Techstrong TV - March 6, 2026
Why It Matters
As quantum computers near practical capability, businesses face existential data‑security risks; adopting post‑quantum architectures like Crypt’s now protects critical assets, ensures compliance with imminent government mandates, and preserves competitive advantage.
Key Takeaways
- •Quantum security industry remains small but rapidly expanding
- •IP theft by China accelerates urgency for quantum‑proof encryption
- •Crypt replaces key distribution with simultaneous endpoint key generation
- •US government may ban non‑post‑quantum crypto after 2030
- •Enterprises must treat quantum transition as board‑level, not IT issue
Summary
TechStrong TV hosted Dennis Mandich, co‑founder and CTO of Crypt, to discuss the emerging quantum security landscape and the company’s inclusion in the Quantum Security 25 list. Mandich outlined his 20‑year intelligence background, the formation of the Quantum Economic Development Consortium, and the pressing threat of a so‑called “Q‑Day” when quantum computers could break today’s encryption.
He warned that the industry’s small talent pool and aggressive Chinese investment have compressed the timeline for quantum‑ready cryptography. Current public‑key infrastructure, built on 1970s algorithms, is vulnerable to “harvest‑now, decrypt‑later” attacks, and even NIST‑approved post‑quantum standards lack proven security. Mandich emphasized that the United States may bar companies without post‑quantum solutions from federal contracts after 2030.
Crypt’s core innovation, according to Mandich, is eliminating key distribution by generating keys simultaneously at both endpoints, ensuring keys never travel over the channel. “Even if you break the channel, you can’t decrypt the data,” he said, positioning the approach as a structural fix rather than a patch. He also cited the looming Chinese quantum race, noting their massive funding and graduate‑physicist pipeline.
The interview underscores that quantum‑ready transition is no longer a theoretical exercise; it is a board‑level imperative with regulatory, competitive, and national‑security stakes. Companies that adopt Crypt’s architecture now can mitigate future data‑harvest risks, satisfy upcoming government mandates, and avoid the costly retrofits that plagued the Y2K era.
Comments
Want to join the conversation?
Loading comments...