What is Post-Quantum Cryptography?
Cryptographic algorithms designed to resist attacks from both classical and quantum computers — the next generation of encryption being standardized to replace RSA, ECC, and other vulnerable algorithms.
Also known as: PQC, Quantum-Resistant Cryptography, Quantum-Safe Encryption
Post-quantum cryptography isn't about encrypting things with quantum computers — it's about encrypting things that quantum computers can't break.
Why It's Urgent Now
Current encryption (RSA, ECC) relies on math problems that quantum computers can solve efficiently:
- RSA: Based on factoring large numbers → Shor's algorithm breaks it
- ECC: Based on elliptic curve discrete logarithm → also broken by Shor's
- Diffie-Hellman: Key exchange based on discrete logarithm → broken
When sufficiently powerful quantum computers arrive, all of these become useless. And because of "harvest now, decrypt later" strategies, the urgency is today, not whenever quantum computers arrive.
The New Algorithms
NIST finalized its first post-quantum standards in 2024:
For Encryption / Key Exchange
- ML-KEM (CRYSTALS-Kyber): Lattice-based key encapsulation. Fast, small keys. The primary standard for TLS and general encryption.
For Digital Signatures
- ML-DSA (CRYSTALS-Dilithium): Lattice-based signatures. Primary standard for most applications.
- SLH-DSA (SPHINCS+): Hash-based signatures. Larger but based on extremely well-understood math (hash functions).
- FN-DSA (FALCON): Lattice-based signatures with smaller sizes but more complex implementation.
What's Already Migrating
- Signal: Added PQXDH (post-quantum key exchange) in 2023
- Apple iMessage: PQ3 protocol using ML-KEM since 2024
- Chrome/Firefox: Experimenting with hybrid TLS using ML-KEM
- Cloudflare: Post-quantum TLS support in beta
- AWS: Post-quantum TLS available for some services
What It Means for You
- Your messaging may already be quantum-safe — Signal and iMessage have migrated
- Web browsing is transitioning — hybrid PQ TLS is being tested in major browsers
- VPNs will need to upgrade — WireGuard and OpenVPN are working on PQ support
- Cryptocurrency faces challenges — Bitcoin and Ethereum use ECDSA (vulnerable)
- Your current encrypted data — Files encrypted with AES-256 are already quantum-safe (symmetric encryption is resistant)
Action Items
- Use Signal or iMessage for messaging (already post-quantum)
- Use AES-256 for file encryption (quantum-resistant)
- Update software regularly — PQ upgrades arrive through updates
- Watch for VPN PQ support — Choose providers actively implementing it
- Think about long-term secrets — If data needs to be protected for 10+ years, consider the quantum timeline now
Related Terms
Cryptographic Agility
The ability of a system to quickly switch between cryptographic algorithms without major redesign — critical for transitioning to post-quantum encryption and responding to algorithm breaks.
Elliptic Curve Cryptography
A public-key cryptography approach based on the algebraic structure of elliptic curves. ECC provides equivalent security to RSA with much smaller key sizes, making it ideal for mobile devices, IoT, and performance-critical applications.
Harvest Now, Decrypt Later
A surveillance strategy where intelligence agencies intercept and store encrypted communications today, planning to decrypt them in the future when quantum computers become powerful enough to break the encryption.
NIST Post-Quantum Standards
The new cryptographic standards published by the US National Institute of Standards and Technology (NIST) to replace vulnerable RSA and ECC algorithms before quantum computers can break them.
Quantum Computing Threat
The risk that sufficiently powerful quantum computers will break widely-used encryption algorithms, potentially exposing all currently encrypted data.
RSA
One of the first public-key cryptosystems, RSA is based on the mathematical difficulty of factoring large prime numbers. Named after its inventors Rivest, Shamir, and Adleman, it's still widely used for key exchange and digital signatures.
Have more questions?
Use our guided flow to get the right next privacy step for Post-Quantum Cryptography.
Open Guided Flow