{"id":104400,"date":"2025-03-10T06:18:00","date_gmt":"2025-03-10T06:18:00","guid":{"rendered":"https:\/\/www.cloudcomputing-news.net\/?p=104400"},"modified":"2025-03-10T07:09:32","modified_gmt":"2025-03-10T07:09:32","slug":"avishai-sharlin-amdocs-the-rise-of-post-quantum-computing-in-the-fight-between-good-and-evil","status":"publish","type":"post","link":"https:\/\/www.cloudcomputing-news.net\/news\/avishai-sharlin-amdocs-the-rise-of-post-quantum-computing-in-the-fight-between-good-and-evil\/","title":{"rendered":"Avishai Sharlin, Amdocs: The rise of post-quantum computing in the fight between good and evil"},"content":{"rendered":"\n<p>Recent advancements in quantum computing, including improvements in qubit count, coherence time and gate fidelity, have yet to provide a practical edge over classical computers.<\/p>\n\n\n\n<p>That was the conclusion of <a href=\"https:\/\/www.forrester.com\/report\/the-state-of-quantum-computing-2024\/RES181803\">Forrester\u2019s 2024 Quantum Computing Trends<\/a> report.<\/p>\n\n\n\n<p>Quantum systems remain experimental and are unable to deliver the large-scale results needed to rival traditional computing methods. So far, Forrester analysts believe that, although there has been massive progress, there still hasn\u2019t been a genuine breakthrough with the technology. But it\u2019s only a matter of time. When that breakthrough does come it will bring with it an abundance of opportunities, as well as challenges, including dangerous new cyber threats. The <a href=\"https:\/\/globalriskinstitute.org\/publication\/2024-quantum-threat-timeline-report\/\">Global Risk Institute<\/a> estimates that by 2030 there will be an 11% to 31% probability that quantum computers will be able to crack the most prevalent cryptographic methods.<\/p>\n\n\n\n<p>Many experts predict that real-world, widespread applications of quantum computing are still at least a decade away, but it seems to be inevitable. So much so that the industry is already talking about Post-Quantum Computing (PQC).&nbsp;&nbsp;&nbsp;<\/p>\n\n\n\n<p>This refers to the era of computing that will follow the widespread use of quantum computers, particularly in terms of cryptography. As quantum computers become more powerful, they will be able to break current encryption methods widely used for securing data online. PQC focuses on developing new cryptographic algorithms that are secure against quantum attacks.<\/p>\n\n\n\n<p>These new algorithms, known as post-quantum cryptography, aim to create encryption systems that will remain secure even when quantum computers are capable of solving complex mathematical problems that classical computers cannot. The field is crucial because it prepares current cryptographic systems for the arrival of quantum computers and ensures that data remains protected in a quantum-enabled world.<\/p>\n\n\n\n<figure class=\"wp-block-image alignright size-large is-resized\"><img decoding=\"async\" src=\"data:image\/gif;base64,R0lGODlhAQABAIAAAAAAAP\/\/\/yH5BAEAAAAALAAAAAABAAEAAAIBRAA7\" data-src=\"https:\/\/www.cloudcomputing-news.net\/wp-content\/uploads\/2025\/03\/Amdocs-Avishai-Sharlin-1024x846.jpg\" alt=\"\" class=\"wp-image-104404 lazyload\" style=\"width:455px;height:auto\"\/><noscript><img fetchpriority=\"high\" decoding=\"async\" width=\"1024\" height=\"846\" src=\"https:\/\/www.cloudcomputing-news.net\/wp-content\/uploads\/2025\/03\/Amdocs-Avishai-Sharlin-1024x846.jpg\" alt=\"\" class=\"wp-image-104404 lazyload\" style=\"width:455px;height:auto\" srcset=\"https:\/\/www.cloudcomputing-news.net\/wp-content\/uploads\/2025\/03\/Amdocs-Avishai-Sharlin-1024x846.jpg 1024w, https:\/\/www.cloudcomputing-news.net\/wp-content\/uploads\/2025\/03\/Amdocs-Avishai-Sharlin-300x248.jpg 300w, https:\/\/www.cloudcomputing-news.net\/wp-content\/uploads\/2025\/03\/Amdocs-Avishai-Sharlin-768x634.jpg 768w, https:\/\/www.cloudcomputing-news.net\/wp-content\/uploads\/2025\/03\/Amdocs-Avishai-Sharlin-1536x1268.jpg 1536w, https:\/\/www.cloudcomputing-news.net\/wp-content\/uploads\/2025\/03\/Amdocs-Avishai-Sharlin-2048x1691.jpg 2048w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/noscript><\/figure>\n\n\n\n<p>Avishai Sharlin, division president, product and network at multinational tech firm <a href=\"https:\/\/www.amdocs.com\/\">Amdocs<\/a>, believes that PQC will likely take a big step forward in 2025 as businesses and governments start adopting Quantum-Safe encryption to secure their data.&nbsp;<\/p>\n\n\n\n<p><strong>National Institute of Standards and Technology<\/strong><\/p>\n\n\n\n<p>In August 2024, the US Department of Commerce&#8217;s <a href=\"https:\/\/www.nist.gov\/news-events\/news\/2024\/08\/nist-releases-first-3-finalized-post-quantum-encryption-standards\">National Institute of Standards and Technology (NIST)<\/a> officially finalised the first set of encryption algorithms designed to withstand the potential threats from quantum computers. These include algorithms like Kyber (for key exchange), NTRU (also for key exchange) and FrodoKEM. These standards mark a significant step in securing digital communications and data against the advancements in quantum computing, which have the potential to break current cryptographic systems like RSA and ECC.<\/p>\n\n\n\n<p>\u201cWith the NIST having finalised the key algorithms needed for PQC, companies will soon be integrating these into their security systems,\u201d Sharlin says. \u201cThe move will also require updates like Java 21+, which is essential for managing quantum-safe encryption keys. For industries that deal with sensitive information, transitioning to quantum-resistant tech will be critical in staying ahead of emerging cybersecurity threats.\u201d<\/p>\n\n\n\n<p>NIST says the three new standards are built for the future. \u201cQuantum computing technology is developing rapidly,\u201d a NIST spokesperson says. \u201cAnd some experts predict that a device with the capability to break current encryption methods could appear within a decade, threatening the security and privacy of individuals, organisations and entire nations.\u201d<\/p>\n\n\n\n<p>Under Secretary of Commerce for Standards and Technology and NIST Director Laurie E. Locascio, says: \u201cQuantum computing technology could become a force for solving many of society\u2019s most intractable problems, and the new standards represent NIST\u2019s commitment to ensuring it will not simultaneously disrupt our security.<\/p>\n\n\n\n<p>\u201cThese finalised standards are the capstone of NIST\u2019s efforts to safeguard our confidential electronic information.\u201d<\/p>\n\n\n\n<p>Sharlin agrees these new standards are crucial. \u201cI think it&#8217;s very significant,\u201d he explains. \u201cFirst of all, now there is a standard you can ask or demand the industry to complies with it. This is important because then you can say &#8216;by this time, I&#8217;m expecting you to support this standard and this protocol, and by that time, I&#8217;m expecting you to step up to the next level&#8217; and so on.&nbsp;<\/p>\n\n\n\n<p>&#8220;So the fact that the industry will start to align is very important. And if those standards didn\u2019t exist, and you had nothing to align to, it would be more like sounding the alarm without a real panacea &#8211; without anything that can assist you to solve it.&nbsp;<\/p>\n\n\n\n<p>&#8220;Then you&#8217;d see hybrid solutions, proprietary solutions, or ad hoc solutions trying to bridge a gap. Now that there is a standard, now that you know that you can adopt it, I believe that you&#8217;ll see the different vendors starting to align around it.\u201d<\/p>\n\n\n\n<p>But there are many challenges that organisations face in trying to transition to post quantum computing and in integrating quantum safe encryption.<\/p>\n\n\n\n<p>\u201cI would say that everything starts with understanding that there is a threat,\u201d Sharlin explains. \u201cMany organisations are saying quantum computers will come only in 2030, maybe even later.&nbsp;<\/p>\n\n\n\n<p>\u201cYou can hear some of the mega players in the market saying \u2018yes, it&#8217;s a threat but you still have many, many years before it will come, so, for now you can relax a bit&#8217;. I think it starts there.<\/p>\n\n\n\n<p>\u201cThe first thing an organisation should do is to understand that the threat is real and it&#8217;s near. It&#8217;s near in the sense that it&#8217;s coming and relatively fast.&nbsp;<\/p>\n\n\n\n<p>\u201cSecondly, assuming we have the awareness, what can be done? You need to map your applications. You need to understand how big of a threat it is, and you need to understand what encryption algorithms are being used today, and in what shape and form. Do I use Java? Do I use Kubernetes? And then, for those, I will need different methods. If my software runs on Kubernetes, I will need the new release of Kubernetes to support the PQC algorithms that can assist me. If I&#8217;m running Oracle JDK, I will need the latest release of the software.&nbsp;<\/p>\n\n\n\n<p>\u201cIn general, I need to know what I have. I need to map my applications and my working floor and my working protocols, and I will need to set a clear understanding of what needs to be done for each of them.&nbsp;<\/p>\n\n\n\n<p>\u201cWe know that some of those elements are not available on the market today. But we talk about awareness, we talk about mapping, and we also need to understand that at a given point I will need to start implementing it. So I have to know what needs to be implemented and when it&#8217;s available in the market so I can adopt it.&nbsp;<\/p>\n\n\n\n<p>\u201cIf I need now to refactor my entire applications, it&#8217;s a mega effort, and therefore you&#8217;re starting to see that putting aside the awareness and the mapping and everything it&#8217;s a big drill. It&#8217;s something similar to what happened in the year 2000. People need to convert and need to go through the entire set of applications to see how they can adopt themselves to the post quantum computing era.&#8221;<\/p>\n\n\n\n<p>There will be an increasing need for relevant skills that are scarce in the market today. Education and centres of excellence will be required to help organisations prepare, according to Sharlin.<\/p>\n\n\n\n<p>&#8220;The next big issue is to start building your skills,&#8221; he explains. &#8220;So putting aside the awareness you need the skill set to be ready once the relevant software is available, and then you need to put a plan in place. So I would call 2025 the year that you need to map your applications. Understand where the weak points are, map the dependencies, the processes, and get the organisation starting to align and to map what needs to be fixed, which applications. What is the priority? When do we believe things will happen in terms of the relevant software to support it?&nbsp;<\/p>\n\n\n\n<p>&#8220;And this is preparation. In some pockets, you already start to see PQC solutions, and then it means that you can start experimenting with them, train your people and understand the implications around.&#8221;<\/p>\n\n\n\n<p><strong>The risk factor<\/strong><\/p>\n\n\n\n<p>So is this something that all organisations should be concerned about? Sharlin believes that governments and the military will be the first to adopt PQC, making sure that the data that they store and use is protected.<\/p>\n\n\n\n<p>\u201cThen you&#8217;ll go into the very important heavy lifting secured environments, such as insurance and banking, definitely the telcos,\u201d he says. \u201cI see it coming, but a person working in a very small shop will be the last priority. Enterprises, though, will be prioritised by the risk factor.<\/p>\n\n\n\n<p>&#8220;We need to remember that majority of the risk lies not with the new startups that started their journey recently, probably with the latest and greatest technology. It lies with the heavy lifting enterprises that are using many applications with old versions of Java and old versions of different encryption technologies. Those will need to be changed.&#8221;<\/p>\n\n\n\n<p>Cybersecurity is one of the most frustrating areas to work in, according to Sharlin, because every day you&#8217;re waking up to a new threat.&nbsp;<\/p>\n\n\n\n<p>\u201cMaybe one threat a day would be a good day,\u201d he says. \u201cUsually it&#8217;s like 100 new threats every day. I don&#8217;t see it ending. The threats are there and even bigger threats are coming from nations, rather than just individuals. Threats are becoming harder to stop. The state of mind of a cybersecurity should that there will be a penetration. Therefore, you need to understand what happens once it is revealed.&nbsp;<\/p>\n\n\n\n<p>\u201cThis dictates the way you operate and the way you protect your assets. This is something that quantum computing is going to interrupt, for sure. All the virtual currencies. All of them are using encryption. This can be broken. Suddenly, it&#8217;s like someone getting access to your bank account. So those will also need some changes to be protected.&nbsp;<\/p>\n\n\n\n<p>\u201cI&#8217;m not saying protecting them is not doable, but it will need some attention as well. The Bitcoins of the world will need to adopt themselves into this era as well.\u201d<\/p>\n\n\n\n<p>Post-quantum computing is certainly expected to be able to help keep companies and their data secure as the prevalence of quantum commuting and associated attacks increase. But it will just be a new, and important tool, in the CSO&#8217;s toolbox. Cybersecurity teams and their expertise will remain essential.<\/p>\n\n\n\n<p>It\u2019s a fight between good and evil, according to Sharlin. &#8220;The work is not over,&#8221; he warns. &#8220;And it won\u2019t end with PQC, because not everybody will migrate in time, and there will still be many gaps that can be exploited, maybe not in that area &#8211; maybe in others. So the cyber is not going to disappear.\u201d<\/p>\n\n\n\n<p>Photo by <a href=\"https:\/\/unsplash.com\/@attentieattentie?utm_content=creditCopyText&amp;utm_medium=referral&amp;utm_source=unsplash\">Attentie Attentie<\/a> on <a href=\"https:\/\/unsplash.com\/photos\/man-standing-and-walking-going-on-boxing-ring-surrounded-with-people-ig7vN6OkGNE?utm_content=creditCopyText&amp;utm_medium=referral&amp;utm_source=unsplash\">Unsplash<\/a><\/p>\n\n\n\n<p><strong><em>Want to learn more about cybersecurity and the cloud from industry leaders? Check out&nbsp;<a target=\"_blank\" href=\"https:\/\/www.cybersecuritycloudexpo.com\/\" rel=\"noreferrer noopener\">Cyber Security &amp; Cloud Expo<\/a>&nbsp;taking place in Amsterdam, California, and London.<\/em><\/strong><\/p>\n\n\n\n<p><strong><em>Explore other upcoming enterprise technology events and webinars powered by TechForge&nbsp;<a target=\"_blank\" href=\"https:\/\/techforge.pub\/events\/\" rel=\"noreferrer noopener\">here<\/a>.<\/em><\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Recent advancements in quantum computing, including improvements in qubit count, coherence time and gate fidelity, have yet to provide a practical edge over classical computers. That was the conclusion of Forrester\u2019s 2024 Quantum Computing Trends report. Quantum systems remain experimental and are unable to deliver the large-scale results needed to rival traditional computing methods. So [&hellip;]<\/p>\n","protected":false},"author":57372,"featured_media":104406,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[495,1,497,15,501,496,30,3],"tags":[300],"ppma_author":[882],"class_list":["post-104400","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cloud-computing-applications","category-cloud-computing","category-cloud-computing-companies","category-cloud-computing-data-analytics","category-cloud-computing-digital-transformation","category-cloud-computing-enterprise","category-cloud-computing-infrastructure","category-cloud-computing-security","tag-quantum-computing"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v24.9 (Yoast SEO v24.9) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Avishai Sharlin, Amdocs: The rise of post-quantum computing in the fight between good and evil<\/title>\n<meta name=\"description\" content=\"Post-Quantum Computing (PQC) is set to take a big step forward as businesses and governments start adopting Quantum-Safe encryption to secure their data.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cloudcomputing-news.net\/news\/avishai-sharlin-amdocs-the-rise-of-post-quantum-computing-in-the-fight-between-good-and-evil\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Avishai Sharlin, Amdocs: The rise of post-quantum computing in the fight between good and evil\" \/>\n<meta property=\"og:description\" content=\"Post-Quantum Computing (PQC) is set to take a big step forward as businesses and governments start adopting Quantum-Safe encryption to secure their data.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cloudcomputing-news.net\/news\/avishai-sharlin-amdocs-the-rise-of-post-quantum-computing-in-the-fight-between-good-and-evil\/\" \/>\n<meta property=\"og:site_name\" content=\"Cloud Computing News\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/pages\/CT\/210614738995040\" \/>\n<meta property=\"article:published_time\" content=\"2025-03-10T06:18:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-03-10T07:09:32+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cloudcomputing-news.net\/wp-content\/uploads\/2025\/03\/attentie-attentie-ig7vN6OkGNE-unsplash-e1741590170812.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1136\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Duncan MacRae\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@cloud_comp_news\" \/>\n<meta name=\"twitter:site\" content=\"@cloud_comp_news\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Duncan MacRae\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"9 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.cloudcomputing-news.net\/news\/avishai-sharlin-amdocs-the-rise-of-post-quantum-computing-in-the-fight-between-good-and-evil\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.cloudcomputing-news.net\/news\/avishai-sharlin-amdocs-the-rise-of-post-quantum-computing-in-the-fight-between-good-and-evil\/\"},\"author\":{\"name\":\"Duncan MacRae\",\"@id\":\"https:\/\/www.cloudcomputing-news.net\/#\/schema\/person\/1579de5d21ad7a9b5d437a2b642cf870\"},\"headline\":\"Avishai Sharlin, Amdocs: The rise of post-quantum computing in the fight between good and evil\",\"datePublished\":\"2025-03-10T06:18:00+00:00\",\"dateModified\":\"2025-03-10T07:09:32+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.cloudcomputing-news.net\/news\/avishai-sharlin-amdocs-the-rise-of-post-quantum-computing-in-the-fight-between-good-and-evil\/\"},\"wordCount\":1836,\"publisher\":{\"@id\":\"https:\/\/www.cloudcomputing-news.net\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.cloudcomputing-news.net\/news\/avishai-sharlin-amdocs-the-rise-of-post-quantum-computing-in-the-fight-between-good-and-evil\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.cloudcomputing-news.net\/wp-content\/uploads\/2025\/03\/attentie-attentie-ig7vN6OkGNE-unsplash-e1741590170812.jpg\",\"keywords\":[\"quantum computing\"],\"articleSection\":[\"Applications\",\"Cloud Computing\",\"Companies\",\"Data &amp; Analytics\",\"Digital Transformation\",\"Enterprise\",\"Infrastructure\",\"Security\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.cloudcomputing-news.net\/news\/avishai-sharlin-amdocs-the-rise-of-post-quantum-computing-in-the-fight-between-good-and-evil\/\",\"url\":\"https:\/\/www.cloudcomputing-news.net\/news\/avishai-sharlin-amdocs-the-rise-of-post-quantum-computing-in-the-fight-between-good-and-evil\/\",\"name\":\"Avishai Sharlin, Amdocs: The rise of post-quantum computing in the fight between good and evil\",\"isPartOf\":{\"@id\":\"https:\/\/www.cloudcomputing-news.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.cloudcomputing-news.net\/news\/avishai-sharlin-amdocs-the-rise-of-post-quantum-computing-in-the-fight-between-good-and-evil\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.cloudcomputing-news.net\/news\/avishai-sharlin-amdocs-the-rise-of-post-quantum-computing-in-the-fight-between-good-and-evil\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.cloudcomputing-news.net\/wp-content\/uploads\/2025\/03\/attentie-attentie-ig7vN6OkGNE-unsplash-e1741590170812.jpg\",\"datePublished\":\"2025-03-10T06:18:00+00:00\",\"dateModified\":\"2025-03-10T07:09:32+00:00\",\"description\":\"Post-Quantum Computing (PQC) is set to take a big step forward as businesses and governments start adopting Quantum-Safe encryption to secure their data.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.cloudcomputing-news.net\/news\/avishai-sharlin-amdocs-the-rise-of-post-quantum-computing-in-the-fight-between-good-and-evil\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.cloudcomputing-news.net\/news\/avishai-sharlin-amdocs-the-rise-of-post-quantum-computing-in-the-fight-between-good-and-evil\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.cloudcomputing-news.net\/news\/avishai-sharlin-amdocs-the-rise-of-post-quantum-computing-in-the-fight-between-good-and-evil\/#primaryimage\",\"url\":\"https:\/\/www.cloudcomputing-news.net\/wp-content\/uploads\/2025\/03\/attentie-attentie-ig7vN6OkGNE-unsplash-e1741590170812.jpg\",\"contentUrl\":\"https:\/\/www.cloudcomputing-news.net\/wp-content\/uploads\/2025\/03\/attentie-attentie-ig7vN6OkGNE-unsplash-e1741590170812.jpg\",\"width\":1920,\"height\":1136},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.cloudcomputing-news.net\/news\/avishai-sharlin-amdocs-the-rise-of-post-quantum-computing-in-the-fight-between-good-and-evil\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.cloudcomputing-news.net\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Avishai Sharlin, Amdocs: The rise of post-quantum computing in the fight between good and evil\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.cloudcomputing-news.net\/#website\",\"url\":\"https:\/\/www.cloudcomputing-news.net\/\",\"name\":\"Cloud Computing News\",\"description\":\"IaaS, SaaS, PaaS, Data Security, CIO, Analysis\",\"publisher\":{\"@id\":\"https:\/\/www.cloudcomputing-news.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.cloudcomputing-news.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.cloudcomputing-news.net\/#organization\",\"name\":\"Cloud Computing News\",\"url\":\"https:\/\/www.cloudcomputing-news.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.cloudcomputing-news.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.cloudcomputing-news.net\/wp-content\/uploads\/2024\/07\/Cloudtech.svg\",\"contentUrl\":\"https:\/\/www.cloudcomputing-news.net\/wp-content\/uploads\/2024\/07\/Cloudtech.svg\",\"width\":1920,\"height\":1080,\"caption\":\"Cloud Computing News\"},\"image\":{\"@id\":\"https:\/\/www.cloudcomputing-news.net\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/pages\/CT\/210614738995040\",\"https:\/\/x.com\/cloud_comp_news\",\"https:\/\/www.linkedin.com\/groups\/45151\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.cloudcomputing-news.net\/#\/schema\/person\/1579de5d21ad7a9b5d437a2b642cf870\",\"name\":\"Duncan MacRae\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.cloudcomputing-news.net\/#\/schema\/person\/image\/895f18375558aad26b5923eae11cf44f\",\"url\":\"https:\/\/www.cloudcomputing-news.net\/wp-content\/uploads\/2024\/11\/photo-of-duncan-scaled-1.jpg\",\"contentUrl\":\"https:\/\/www.cloudcomputing-news.net\/wp-content\/uploads\/2024\/11\/photo-of-duncan-scaled-1.jpg\",\"caption\":\"Duncan MacRae\"},\"description\":\"Duncan is an award-winning technology industry analyst, specialising in cloud computing, blockchain, martech and edge computing.\",\"sameAs\":[\"duncan@techforge.pub\"],\"url\":\"https:\/\/www.cloudcomputing-news.net\/news\/author\/duncan1\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Avishai Sharlin, Amdocs: The rise of post-quantum computing in the fight between good and evil","description":"Post-Quantum Computing (PQC) is set to take a big step forward as businesses and governments start adopting Quantum-Safe encryption to secure their data.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cloudcomputing-news.net\/news\/avishai-sharlin-amdocs-the-rise-of-post-quantum-computing-in-the-fight-between-good-and-evil\/","og_locale":"en_GB","og_type":"article","og_title":"Avishai Sharlin, Amdocs: The rise of post-quantum computing in the fight between good and evil","og_description":"Post-Quantum Computing (PQC) is set to take a big step forward as businesses and governments start adopting Quantum-Safe encryption to secure their data.","og_url":"https:\/\/www.cloudcomputing-news.net\/news\/avishai-sharlin-amdocs-the-rise-of-post-quantum-computing-in-the-fight-between-good-and-evil\/","og_site_name":"Cloud Computing News","article_publisher":"https:\/\/www.facebook.com\/pages\/CT\/210614738995040","article_published_time":"2025-03-10T06:18:00+00:00","article_modified_time":"2025-03-10T07:09:32+00:00","og_image":[{"width":1920,"height":1136,"url":"https:\/\/www.cloudcomputing-news.net\/wp-content\/uploads\/2025\/03\/attentie-attentie-ig7vN6OkGNE-unsplash-e1741590170812.jpg","type":"image\/jpeg"}],"author":"Duncan MacRae","twitter_card":"summary_large_image","twitter_creator":"@cloud_comp_news","twitter_site":"@cloud_comp_news","twitter_misc":{"Written by":"Duncan MacRae","Estimated reading time":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.cloudcomputing-news.net\/news\/avishai-sharlin-amdocs-the-rise-of-post-quantum-computing-in-the-fight-between-good-and-evil\/#article","isPartOf":{"@id":"https:\/\/www.cloudcomputing-news.net\/news\/avishai-sharlin-amdocs-the-rise-of-post-quantum-computing-in-the-fight-between-good-and-evil\/"},"author":{"name":"Duncan MacRae","@id":"https:\/\/www.cloudcomputing-news.net\/#\/schema\/person\/1579de5d21ad7a9b5d437a2b642cf870"},"headline":"Avishai Sharlin, Amdocs: The rise of post-quantum computing in the fight between good and evil","datePublished":"2025-03-10T06:18:00+00:00","dateModified":"2025-03-10T07:09:32+00:00","mainEntityOfPage":{"@id":"https:\/\/www.cloudcomputing-news.net\/news\/avishai-sharlin-amdocs-the-rise-of-post-quantum-computing-in-the-fight-between-good-and-evil\/"},"wordCount":1836,"publisher":{"@id":"https:\/\/www.cloudcomputing-news.net\/#organization"},"image":{"@id":"https:\/\/www.cloudcomputing-news.net\/news\/avishai-sharlin-amdocs-the-rise-of-post-quantum-computing-in-the-fight-between-good-and-evil\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cloudcomputing-news.net\/wp-content\/uploads\/2025\/03\/attentie-attentie-ig7vN6OkGNE-unsplash-e1741590170812.jpg","keywords":["quantum computing"],"articleSection":["Applications","Cloud Computing","Companies","Data &amp; Analytics","Digital Transformation","Enterprise","Infrastructure","Security"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/www.cloudcomputing-news.net\/news\/avishai-sharlin-amdocs-the-rise-of-post-quantum-computing-in-the-fight-between-good-and-evil\/","url":"https:\/\/www.cloudcomputing-news.net\/news\/avishai-sharlin-amdocs-the-rise-of-post-quantum-computing-in-the-fight-between-good-and-evil\/","name":"Avishai Sharlin, Amdocs: The rise of post-quantum computing in the fight between good and evil","isPartOf":{"@id":"https:\/\/www.cloudcomputing-news.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cloudcomputing-news.net\/news\/avishai-sharlin-amdocs-the-rise-of-post-quantum-computing-in-the-fight-between-good-and-evil\/#primaryimage"},"image":{"@id":"https:\/\/www.cloudcomputing-news.net\/news\/avishai-sharlin-amdocs-the-rise-of-post-quantum-computing-in-the-fight-between-good-and-evil\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cloudcomputing-news.net\/wp-content\/uploads\/2025\/03\/attentie-attentie-ig7vN6OkGNE-unsplash-e1741590170812.jpg","datePublished":"2025-03-10T06:18:00+00:00","dateModified":"2025-03-10T07:09:32+00:00","description":"Post-Quantum Computing (PQC) is set to take a big step forward as businesses and governments start adopting Quantum-Safe encryption to secure their data.","breadcrumb":{"@id":"https:\/\/www.cloudcomputing-news.net\/news\/avishai-sharlin-amdocs-the-rise-of-post-quantum-computing-in-the-fight-between-good-and-evil\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cloudcomputing-news.net\/news\/avishai-sharlin-amdocs-the-rise-of-post-quantum-computing-in-the-fight-between-good-and-evil\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.cloudcomputing-news.net\/news\/avishai-sharlin-amdocs-the-rise-of-post-quantum-computing-in-the-fight-between-good-and-evil\/#primaryimage","url":"https:\/\/www.cloudcomputing-news.net\/wp-content\/uploads\/2025\/03\/attentie-attentie-ig7vN6OkGNE-unsplash-e1741590170812.jpg","contentUrl":"https:\/\/www.cloudcomputing-news.net\/wp-content\/uploads\/2025\/03\/attentie-attentie-ig7vN6OkGNE-unsplash-e1741590170812.jpg","width":1920,"height":1136},{"@type":"BreadcrumbList","@id":"https:\/\/www.cloudcomputing-news.net\/news\/avishai-sharlin-amdocs-the-rise-of-post-quantum-computing-in-the-fight-between-good-and-evil\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cloudcomputing-news.net\/"},{"@type":"ListItem","position":2,"name":"Avishai Sharlin, Amdocs: The rise of post-quantum computing in the fight between good and evil"}]},{"@type":"WebSite","@id":"https:\/\/www.cloudcomputing-news.net\/#website","url":"https:\/\/www.cloudcomputing-news.net\/","name":"Cloud Computing News","description":"IaaS, SaaS, PaaS, Data Security, CIO, Analysis","publisher":{"@id":"https:\/\/www.cloudcomputing-news.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cloudcomputing-news.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/www.cloudcomputing-news.net\/#organization","name":"Cloud Computing News","url":"https:\/\/www.cloudcomputing-news.net\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.cloudcomputing-news.net\/#\/schema\/logo\/image\/","url":"https:\/\/www.cloudcomputing-news.net\/wp-content\/uploads\/2024\/07\/Cloudtech.svg","contentUrl":"https:\/\/www.cloudcomputing-news.net\/wp-content\/uploads\/2024\/07\/Cloudtech.svg","width":1920,"height":1080,"caption":"Cloud Computing News"},"image":{"@id":"https:\/\/www.cloudcomputing-news.net\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/pages\/CT\/210614738995040","https:\/\/x.com\/cloud_comp_news","https:\/\/www.linkedin.com\/groups\/45151\/"]},{"@type":"Person","@id":"https:\/\/www.cloudcomputing-news.net\/#\/schema\/person\/1579de5d21ad7a9b5d437a2b642cf870","name":"Duncan MacRae","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.cloudcomputing-news.net\/#\/schema\/person\/image\/895f18375558aad26b5923eae11cf44f","url":"https:\/\/www.cloudcomputing-news.net\/wp-content\/uploads\/2024\/11\/photo-of-duncan-scaled-1.jpg","contentUrl":"https:\/\/www.cloudcomputing-news.net\/wp-content\/uploads\/2024\/11\/photo-of-duncan-scaled-1.jpg","caption":"Duncan MacRae"},"description":"Duncan is an award-winning technology industry analyst, specialising in cloud computing, blockchain, martech and edge computing.","sameAs":["duncan@techforge.pub"],"url":"https:\/\/www.cloudcomputing-news.net\/news\/author\/duncan1\/"}]}},"authors":[{"term_id":882,"user_id":0,"is_guest":1,"slug":"duncan1","display_name":"Duncan MacRae","avatar_url":{"url":"https:\/\/www.cloudcomputing-news.net\/wp-content\/uploads\/2024\/11\/photo-of-duncan-scaled-1.jpg","url2x":"https:\/\/www.cloudcomputing-news.net\/wp-content\/uploads\/2024\/11\/photo-of-duncan-scaled-1.jpg"},"author_category":"","user_url":"","last_name":"MacRae","first_name":"Duncan","job_title":"Editor-in-Chief","description":"Duncan is an award-winning technology industry analyst, specialising in cloud computing, blockchain, martech and edge computing."}],"_links":{"self":[{"href":"https:\/\/www.cloudcomputing-news.net\/wp-json\/wp\/v2\/posts\/104400","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cloudcomputing-news.net\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cloudcomputing-news.net\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cloudcomputing-news.net\/wp-json\/wp\/v2\/users\/57372"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cloudcomputing-news.net\/wp-json\/wp\/v2\/comments?post=104400"}],"version-history":[{"count":0,"href":"https:\/\/www.cloudcomputing-news.net\/wp-json\/wp\/v2\/posts\/104400\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.cloudcomputing-news.net\/wp-json\/wp\/v2\/media\/104406"}],"wp:attachment":[{"href":"https:\/\/www.cloudcomputing-news.net\/wp-json\/wp\/v2\/media?parent=104400"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cloudcomputing-news.net\/wp-json\/wp\/v2\/categories?post=104400"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cloudcomputing-news.net\/wp-json\/wp\/v2\/tags?post=104400"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.cloudcomputing-news.net\/wp-json\/wp\/v2\/ppma_author?post=104400"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}