, and resilience in digital systems, Buchanan has contributed extensively to shaping both academic research and public policy in cybersecurity. He regularly advises governments and organizations on the future of secure infrastructure in a post-quantum world and is a driving force behind efforts to improve cryptographic literacy and engineering practices. Known for his clear thinking, technical depth, and human-first approach to security, Buchanan remains a trusted voice in the global conversation on quantum readiness and digital transformation.
With the shift to post-quantum cryptography accelerating, Buchanan’s message is clear: crypto agility and system design, not just new algorithms, will define the next era of trust.
Your Roadmap to Quantum Resilience:
[04:55] Step 1: Address the Human Weak Link -
The cryptography may be bulletproof, but your people aren’t. Bill Buchanan emphasizes that most large-scale breaches don’t happen because of broken algorithms; they happen because of human error, poor design, or social engineering. Whether it’s a $1.4 billion hack or a misconfigured certificate, humans remain the biggest vulnerability. A truly quantum-secure strategy starts with investing in security-conscious design, reducing friction in authentication, and eliminating avoidable weak points. Key Question: Are your systems secure by design, or are they just relying on perfect human behavior?
[10:45] Step 2: Embrace Cryptographic Agility Through TLS -
Crypto agility isn’t theoretical; it’s working today. Buchanan highlights TLS as a mature, proven model that allows for graceful cryptographic upgrades through suite negotiation. Rather than waiting for a full system overhaul, organizations can build agility now by supporting multiple cryptographic algorithms and migrating incrementally. Agility lets you test, evolve, and deprecate without downtime or disruption. Key Question: Have you adopted TLS-style agility to allow for future upgrades without breaking your systems?
[16:45] Step 3: Stop Fearing PQC Performance -
Worried about latency or massive key sizes? Don’t be. Buchanan debunks the myth that post-quantum cryptography is too resource-intensive. NIST-approved algorithms like ML-KEM and ML-DSA perform on par with elliptic curve cryptography and better than RSA in many cases. Even the increased key sizes are well within modern bandwidth and storage capabilities. With PQC performance now optimized, the only thing slowing you down is outdated assumptions. Key Question: Are your security decisions based on current facts, or outdated fears?
[28:45] Step 4: Implement Hybrid Cryptography with Confidence -
PQC doesn’t have to be all or nothing. Hybrid schemes, where classical and post-quantum algorithms are used together, offer a safe and flexible transition path. Buchanan explains how hybrid key exchanges and dual-signed certificates allow you to maintain interoperability while testing and rolling out quantum-safe components. Just like TLS evolved over time, your infrastructure can too. Key Question: Have you identified where hybrid cryptography could enable early wins without full replacement?
[34:40] Step 5: Look Beyond PQC, Design for Privacy and Resilience -
Post-quantum security isn’t just about new math, it’s about building smarter systems. Buchanan challenges organizations to think bigger: from fully homomorphic encryption to secure enclaves and multi-party computation, the goal isn’t just secrecy, but trust and resilience. Encryption at rest and in transit is not enough. Security in processing is the next frontier. Key Question: Is your roadmap just about compliance, or are you designing for privacy, performance, and future-proof trust?
Episode Resources:
- Professor Bill Buchanan on LinkedIn
- Bill Buchanan’s Personal Website
- Johannes Lintzen on LinkedIn
- PQShield Website
Want exclusive insights on quantum migration? Stay ahead of the curve. Subscribe to Shielded: The Last Line of Cyber Defense on Apple Podcasts, Spotify, or YouTube Podcasts.
✔ Get insider knowledge from leading cybersecurity experts.
✔ Learn practical steps to future-proof your organization.
✔ Stay updated on regulatory changes and industry trends.
Need help subscribing? Click here for step-by-step instructions.
11 episodes