The advent of quantum computers poses a significant threat to current encryption systems, prompting the development of quantum-resistant solutions to safeguard data. A key concern is the "harvest now, decrypt later" attack, where adversaries collect encrypted data to decrypt once quantum capabilities become available, creating an urgent need for migration to post-quantum cryptography. Organizations handling sensitive data with long-term confidentiality requirements are particularly vulnerable, and the timeline for cryptographic migration is narrowing due to rapid advancements in post-quantum technologies1. Quantum key distribution and post-quantum cryptography are being explored as potential solutions to protect data from quantum computer threats. As large-scale quantum computers are expected to arrive in the near future, entities must prioritize planning and implementation of quantum-resistant measures to ensure the long-term security of their data. The increasing urgency of post-quantum cryptography planning underscores the need for proactive measures to mitigate potential quantum security threats.