← Back to Blog

    Post-Quantum Cryptography

    Preparing for the quantum computing era and its impact on current encryption standards.

    SecurityPublished · 16 min read· By Cryptography Research Team

    Evidence-based review per our 28-criteria methodology · affiliate disclosure

    1. Executive summary

    The advent of quantum computing poses an existential threat to current cryptographic systems. While quantum computers capable of breaking RSA and ECC encryption may be years away, organizations must begin preparing for the post-quantum era now to protect sensitive data and communications.

    Premium Research Content

    Continue reading this in-depth analysis on Substack

    Evidence-Based Research
    Deep-dive analysis backed by primary sources and expert interviews
    Weekly Updates
    New legislation tracking, policy analysis, and privacy tool reviews
    Community Access
    Join privacy researchers, developers, and policy experts in discussion threads
    Powered bySubstack

    2. Quantum computing threat

    Quantum computers leverage quantum mechanical properties to solve certain problems exponentially faster than classical computers. This capability threatens current public-key cryptography:

    Shor's Algorithm

    Shor's algorithm can factor large integers and solve discrete logarithm problems in polynomial time, making RSA and ECC encryption vulnerable to quantum attacks.

    Current quantum capabilities

    While current quantum computers are limited by noise and error rates, rapid advances in quantum error correction and hardware development suggest practical quantum computers may emerge within the next 10-15 years.

    Harvest now, decrypt later

    Adversaries may already be collecting encrypted data with the expectation of decrypting it once quantum computers become available.

    3. Current encryption vulnerabilities

    Most widely-used cryptographic systems will be vulnerable to quantum attacks:

    Public-key cryptography

    • • RSA - Vulnerable to Shor's algorithm
    • • ECC (Elliptic Curve Cryptography) - Vulnerable to quantum attacks
    • • Diffie-Hellman key exchange - Vulnerable to quantum attacks

    Symmetric cryptography

    Symmetric algorithms like AES are more resistant to quantum attacks, but key sizes may need to be increased to maintain security levels.

    Hash functions

    Current hash functions may be vulnerable to Grover's algorithm, requiring increased output lengths for quantum resistance.

    4. Post-quantum algorithms

    NIST has been evaluating post-quantum cryptographic algorithms since 2016. The selected standards include:

    CRYSTALS-Kyber

    A lattice-based key encapsulation mechanism selected for general encryption purposes. Offers strong security guarantees and efficient implementation.

    CRYSTALS-Dilithium

    A lattice-based digital signature algorithm selected for digital signatures. Provides strong security with relatively small key sizes.

    SPHINCS+

    A hash-based signature scheme selected as a backup option. While slower than lattice-based alternatives, it provides security based on well-understood hash function properties.

    FALCON

    A lattice-based signature scheme selected for applications requiring small signature sizes, such as embedded systems.

    5. Migration strategies

    Organizations should adopt a phased approach to post-quantum migration:

    Phase 1: Assessment

    • • Inventory all cryptographic systems and dependencies
    • • Identify critical data and communications
    • • Assess current quantum readiness

    Phase 2: Hybrid implementation

    • • Deploy hybrid classical/post-quantum systems
    • • Maintain backward compatibility
    • • Test performance and interoperability

    Phase 3: Full migration

    • • Transition to post-quantum-only systems
    • • Update protocols and standards
    • • Train staff on new systems

    6. VPN implications

    VPN services face unique challenges in the post-quantum transition:

    Key exchange protocols

    Current VPN protocols like IKEv2 and OpenVPN use classical key exchange methods that will be vulnerable to quantum attacks. Migration to post-quantum key exchange is essential.

    Performance considerations

    Post-quantum algorithms typically require more computational resources and bandwidth than classical alternatives, potentially impacting VPN performance.

    Backward compatibility

    VPN providers must balance quantum resistance with compatibility for users on older devices or software versions.

    Implementation timeline

    VPN providers should begin testing post-quantum algorithms now to ensure smooth transition when standards are finalized.

    7. Industry readiness

    Different sectors are at varying stages of post-quantum preparation:

    Financial services

    Banks and financial institutions are leading post-quantum adoption, recognizing the critical importance of protecting financial data and transactions.

    Government and defense

    Government agencies are implementing post-quantum standards for classified communications and critical infrastructure protection.

    Technology companies

    Major technology companies are developing post-quantum implementations and supporting standardization efforts.

    Healthcare and critical infrastructure

    These sectors are beginning to assess post-quantum requirements but may lag behind in implementation due to regulatory and operational constraints.

    8. Future timeline

    The transition to post-quantum cryptography will unfold over the next decade:

    2025-2027: Standardization and early adoption

    NIST standards will be finalized, and early adopters will begin implementing post-quantum algorithms in hybrid systems.

    2027-2030: Widespread deployment

    Major software and hardware vendors will integrate post-quantum algorithms, and organizations will begin large-scale migration projects.

    2030-2035: Quantum supremacy

    Practical quantum computers may emerge, making post-quantum cryptography essential rather than optional for security.

    2035+: Post-quantum era

    Classical cryptography will be largely deprecated, and quantum-resistant systems will become the standard for all secure communications.

    References

    1. [1]Google Quantum AI (2024) 'Quantum Supremacy Timeline', Google AI Blog. Available at: https://ai.google/research/teams/applied-science/quantum/ (Accessed: 21 January 2026).
    2. [2]IBM Research (2024) 'Quantum Computing Roadmap', IBM Research Blog. Available at: https://research.ibm.com/blog/ibm-quantum-roadmap (Accessed: 21 January 2026).
    3. [3]Microsoft Research (2024) 'Post-Quantum Migration Strategies', Microsoft Research. Available at: https://www.microsoft.com/en-us/research/project/post-quantum-cryptography/ (Accessed: 21 January 2026).
    4. [4]NIST (2024) 'Post-Quantum Cryptography Standardization', National Institute of Standards and Technology. Available at: https://csrc.nist.gov/projects/post-quantum-cryptography (Accessed: 21 January 2026).
    5. [5]NSA (2024) 'Quantum-Readiness Guidelines', National Security Agency Cybersecurity. Available at: https://www.nsa.gov/Cybersecurity/ (Accessed: 21 January 2026).

    NordVPN

    Top-rated VPN with excellent features

    Get Deal