Quantum Resistant Cryptography

Protecting against the Quantum threat

Q-day

When Quantum Computers could break security as we know it.

With a different approach to compute compared to classical computers, Quantum Computers can solve certain problems incredibly quickly.

This includes complex factorisation problems, as shown by mathematician Peter Shor's algorithm in the 1990s, which can be used as a tool to crack ECC & RSA security protocols. When Quantum Computers become powerful enought to use such an algorithm to crack existing standards, we'll reach what some commentators call 'Q-day'.

Private companies and nation state are deploying significant capital to accelerate the development of Quantum Computers, while data today is already under threat from 'steal now, decrypt later' attacks.

Quantum Resistant Cryptography: preparing us for Q-day

To protect our personal, health, company & national security data from the quantum computing threat, new encryption algorithms have been developed and tested by standards bodies around the world.

Led by the National Institute for Standards and Technology (NIST) in the US, the frontrunning algorithms which will protect us are being rigorously tested before being declared in 2024. This group of algorithms are known as 'Quantum Resistant Cryptography'.

The idea has been to develop different encryption methods which are both significantly more complex to solve, for both classical & quantum computing approaches.

Understanding encryption: traditional vs. post quantum