PQC

Post-Quantum Cryptography - Protection Against Future Quantum Threats

NIST Standards

Approved algorithms

Resistance

Quantum computer protection

Hybrid Schemes

Classical and quantum-safe

What is PQC?

Post-Quantum Cryptography (PQC) is a field of cryptography developing cryptographic algorithms resistant to attacks from both classical and future quantum computers. Quantum computers could potentially break many modern cryptographic methods (RSA, ECDSA), making post-quantum algorithm development critical for future security.

NIST (National Institute of Standards and Technology) launched a PQC standardization process in 2016 and approved the first set of post-quantum algorithms in 2022: ML-KEM (Key Encapsulation Mechanism, formerly Kyber) for encryption and ML-DSA (Digital Signature Algorithm, formerly Dilithium) for digital signatures. These algorithms are based on different mathematical problems (lattices, polynomial equations, codes) believed to be resistant to quantum attacks.

Standards and Official Sources:

NIST FIPS 203, 204, 205 define standard post-quantum algorithms. RFC 8554 describes XMSS (Merkle Signature Scheme), RFC 9090 — SLH-DSA (Stateless Hash-Based Digital Signature Algorithm). Draft RFC for PQ-TLS integration in active development.

Technical Specs

Standards (NIST)

FIPS 203, 204, 205 (2024)

Primary Algorithms

ML-KEM (Kyber), ML-DSA (Dilithium), SLH-DSA

Mathematical Basis

Lattices, Hashes, Codes

Key Size (typical)

ML-KEM: 1-4 KB, ML-DSA: 1-3 KB

Applications

PQ-TLS, QUIC, Digital Signatures

Post-Quantum Algorithms

How It Works

Post-quantum algorithms are based on mathematical problems believed to be resistant to quantum computer attacks through complex algebraic structures.

  • Lattice-based problems
  • Polynomial equations
  • Hash functions

Applications

  • PQ-TLS
  • Quantum-safe QUIC
  • Digital signatures
  • Long-term data protection

Quantum-Safe Laboratory

Quantum-Safe Lab

Comprehensive quantum protection laboratory: PQ-QUIC, PQ-MASQUE, hybrid cryptographic schemes and crypto-agility. Open and closed sections for different access levels.

PQ-QUIC PQ-MASQUE ML-KEM Hybrid TLS
Learn More About Lab

NIST Standardized Algorithms

ML-KEM (Kyber)

Lattice-based Key Encapsulation Mechanism for protecting encryption keys in hybrid TLS connections.

Public key size: 768, 1024, 1568 bytes

Based on: MLWE (lattices)

Status: FIPS 203 (2024)

ML-DSA (Dilithium)

Lattice-based Digital Signature Algorithm for post-quantum digital signatures in certificates and protocols.

Public key size: 1312, 1952, 2592 bytes

Based on: MLWE (lattices)

Status: FIPS 204 (2024)

SLH-DSA (XMSS)

Stateless Hash-Based Digital Signature Algorithm based on hash functions, simple and proven approach.

Signature size: 2144 - 4432 bytes

Based on: SHA-256/512 (hashes)

Status: FIPS 205 (2024)

Exploring the Future with PQC

Researching post-quantum cryptography applications to protect against future quantum threats

Our Research