Post-Quantum Cryptography
A comprehensive guide to post-quantum cryptography — from understanding the quantum threat to NIST standards (ML-KEM, ML-DSA, SLH-DSA), lattice-based and hash-based schemes, hybrid approaches, migration strategies, and real-world implementation for the post-quantum era.
Classical Cryptography at Risk
Why RSA, ECC, and Diffie-Hellman are vulnerable to quantum computers — a comprehensive map of where classical cryptography lives and what happens when it breaks.
15 min readQuantum Computing Fundamentals for Cryptographers
Essential quantum computing concepts for security professionals — qubits, superposition, entanglement, quantum gates, error correction, and the path to cryptographically relevant quantum computers.
18 min readShor's Algorithm & Grover's Algorithm
How Shor's algorithm breaks RSA and ECC, how Grover's algorithm weakens symmetric cryptography, and what the resource estimates mean for real-world threat timelines.
19 min readNIST PQC Standardization Process
The complete history and outcomes of NIST's Post-Quantum Cryptography standardization — from the 2016 call for proposals through FIPS 203, 204, and 205, plus ongoing Round 4 selections.
18 min readLattice-Based Cryptography
Deep dive into lattice-based cryptography — the mathematical foundations, ML-KEM (FIPS 203), ML-DSA (FIPS 204), FN-DSA, and why lattices dominate post-quantum standardization.
20 min readHash-Based Signatures
Hash-based digital signatures from Lamport to SLH-DSA — the most conservative post-quantum signature approach, built on minimal cryptographic assumptions.
17 min readCode-Based Cryptography
Code-based cryptographic systems from McEliece to HQC — error-correcting codes as the foundation for quantum-resistant encryption with decades of cryptanalytic confidence.
16 min readOther PQC Families & Broken Schemes
Multivariate, isogeny-based, and other post-quantum approaches — including lessons from spectacularly broken schemes like SIKE and Rainbow.
16 min readHybrid Cryptography Approaches
Running classical and post-quantum cryptography in parallel — KEM combiners, hybrid signatures, real-world deployments in Chrome, Signal, and AWS, and the ongoing debate.
17 min readMigration Strategies & Crypto Agility
A practical framework for migrating to post-quantum cryptography — crypto agility architecture, 5-phase migration methodology, Mosca's theorem, inventory templates, and organizational change management.
19 min readPQC in Protocols
How post-quantum cryptography integrates into TLS, SSH, IPsec, Signal, WireGuard, X.509 PKI, and DNSSEC — protocol-specific challenges, solutions, and readiness status.
19 min readReal-World Implementations & Libraries
PQC library ecosystem guide — liboqs, PQClean, BoringSSL, AWS-LC, wolfSSL, Bouncy Castle, OpenSSL 3.5+, HSM support, performance benchmarks, and library selection guidance.
18 min readAttacks on PQC Schemes
Known attacks against post-quantum cryptographic schemes — mathematical cryptanalysis, side-channel attacks, implementation vulnerabilities, and protocol-level threats.
18 min readStandards & Compliance
PQC standards landscape — FIPS 203/204/205 details, CNSA 2.0 timeline, NSA guidance, EU regulations, FIPS 140-3 validation, and industry compliance mapping for PCI DSS, HIPAA, and FedRAMP.
18 min readHarvest Now, Decrypt Later (HNDL)
The harvest-now-decrypt-later threat — how adversaries collect encrypted data today for future quantum decryption, risk assessment frameworks, and organizational response strategies.
16 min readTools, Testing & Resources
Practical tools for PQC migration — crypto discovery scanners, testing frameworks, benchmarking suites, formal verification, learning resources, and vendor readiness tracking.
16 min read