Post-Quantum

PostQuantum.com by Marin Ivezic – Quantum Security, PQC, Quantum Resistance, CRQC, Q-Day, Y2Q

  • Quantum Computer RSA Security Post-Quantum

    Breaking RSA Encryption: Quantum Hype Meets Reality (2022-2025)

    To put it plainly, if you encrypted a message with an RSA-2048 public key today, no one on Earth knows how to factor it with currently available technology, even if they threw every quantum computer and supercomputer we have at the task. That may change in the future – perhaps…

    Read More »
  • Post-Quantum Cryptography PQC

    Post-Quantum Cryptography (PQC) Standardization – 2025 Update

    Post-quantum cryptography (PQC) is here - not in theory, but in practice. We have concrete algorithms, with standards guiding their implementation. They will replace our decades-old cryptographic infrastructure piece by piece over the next decade. For tech professionals, now is the time to get comfortable with lattices and new key…

    Read More »
  • NIST PQC Security Levels

    NIST PQC Security Strength Categories (1–5) Explained

    As part of its post-quantum cryptography (PQC) standardization, NIST introduced five security strength categories (often labeled Levels 1-5) to classify the robustness of candidate algorithms. Each category represents a minimum security level that a PQC algorithm’s cryptanalysis should require, defined by comparison to a well-understood "reference" problem in classical cryptography.…

    Read More »
  • Physics Quantum Cold War

    Physics at the Heart of the New Cold War

    In the 21st century, cutting-edge physics has moved from the laboratory into the realm of high geopolitics. Breakthroughs in quantum computing, advanced materials, and energy aren’t just academic - they are strategic assets coveted by nations. The situation echoes the mid-20th century, when projects like the Manhattan Project turned abstract…

    Read More »
  • Quantum Key Distribution QKD Cyber

    Quantum Key Distribution (QKD) 101: A Guide for Cybersecurity Professionals

    Quantum Key Distribution (QKD) is a cutting-edge security technology that leverages quantum physics to enable two parties to share secret encryption keys with unprecedented security guarantees. Unlike classical key exchange methods whose security rests on computational assumptions, QKD’s security is rooted in the laws of physics – any eavesdropping attempt…

    Read More »
  • Adiabatic Quantum Computing Quantum Annealing

    Adiabatic Quantum (AQC) and Cyber (2024 Update)

    Adiabatic Quantum Computing (AQC) is an alternative paradigm that uses an analog process based on the quantum adiabatic theorem. Instead of discrete gate operations, AQC involves slowly evolving a quantum system’s Hamiltonian such that it remains in its lowest-energy (ground) state, effectively “computing” the solution as the system’s final state​.…

    Read More »
  • Cybersecurity of Quantum Systems

    Quantum Hacking: Cybersecurity of Quantum Systems

    While these machines are not yet widespread, it is never too early to consider their cybersecurity​​. As quantum computing moves into cloud platforms and multi-user environments, attackers will undoubtedly seek ways to exploit them.

    Read More »
  • QAI

    Post-Quantum Cryptography (PQC) Meets Quantum AI (QAI)

    Post-Quantum Cryptography (PQC) and Quantum Artificial Intelligence (QAI) are converging fields at the forefront of cybersecurity. PQC aims to develop cryptographic algorithms that can withstand attacks by quantum computers, while QAI explores the use of quantum computing and AI to both break and bolster cryptographic systems.

    Read More »
  • Cryptographic Bill of Materials (CBOM)

    Cryptographic Bill of Materials (CBOM) Deep-Dive

    Cryptographic Bill of Materials (CBOM) represent the next evolution in software transparency and security risk management. As we have explored, a CBOM provides deep visibility into an application’s cryptographic underpinnings – an area that has often been opaque to security teams. By enumerating algorithms, keys, certificates, and their usage, CBOMs…

    Read More »
  • Quantum Readiness Cryptographic Inventory

    How to Perform a Comprehensive Quantum Readiness Cryptographic Inventory

    A cryptographic inventory is essentially a complete map of all cryptography used in an organization’s systems – and it is vital for understanding quantum-vulnerable assets and planning remediation. In theory it sounds straightforward: “list all your cryptography.” In practice, however, building a full cryptographic inventory is an extremely complex, lengthy…

    Read More »
  • 4,099 Qubits Quantum RSA Shor

    4,099 Qubits: The Myth and Reality of Breaking RSA-2048 with Quantum Computers

    4,099 is the widely cited number of quantum bits one would need to factor a 2048-bit RSA key using Shor’s algorithm – in other words, the notional threshold at which a quantum computer could crack one of today’s most common encryption standards. The claim has an alluring simplicity: if we…

    Read More »
  • Telecom PQC Quantum Challenges

    Telecom’s Quantum‑Safe Imperative: Challenges in Adopting Post‑Quantum Cryptography

    The race is on to quantum‑proof the world’s telecom networks. With cryptographically relevant quantum computers (CRQC) projected to arrive by the 2030s, global communications providers face an urgent mandate to upgrade their security foundations. Today’s mobile and fixed‑line networks rely on public-key cryptography that quantum algorithms could eventually break. In…

    Read More »
  • Cryptocurrencies Bitcoin Quantum Computing

    Quantum Computing Risks to Cryptocurrencies – Bitcoin, Ethereum, and Beyond

    Cryptocurrencies like Bitcoin and Ethereum derive their security from cryptographic algorithms – mathematical puzzles that are practically impossible for classical computers to solve in any reasonable time. However, the emergence of quantum computing threatens this security assumption. Unlike classical machines, quantum computers leverage quantum mechanics to perform certain computations exponentially…

    Read More »
  • what will happen q-day y2q quantum

    What Will Really Happen Once Q-Day Arrives – When Our Current Cryptography Is Broken?

    As the world edges closer to the era of powerful quantum computers, experts warn of an approaching “Q-Day” (sometimes called Y2Q or the Quantum Apocalypse): the day a cryptographically relevant quantum computer can break our current encryption. Unlike the Y2K bug—which had a fixed deadline and was mostly defused before…

    Read More »
  • Q-Day CRQC Quantum

    Q-Day Predictions: Anticipating the Arrival of CRQC

    While CRQCs capable of breaking current public key encryption algorithms have not yet materialized, technological advancements are pushing us towards what is ominously dubbed 'Q-Day'—the day a CRQC becomes operational. Many experts believe that Q-Day, or Y2Q as it's sometimes called, is just around the corner, suggesting it could occur…

    Read More »