Post-Quantum

PostQuantum.com by Marin Ivezic – Quantum Security, PQC, Quantum Resistance, CRQC, Q-Day, Y2Q

  • Toffoli Gate Quantum

    The Toffoli Gate: The Unsung Workhorse in Quantum Codebreaking

    Understanding the Toffoli gate’s role isn’t just an academic exercise – it has real implications for when and how quantum computers might break our cryptography. Each Toffoli gate isn’t a single physical operation on today’s hardware; it has to be decomposed into the basic operations a quantum machine can do…

    Read More »
  • Beyond PQC

    Mitigating Quantum Threats Beyond PQC

    The article explores limitations of PQC and explores alternative and complementary approaches to mitigate quantum risks. It provides technical analysis of each strategy, real-world examples of their deployment, and strategic recommendations for decision-makers. The goal is to illuminate why a diversified cryptographic defense – beyond just rolling out new algorithms…

    Read More »
  • Crypto-Agility

    Introduction to Crypto-Agility

    As we edge closer to the Q-Day—the anticipated moment when quantum computers will be capable of breaking traditional cryptographic systems—the need for crypto-agility becomes increasingly critical. Crypto-agility is the capability of an organization to swiftly and efficiently transition between different cryptographic algorithms and protocols in response to emerging threats and…

    Read More »
  • Post-Quantum Cryptograpy PQC

    Post-Quantum Cryptography (PQC) Introduction

    Post-Quantum Cryptography (PQC) refers to cryptographic algorithms (primarily public-key algorithms) designed to be secure against an attack by a future quantum computer. The motivation for PQC is the threat that large-scale quantum computers pose to current cryptographic systems. Today’s widely used public-key schemes – RSA, Diffie-Hellman, and elliptic-curve cryptography –…

    Read More »
  • Manual Cryptographic Inventory

    Dos & Don’ts of Crypto Inventories for Quantum Readiness

    Relying on asset owners, developers or IT personnel to identify and report in interviews or survey responses every instance of cryptographic usage is not just impractical; it simply does not work...

    Read More »
  • Ready for Quantum

    Ready for Quantum: Practical Steps for Cybersecurity Teams

    The journey towards quantum resistance is not merely about staying ahead of a theoretical threat but about evolving our cybersecurity practices in line with technological advancements. Starting preparations now ensures that organizations are not caught off guard when the landscape shifts. It’s about being informed, vigilant, and proactive—qualities essential to…

    Read More »
  • Next-Gen QKD

    Next-Generation QKD Protocols: A Cybersecurity Perspective

    Traditional QKD implementations have demonstrated provably secure key exchange, but they come with practical limitations. To address these limitations, researchers have developed next-generation QKD protocols. These advanced protocols improve security by reducing trust assumptions and mitigating device vulnerabilities, and they enhance performance (key rate, distance) through novel techniques. The article…

    Read More »
  • Tokenization Quantum

    Evaluating Tokenization in the Context of Quantum Readiness

    As the quantum era approaches, organizations face the daunting task of protecting their sensitive data from the looming threat of quantum computers. These powerful machines have the potential to render traditional cryptographic methods obsolete, making it imperative to explore innovative strategies for quantum readiness. One often overlooked yet highly promising…

    Read More »
  • Quantum Telecommunications Security

    Quantum Computing – Looming Threat to Telecom Security

    Since the early 2000s, the field of quantum computing has seen significant advancements, both in technological development and in commercialization efforts. The experimental demonstration of Shor's algorithm in 2001 proved to be one of the key catalyzing events, spurring increased interest and investment from both the public and private sectors.

    Read More »
  • D-Wave Dilution Refrigerator Quantum Annealer

    Adiabatic Quantum Computing (AQC) and Impact on Cyber

    Adiabatic Quantum Computing (AQC), and its variant Quantum Annealing, are another model for quantum computation. It's a specialized subset of quantum computing focused on solving optimization problems by finding the minimum (or maximum) of a given function over a set of possible solutions. For problems that can be presented as…

    Read More »
  • Entanglement-Based QKD

    Entanglement-Based QKD Protocols: E91 and BBM92

    While prepare-and-measure QKD currently leads the market due to simplicity and higher key rates, entanglement-based QKD protocols like E91 and BBM92 are at the heart of next-generation quantum communications. Ongoing improvements in photonic technology are steadily closing the gap in performance. The additional security guarantees (e.g., tolerance of untrusted devices)…

    Read More »
  • QKD BB84

    Quantum Key Distribution (QKD) and the BB84 Protocol

    Quantum Key Distribution (QKD) represents a radical advancement in secure communication, utilizing principles from quantum mechanics to distribute cryptographic keys with guaranteed security.Unlike classical encryption, whose security often relies on the computational difficulty of certain mathematical problems, QKD's security is based on the laws of physics, which are, as far…

    Read More »
  • Quantum Computing Security

    The Quantum Computing Threat

    The secret sauce of quantum computing, which even Einstein called "spooky," is the ability to generate and manipulate quantum bits of data or qubits. Certain computational tasks can be executed exponentially faster on a quantum processor using qubits, than on a classical computer with 1s and 0s. A qubit can…

    Read More »
  • PQC Upgrade Challenges

    Challenges of Upgrading to Post-Quantum Cryptography (PQC)

    The shift to post-quantum cryptography is not a distant problem but an imminent challenge that requires immediate attention. The quantum threat affects all forms of computing—whether it’s enterprise IT, IoT devices, or personal electronics. Transitioning to quantum-resistant algorithms is a complex, resource-intensive task that demands coordination across the supply chain,…

    Read More »
  • Quantum Computing Introduction

    What’s the Deal with Quantum Computing: Simple Introduction

    Quantum computing holds the potential to revolutionize fields where classical computers struggle, particularly in areas involving complex quantum systems, large-scale optimization, and cryptography. The power of quantum computing lies in its ability to leverage the principles of quantum mechanics—superposition and entanglement—to perform certain types of calculations much more efficiently than…

    Read More »