Deep Dive Series

Long-form research across quantum computing and quantum security

Multi-article series with capstone analyses, interactive tools, and companion databases.


Getting Started With Quantum Security & PQC Migration
Getting Started With Quantum Security

A practitioner’s roadmap from mandate to migration


Quantum Security Reference
Quantum Security Reference

Essential concepts for security leaders


CRQC Quantum Capability Framework
CRQC Capability Framework

Nine capabilities needed to break cryptography


Predicting Q-Day
Predicting Q-Day

Frameworks, forecasts, and the real deadline


Quantum Computing Modalities
Quantum Computing Modalities

Every hardware approach compared


What It Takes to Build a Quantum Computer
What It Takes to Build a QC

From qubits to fault tolerance


Quantum Computing Companies & Roadmaps
Quantum Computing Companies

60+ hardware companies profiled and compared


The Quantum Utility Map
The Quantum Utility Map

What fault-tolerant quantum computers will actually do


Quantum Systems Integration & QOA
Quantum Systems Integration

Open architecture and multi-vendor design


China's Quantum Ambition
China’s Quantum Ambition

Could Beijing win the quantum race?


Quantum Sovereignty
Quantum Sovereignty

Strategic independence in the quantum era


Quantum Snake Oil Dictionary
Quantum Snake Oil Dictionary

Spotting hype, scams, and misused terms

Articles & Analysis

Quantum Computing, Quantum Security, PQC & Quantum Sovereignty

The 2027 Procurement Gate: Why CNSA 2.0 Compliance Starts Now

January 1, 2027 is when CNSA 2.0 stops being guidance and becomes a procurement gate. Combined with the FIPS 140-2 sunset in September and CMMC enforcement in November, it creates a five-month compliance squeeze that cannot be solved by urgency ...

CNSA 2.0: The Complete Guide to NSA’s Post-Quantum Requirements

The definitive vendor-neutral reference to NSA's Commercial National Security Algorithm Suite 2.0 — the most operationally specific post-quantum cryptography mandate in the world. This guide breaks down every component of CNSA 2.0 in one place: the complete algorithm suite with ...

CNSA 2.0 vs. the World: Navigating Diverging Global PQC Requirements

The world's major cryptographic authorities agree that post-quantum migration is necessary. They disagree on nearly everything else: which algorithms, which parameter levels, whether hybrid is mandatory, and whether NIST's standards are sufficient ...

CNSA 2.0 for the Defense Industrial Base

CNSA 2.0 applies to National Security Systems. The requirements cascade to every prime contractor, sub-tier supplier, and commercial vendor selling into classified environments — arriving alongside CMMC 2.0 enforcement and a FIPS 140-3 validation bottleneck ...

CNSA 2.0 Beyond NSS: Why Financial Services Is Adopting It Anyway

CNSA 2.0 technically applies only to National Security Systems. In practice, its algorithm choices are appearing in financial services procurement language, board-level risk assessments, and counterparty due diligence — creating a de facto standard for high-assurance cryptography far beyond its ...

The SLH-DSA Exclusion: Why NSA Left Out NIST’s Conservative Fallback

NSA excluded NIST's hash-based signature algorithm from CNSA 2.0 and stated it does not plan to add future post-quantum standards. The decision reveals how NSA thinks about lattice security, operational simplicity, and the trade-offs that other national authorities resolve differently ...

Preparing for Crypto’s Quantum Future: A Practical Guide

The quantum threat to cryptocurrencies is real but not imminent. The migration will take years. This guide translates the full series into specific actions, segmented by who you are and what you control ...

Beyond Bitcoin and Ethereum: Quantum Vulnerabilities Across the Blockchain Ecosystem

Zcash aims for full post-quantum security by 2027. Solana's two core teams independently chose Falcon. Algorand deployed PQ signatures in 2022. QRL has been quantum-safe since 2018. The blockchain ecosystem's quantum readiness varies from leading-edge to nonexistent ...

Bitcoin’s Quantum Migration: The Decade Is Political, Not Technical

Jameson Lopp proposed freezing 6.5 million quantum-vulnerable Bitcoin. The community called it authoritarian within hours. The engineering exists. Whether Bitcoin's decentralized governance can coordinate action against a time-bounded threat is the open question ...

Fixing the Lightning Network: A Protocol-Level Migration Roadmap

Fixing Lightning requires changes to every layer of the protocol stack, from Noise transport through Sphinx routing to on-chain HTLC settlement. This is the BOLT-by-BOLT migration roadmap, structured by what can be shipped now versus what requires a Bitcoin consensus ...

The Lightning Network’s Quantum Problem: Why Layer 2 Is Harder Than Layer 1

Lightning's quantum vulnerability runs deeper than Bitcoin Layer 1. The protocol requires continuous public key exposure across funding, routing, gossip, and revocation. Application-layer upgrades can protect metadata, but fund security demands a base-layer consensus change ...

Ethereum’s Five Quantum Vulnerabilities: Why Smart Contracts Change Everything

Ethereum's quantum exposure goes far beyond wallet signatures. Five distinct vulnerability classes threaten accounts, admin keys, smart contracts, validator consensus, and the data availability layer, each with different attack mechanics and different mitigation paths ...

PostQuantum.com AI Explainer

An AI tool that answers questions using a curated corpus of information from PostQuantum.com, NIST, NSA, and ENISA and other reliable sources. Ask anything related to quantum computing or quantum security.