Post-Quantum Cryptography

This solution addresses the vulnerability of current cryptographic systems — such as those protecting online banking, emails, healthcare, smart cities and sensitive government communications — by developing encryption algorithms that quantum computers cannot easily crack.
BACK TO LIST
Technology Readiness Level (TRL)

Technology Readiness Level (TRL)

Lab Environment

Experimental analyses are no longer required as multiple component pieces are tested and validated altogether in a lab environment.

Post-Quantum Cryptography

In the realm of digital security, the advent of Quantum Computing poses a formidable challenge to conventional encryption methods. Traditional cryptographic algorithms, which secure everything from online transactions and confidential communications to healthcare records and medical implants, are at risk of being broken by the vastly superior processing power of quantum computers. This impending vulnerability necessitates a transition towards Post-Quantum Cryptography (PQC), a suite of cryptographic mechanisms designed to be secure against the capabilities of quantum computing.

Post-Quantum Cryptography (PQC), also known as quantum-resistant cryptography, comprises algorithms that are not susceptible to the types of attacks that quantum computers will enable. Unlike current encryption methods that rely on the difficulty of factorising large prime numbers or solving discrete logarithm problems—tasks that quantum computers could perform efficiently—PQC algorithms are based on mathematical problems considered difficult for quantum computers to solve. These include lattice-based cryptography, hash-based cryptography, multivariate polynomial cryptography, and code-based cryptography. Each of these approaches provides a different method of securing digital information, ensuring robust protection against both classical and quantum computing threats.

The transition to PQC will ensure the continued protection of private data, financial transactions, healthcare devices and confidential communications in a future when quantum computing is mainstream. Moreover, it underpins the development of secure, intelligent systems in smart cities, IoT devices, and national security apparatus. By adopting quantum-resistant algorithms, industries and governments can safeguard their digital assets against future threats, ensuring a resilient and secure foundation for technological advancement and economic growth.

Furthermore, the integration of PQC into existing digital systems promotes a forward-looking approach to cybersecurity, encouraging innovation and research in fields that intersect with quantum computing and cryptography. As such, Post-Quantum Cryptography acts not only as a bulwark against the quantum threat but also as a catalyst for developing new technologies and security practices that will drive sustainable growth and smart development in various sectors.

Image generated by Envisioning using Midjourney

Sources
Imagine that it’s fifteen years from now and someone announces the successful construction of a large quantum computer. The New York Times runs a frontpage article reporting that all of the public-key algorithms used to protect the Internet have been broken....
When quantum computers become commercially available, all public and private keys will be exposed to a massive risk. Understanding the impact this would have on cryptography is key for everyone.
Post-quantum cryptography is focused on getting cryptography approaches ready for the era of quantum computers, a post-quantum world.
Short URL:  https://www.nist.gov/pqcrypto Public comments are available for Draft FIPS 203, Draft FIPS 204 and Draft FIPS 205, which specify algorithms derived from CRYSTALS-Dilithium, CRYSTALS-KYBER and SPHINCS+.  The public comment period closed...
Guidance to help organisations and CNI providers think about how to best prepare for the migration to post-quantum cryptography (PQC).
While quantum computers may not be able to crack conventional encryption protocols until 2030, many cybersecurity and risk managers should evaluate their options now.
The emergence of quantum computers can have major implications for organizations that process sensitive information. Using a future quantum computer, one can decrypt data that is encrypted with popular cryptographic algorithms. The consequences are, however, even more serious. Encrypted data may already be intercepted, awaiting the possibility to decrypt the data with a future quantum computer. NCSC recommends organizations to draw up a plan of action. This plan of action should describe which measures organizations should take in the years to come, to protect data against the threat of quantum computers.

Interested in our research?

Read about our services for help with your foresight needs.
SERVICES