skip to Main Content

What are post-quantum encryption algorithms?

Cybersecurity relies on several industry-standard encryption algorithms such as RSA and ECC for exchanging keys and AES for encrypting the data itself. Since each is secured using different mathematical approaches, not all of them will remain secure in a quantum world. For example, integer factorization (RSA), discrete logarithm (DH, and DSA), and elliptic curve (ECC) will no longer be safe, as quantum computers will be able to break the type of math used to secure them. Post-quantum algorithms, on the other hand, use mathematical structures such as lattices and isogenies that, to the best of our knowledge, are resistant to quantum attacks.