Why key management becomes the weakest link in a post-quantum and AI-driven security world