PQC
Post-Quantum Cryptography - Protection Against Future Quantum Threats
NIST Standards
Approved algorithms
Resistance
Quantum computer protection
Hybrid Schemes
Classical and quantum-safe
What is PQC?
Post-Quantum Cryptography (PQC) is a field of cryptography developing cryptographic algorithms resistant to attacks from both classical and future quantum computers. Quantum computers could potentially break many modern cryptographic methods (RSA, ECDSA), making post-quantum algorithm development critical for future security.
NIST (National Institute of Standards and Technology) launched a PQC standardization process in 2016 and approved the first set of post-quantum algorithms in 2022: ML-KEM (Key Encapsulation Mechanism, formerly Kyber) for encryption and ML-DSA (Digital Signature Algorithm, formerly Dilithium) for digital signatures. These algorithms are based on different mathematical problems (lattices, polynomial equations, codes) believed to be resistant to quantum attacks.
Standards and Official Sources:
NIST FIPS 203, 204, 205 define standard post-quantum algorithms. RFC 8554 describes XMSS (Merkle Signature Scheme), RFC 9090 — SLH-DSA (Stateless Hash-Based Digital Signature Algorithm). Draft RFC for PQ-TLS integration in active development.
Technical Specs
Standards (NIST)
FIPS 203, 204, 205 (2024)
Primary Algorithms
ML-KEM (Kyber), ML-DSA (Dilithium), SLH-DSA
Mathematical Basis
Lattices, Hashes, Codes
Key Size (typical)
ML-KEM: 1-4 KB, ML-DSA: 1-3 KB
Applications
PQ-TLS, QUIC, Digital Signatures
Post-Quantum Algorithms
How It Works
Post-quantum algorithms are based on mathematical problems believed to be resistant to quantum computer attacks through complex algebraic structures.
- Lattice-based problems
- Polynomial equations
- Hash functions
Applications
- PQ-TLS
- Quantum-safe QUIC
- Digital signatures
- Long-term data protection
Quantum-Safe Laboratory
Quantum-Safe Lab
Comprehensive quantum protection laboratory: PQ-QUIC, PQ-MASQUE, hybrid cryptographic schemes and crypto-agility. Open and closed sections for different access levels.
NIST Standardized Algorithms
ML-KEM (Kyber)
Lattice-based Key Encapsulation Mechanism for protecting encryption keys in hybrid TLS connections.
Public key size: 768, 1024, 1568 bytes
Based on: MLWE (lattices)
Status: FIPS 203 (2024)
ML-DSA (Dilithium)
Lattice-based Digital Signature Algorithm for post-quantum digital signatures in certificates and protocols.
Public key size: 1312, 1952, 2592 bytes
Based on: MLWE (lattices)
Status: FIPS 204 (2024)
SLH-DSA (XMSS)
Stateless Hash-Based Digital Signature Algorithm based on hash functions, simple and proven approach.
Signature size: 2144 - 4432 bytes
Based on: SHA-256/512 (hashes)
Status: FIPS 205 (2024)
Exploring the Future with PQC
Researching post-quantum cryptography applications to protect against future quantum threats
Our Research