What is Post-quantum Cryptography?

Learn the security risks of traditional cryptography in the post-quantum era and understand how it will affect cybersecurity practice areas.

Education Center / What is Post-quantum Cryptography?

What is Post-quantum Cryptography?

Post-quantum cryptography (PQC) refers to cryptographic algorithms and protocols that are designed to remain secure against attacks from both traditional computers and quantum computers. The goal is to have quantum-safe security that protects data, communications, and digital identities even when an adversary has access to a large-scale quantum computer with capabilities far beyond current processing limits.

The technologies behind this quantum-safe security include post-quantum encryption, digital signatures, and key exchange mechanisms that rely on mathematical problems that are extremely difficult for quantum computers to solve. This ensures that sensitive information remains protected in both the current computing era and the quantum computing future.

Post-quantum Encryption

Post-quantum encryption protects the confidentiality of data by converting plaintext information into ciphertext using algorithms that cannot be efficiently broken by quantum computers (e.g., Shor’s Algorithm). It ensures that encrypted data in-motion and at-rest remains unreadable to unauthorized parties, even if they possess quantum computing capabilities.

Digital Signatures

Quantum-safe digital signatures provide authentication, integrity, and non-repudiation for digital messages and documents using algorithms resistant to quantum attacks. They allow a sender to cryptographically "sign" data in a way that proves their identity and ensures the data hasn't been altered, while remaining secure against forgery attempts using quantum computers.

Key Exchange Mechanisms

Quantum-safe key exchange mechanisms enable two parties to securely establish a shared secret key over an untrusted network, even in the presence of quantum-capable adversaries. These protocols allow communicating parties to agree on encryption keys without those keys being intercepted or compromised by attackers with quantum computers.

How Post-Quantum Cryptography Differs from Traditional Cryptography

PQC and traditional cryptography both aim to protect sensitive information, but they differ fundamentally in their approach to security threats and the mathematical problems they rely on.

Mathematical Foundation

Traditional cryptography relies on mathematical problems that are difficult for classical computers to solve, such as:

  • Factoring large numbers (Rivest-Shamir-Adleman, or RSA)
  • Computing discrete logarithms (Diffie-Hellman, or DH)
  • Solving elliptic curve discrete logarithm problems (Elliptic Curve Cryptography, or ECC)

PQC is based on different mathematical problems that remain difficult even for quantum computers, such as:

  • Finding short vectors in high-dimensional lattices
  • Decoding random linear codes
  • Solving systems of multivariate polynomial equations
  • Computing hash function pre-images

Vulnerability to Quantum Attacks

Traditional algorithms like RSA and ECC are vulnerable to quantum attacks. Shor's algorithm, when run on a sufficiently powerful quantum computer, can efficiently break these cryptosystems by solving the underlying mathematical problems in moments, whereas traditional computers would take millions of years.

Post-quantum algorithms are designed to resist known quantum computing attacks, including Shor's and Grover's algorithms, ensuring security remains intact in the quantum era.

Performance Characteristics

Traditional cryptography typically offers smaller key sizes, faster operations, and compact signatures that have been optimized over decades of use.

PQC often requires larger key sizes, longer signatures, and may have different performance profiles, though ongoing research and standardization efforts continue to improve efficiency and practical deployment.

The Impact of Post-quantum Cryptography Across Security Domains

The transition to PQC is not a single, isolated security initiative. It represents a fundamental shift that touches every aspect of modern cybersecurity. While the quantum threat may seem distant, the cryptographic foundations that underpin our security practices today will need to be systematically evaluated, updated, and reinforced across all organizational functions.

The following sections examine how quantum-safe security intersects with aspects of cybersecurity, highlighting the specific vulnerabilities, transition challenges, and strategic considerations that security teams must address to protect their organizations in the quantum era.

AI Security

Machine learning models and artificial intelligence (AI) applications often handle sensitive training data, proprietary algorithms, and confidential predictions. As AI systems increasingly rely on encrypted data processing, secure model sharing, and authenticated API communications, transitioning to quantum-safe cryptography ensures that AI infrastructure, federated learning protocols, and model integrity verification remain protected against future quantum threats. Additionally, AI models themselves may have long lifespans, requiring quantum-safe protection for their intellectual property and the sensitive data they process over time.

Identity and Access Management

Identity and Access Management (IAM) systems depend heavily on cryptographic protocols for authentication, authorization, and secure credential storage. Quantum computers threaten the digital certificates, public key infrastructure (PKI), multi-factor authentication tokens, and cryptographic keys that form the foundation of identity verification. Implementing quantum-safe algorithms in IAM ensures that user identities, access tokens, password hashes, biometric templates, and single sign-on (SSO) systems remain secure, preventing unauthorized access even when attackers possess quantum computing capabilities. This transition is especially urgent because compromised identity systems can provide broad access to entire organizational infrastructures.

Cloud Security

Cloud environments face unique quantum security challenges because they host vast amounts of sensitive data with long retention periods, and they rely on encryption for data-at-rest, data-in-transit, and data-in-use protection. Quantum-safe security impacts cloud key management services, virtual private networks (VPNs), API gateways, container security, and serverless function authentication. Cloud security teams and providers must consider quantum-safe cryptography across shared responsibility models, ensuring that cloud storage, backup systems, disaster recovery solutions, and multi-tenant isolation mechanisms remain protected against Harvest Now; Decrypt Later (HNDL) attacks where adversaries collect encrypted data today to decrypt with future quantum computers.

Data Security

Data security is perhaps most directly impacted by quantum threats because sensitive information like financial records, healthcare data, intellectual property, and personally identifiable information often requires cryptographic protection. Quantum-safe security requires organizations to re-evaluate their entire data protection strategy, including encryption algorithms for databases, file systems, backup storage, and archived data. Organizations must prioritize quantum-safe encryption for their most sensitive and long-lived data assets, implement crypto-agility to allow algorithm transitions, and consider the timeline between data classification and the anticipated arrival of cryptographically relevant quantum computers to ensure compliance with data protection regulations in the quantum era.

Network Security

Network security infrastructure relies extensively on cryptographic protocols that are vulnerable to quantum attacks, including TLS/SSL for secure web communications, IPsec for VPNs, and certificate authorities for trust establishment. Quantum-safe security requires updating network encryption protocols, secure tunneling mechanisms, network access control systems, and the entire PKI ecosystem that validates network endpoints. Organizations must plan for hybrid approaches during the transition, maintaining both traditional and quantum-safe algorithms, while ensuring that routers, firewalls, load balancers, and network monitoring tools can support the larger key sizes and different performance characteristics of post-quantum algorithms without degrading network performance or creating new vulnerabilities.

Threat and Attack Simulation

Threat and Attack Simulation must evolve to incorporate quantum computing capabilities into adversary models and attack scenarios. Security teams need to assess organizational readiness for quantum threats by simulating HNDL attacks, testing the resilience of cryptographic implementations, and identifying systems still using quantum-vulnerable algorithms. Red team exercises should include scenarios where attackers have access to quantum computing resources, penetration testing should verify quantum-safe implementations, and vulnerability assessments must identify cryptographic dependencies that require upgrading. This practice area plays a crucial role in driving quantum-safe adoption by demonstrating real-world risks and validating the effectiveness of post-quantum security controls.

Email Security

Email security faces significant quantum threats because email communications often contain sensitive business information, and encrypted emails may remain stored for years in compliance archives or backup systems. Quantum-safe security impacts email encryption standards like S/MIME and PGP, email authentication protocols like DKIM and DMARC that rely on digital signatures, and secure email gateways that inspect encrypted traffic. Organizations must transition to quantum-safe algorithms for encrypting email content, authenticating sender identities, and protecting email infrastructure, while maintaining interoperability during the transition period when different organizations adopt quantum-safe solutions at different rates. The long retention periods common in email archiving make this transition particularly urgent.

Governance, Risk, and Compliance

Governance, Risk, and Compliance (GRC) programs must incorporate quantum risk into their frameworks, requiring organizations to assess cryptographic inventories, identify quantum-vulnerable systems, and develop transition roadmaps. Compliance requirements are evolving to address quantum threats, with regulatory bodies, including NIST, beginning to mandate quantum-safe readiness assessments and migration timelines. GRC teams must update risk registers to include quantum computing as an emerging threat, ensure that third-party vendors and supply chain partners address quantum security, maintain documentation of cryptographic dependencies, and align quantum-safe transitions with existing compliance obligations for data protection, financial services, healthcare, and government regulations. This includes establishing policies for crypto-agility and ensuring audit trails demonstrate progress toward quantum readiness.

OT Security

Operational Technology (OT) security faces unique quantum challenges because industrial control systems, SCADA networks, and critical infrastructure often have extremely long operational lifespans—sometimes 20-30 years or more—and cannot be easily updated or replaced. Many OT systems use legacy cryptographic protocols for authentication and secure communications that will become vulnerable to quantum attacks, yet the safety-critical nature of these systems makes cryptographic transitions particularly complex and risky. Quantum-safe security for OT requires careful planning to update programmable logic controllers (PLCs), human-machine interfaces (HMIs), remote terminal units (RTUs), and industrial IoT devices without disrupting operations, while ensuring that new quantum-safe implementations don't introduce latency or compatibility issues that could impact real-time control systems or compromise safety mechanisms.

Endpoint Security

Endpoint security faces significant quantum-safe challenges because endpoints (e.g., laptops, desktops, mobile devices, and IoT devices) represent both the most numerous and most diverse components of an organization's infrastructure. These devices rely on cryptographic protection for disk encryption, secure boot processes, VPN clients, certificate-based authentication, and encrypted communications with enterprise resources. Quantum-safe security requires updating endpoint protection platforms, mobile device management (MDM) solutions, and endpoint detection and response (EDR) tools to support post-quantum algorithms, while ensuring that resource-constrained devices can handle the computational overhead and larger key sizes of quantum-safe cryptography. The challenge is compounded by the variety of operating systems, hardware capabilities, and device lifecycles across an endpoint ecosystem, requiring phased rollouts that maintain security during transition periods and account for legacy devices that may never support quantum-safe algorithms.

Security Operations Center 

Security Operations Centers (SOC) must adapt their detection, monitoring, and response capabilities to address quantum-related threats and the complexities of cryptographic transitions. SOC teams need visibility into which systems have migrated to quantum-safe algorithms, the ability to detect anomalies in cryptographic implementations, and updated threat intelligence that includes quantum-computing-enabled attack vectors. Quantum-safe security impacts SIEM configurations that must parse new cryptographic protocols, security analytics that identify cryptographic vulnerabilities, incident response playbooks that address quantum-specific threats like HNDL attacks, and forensic capabilities that can analyze PQC artifacts. SOC analysts require training to understand quantum threats, recognize indicators of compromise related to cryptographic weaknesses, and coordinate responses across the extended timelines involved in quantum-safe migrations. Additionally, SOCs must monitor the organization's crypto-agility posture, track migration progress, and alert stakeholders to systems that remain vulnerable as the quantum threat evolves.