← Back to Topics
🔐

Post-Quantum Cryptography

A comprehensive guide to post-quantum cryptography — from understanding the quantum threat to NIST standards (ML-KEM, ML-DSA, SLH-DSA), lattice-based and hash-based schemes, hybrid approaches, migration strategies, and real-world implementation for the post-quantum era.

Post-Quantum Cryptography PQC Quantum Computing NIST FIPS Lattice Cryptography Cryptographic Migration
01

Classical Cryptography at Risk

Why RSA, ECC, and Diffie-Hellman are vulnerable to quantum computers — a comprehensive map of where classical cryptography lives and what happens when it breaks.

15 min read
02

Quantum Computing Fundamentals for Cryptographers

Essential quantum computing concepts for security professionals — qubits, superposition, entanglement, quantum gates, error correction, and the path to cryptographically relevant quantum computers.

18 min read
03

Shor's Algorithm & Grover's Algorithm

How Shor's algorithm breaks RSA and ECC, how Grover's algorithm weakens symmetric cryptography, and what the resource estimates mean for real-world threat timelines.

19 min read
04

NIST PQC Standardization Process

The complete history and outcomes of NIST's Post-Quantum Cryptography standardization — from the 2016 call for proposals through FIPS 203, 204, and 205, plus ongoing Round 4 selections.

18 min read
05

Lattice-Based Cryptography

Deep dive into lattice-based cryptography — the mathematical foundations, ML-KEM (FIPS 203), ML-DSA (FIPS 204), FN-DSA, and why lattices dominate post-quantum standardization.

20 min read
06

Hash-Based Signatures

Hash-based digital signatures from Lamport to SLH-DSA — the most conservative post-quantum signature approach, built on minimal cryptographic assumptions.

17 min read
07

Code-Based Cryptography

Code-based cryptographic systems from McEliece to HQC — error-correcting codes as the foundation for quantum-resistant encryption with decades of cryptanalytic confidence.

16 min read
08

Other PQC Families & Broken Schemes

Multivariate, isogeny-based, and other post-quantum approaches — including lessons from spectacularly broken schemes like SIKE and Rainbow.

16 min read
09

Hybrid Cryptography Approaches

Running classical and post-quantum cryptography in parallel — KEM combiners, hybrid signatures, real-world deployments in Chrome, Signal, and AWS, and the ongoing debate.

17 min read
10

Migration Strategies & Crypto Agility

A practical framework for migrating to post-quantum cryptography — crypto agility architecture, 5-phase migration methodology, Mosca's theorem, inventory templates, and organizational change management.

19 min read
11

PQC in Protocols

How post-quantum cryptography integrates into TLS, SSH, IPsec, Signal, WireGuard, X.509 PKI, and DNSSEC — protocol-specific challenges, solutions, and readiness status.

19 min read
12

Real-World Implementations & Libraries

PQC library ecosystem guide — liboqs, PQClean, BoringSSL, AWS-LC, wolfSSL, Bouncy Castle, OpenSSL 3.5+, HSM support, performance benchmarks, and library selection guidance.

18 min read
13

Attacks on PQC Schemes

Known attacks against post-quantum cryptographic schemes — mathematical cryptanalysis, side-channel attacks, implementation vulnerabilities, and protocol-level threats.

18 min read
14

Standards & Compliance

PQC standards landscape — FIPS 203/204/205 details, CNSA 2.0 timeline, NSA guidance, EU regulations, FIPS 140-3 validation, and industry compliance mapping for PCI DSS, HIPAA, and FedRAMP.

18 min read
15

Harvest Now, Decrypt Later (HNDL)

The harvest-now-decrypt-later threat — how adversaries collect encrypted data today for future quantum decryption, risk assessment frameworks, and organizational response strategies.

16 min read
16

Tools, Testing & Resources

Practical tools for PQC migration — crypto discovery scanners, testing frameworks, benchmarking suites, formal verification, learning resources, and vendor readiness tracking.

16 min read