The transition to post-quantum cryptography (PQC) is not a theoretical future event. It is the largest cryptographic migration in modern history, already shaping product roadmaps, standards bodies, and infrastructure planning across servers, AI datacenters, telecom, industrial automation, and critical systems. In this interview, we sat down with Mamta Gupta, a leader driving Lattice’s quantum-safe security strategy, to discuss Quantum Day (Q-Day) readiness, crypto-agility, Security Proto...
One of the more exciting developments now happening in the high-tech world is the work being done to enable quantum computing. After decades of theoretical discussion and development, the last few years have shown tangible progress in this radically different (and enormously complex) new method of computing. Quantum computers essentially perform calculations by flipping the electrical charge of individual atoms and allowing them to simultaneously exist in more than one state through a process ca...
Quantum computing is no longer just a concept confined to research labs. Thanks to rapid progress in both hardware and algorithms, the risk to today’s cryptographic systems is steadily increasing. In 2025, Google’s 105-qubit Willow chip and Microsoft’s Majorana 1 processor demonstrated that scalable quantum systems are moving closer to practical reality. Industry experts now predict that quantum computers capable of breaking RSA-2048 encryption could arrive as early as 2030 to ...
Recent advancements in quantum computing have made post-quantum cryptography (PQC) more necessary than ever before. There is an immediate need for developers across industries to strengthen their computing ecosystem against the heightened risk and uncertain capabilities of quantum-enabled attacks. The challenge? There’s not yet a standard, comprehensive model for ensuring post-quantum security. Traditionally, developers have been able to create standards and best practices in response to ...
When it comes to embedded devices, security has always been a big topic of interest. Unfortunately, up until now, much of the attention has been for the wrong reasons. Insecure edge computing and IoT devices have become notorious examples of how the weakest (and often overlooked) link in the chain can lead to big security breaches. Thankfully, there are now important new options for ensuring that critical features such as hardware root-of-trust, integrated cryptography, firmware resiliency and m...
On August 13, 2024, the US National Institute of Standards and Technology (NIST) released the eagerly awaited Post-Quantum Cryptography (PQC) standards. These standards introduce three new encryption algorithms designed to secure systems against both classical and future quantum computer attacks, providing a necessary evolution from RSA and ECC asymmetric encryption algorithms. In this blog, we outline the impact of these standards and the essential steps for system designers to transition to PQ...