Trending Post-Quantum, PQC Posts

    All Post-Quantum, PQC Posts

    • Post-Quantum Post-Quantum Cryptography PQC

      Post-Quantum Cryptography (PQC) Standardization – 2025 Update

      Post-quantum cryptography (PQC) is here - not in theory, but in practice. We have concrete algorithms, with standards guiding their implementation. They will replace our decades-old cryptographic infrastructure piece by piece over the next decade. For tech professionals, now is the time to get comfortable with lattices and new key sizes, to update libraries and protocols, and to ensure crypto agility in systems. The transition…

      Read More »
    • Post-Quantum NIST PQC Security Levels

      NIST PQC Security Strength Categories (1–5) Explained

      As part of its post-quantum cryptography (PQC) standardization, NIST introduced five security strength categories (often labeled Levels 1-5) to classify the robustness of candidate algorithms. Each category represents a minimum security level that a PQC algorithm’s cryptanalysis should require, defined by comparison to a well-understood "reference" problem in classical cryptography. In simpler terms, NIST set floors for security: if a PQC scheme claims to meet…

      Read More »
    • Post-Quantum Physics Quantum Cold War

      Physics at the Heart of the New Cold War

      In the 21st century, cutting-edge physics has moved from the laboratory into the realm of high geopolitics. Breakthroughs in quantum computing, advanced materials, and energy aren’t just academic - they are strategic assets coveted by nations. The situation echoes the mid-20th century, when projects like the Manhattan Project turned abstract physics into world-altering power. Today, governments are pouring billions into quantum technology and other physics-driven…

      Read More »
    • Post-Quantum Quantum Key Distribution QKD Cyber

      Quantum Key Distribution (QKD) 101: A Guide for Cybersecurity Professionals

      Quantum Key Distribution (QKD) is a cutting-edge security technology that leverages quantum physics to enable two parties to share secret encryption keys with unprecedented security guarantees. Unlike classical key exchange methods whose security rests on computational assumptions, QKD’s security is rooted in the laws of physics – any eavesdropping attempt will unavoidably disturb the quantum signals and reveal itself. With large-scale quantum computers on the…

      Read More »
    • Quantum Computing Adiabatic Quantum Computing Quantum Annealing

      Adiabatic Quantum (AQC) and Cyber (2024 Update)

      Adiabatic Quantum Computing (AQC) is an alternative paradigm that uses an analog process based on the quantum adiabatic theorem. Instead of discrete gate operations, AQC involves slowly evolving a quantum system’s Hamiltonian such that it remains in its lowest-energy (ground) state, effectively “computing” the solution as the system’s final state​. AQC and its practical subset known as quantum annealing are particularly geared toward solving optimization…

      Read More »
    • Quantum ComputingCybersecurity of Quantum Systems

      Quantum Hacking: Cybersecurity of Quantum Systems

      While these machines are not yet widespread, it is never too early to consider their cybersecurity​​. As quantum computing moves into cloud platforms and multi-user environments, attackers will undoubtedly seek ways to exploit them.

      Read More »
    • Post-Quantum Quantum AI QAI

      Post-Quantum Cryptography (PQC) Meets Quantum AI (QAI)

      Post-Quantum Cryptography (PQC) and Quantum Artificial Intelligence (QAI) are converging fields at the forefront of cybersecurity. PQC aims to develop cryptographic algorithms that can withstand attacks by quantum computers, while QAI explores the use of quantum computing and AI to both break and bolster cryptographic systems.

      Read More »
    • Post-Quantum Cryptographic Bill of Materials (CBOM)

      Cryptographic Bill of Materials (CBOM) Deep-Dive

      Cryptographic Bill of Materials (CBOM) represent the next evolution in software transparency and security risk management. As we have explored, a CBOM provides deep visibility into an application’s cryptographic underpinnings – an area that has often been opaque to security teams. By enumerating algorithms, keys, certificates, and their usage, CBOMs empower organizations to tackle challenges ranging from quantum cryptography transition and legacy crypto cleanup to…

      Read More »