Which algorithms are safe, which are broken, and how to evaluate what your organization is using.
Forward secrecy: Compromised key tomorrow can't decrypt today's traffic. TLS 1.3 enforces this. TLS 1.2 needs ECDHE suites.
Ranking: Argon2id > bcrypt > PBKDF2 > SHA-256 plain > MD5 > Plaintext
Nation-states are capturing encrypted traffic today, storing it, waiting for quantum computers in 5-15 years.
NIST standardized in 2024: ML-KEM (key exchange, in Chrome), ML-DSA (signatures), SLH-DSA (backup). AES-256 stays safe.
1. Inventory crypto usage. 2. Find RSA/ECC key exchange. 3. Prioritize hybrid (classical+PQC) for sensitive data. 4. Watch vendor roadmaps. 3-5 year migration.
You don't configure algorithms. You audit what's deployed and raise the alarm when something is broken. Run ssllabs.com. Ask about password hashing. Check TLS config. These conversations prevent breaches.