Post-Quantum

PostQuantum.com by Marin Ivezic – Quantum Security, PQC, Quantum Resistance, CRQC, Q-Day, Y2Q

  • Quantum Random Number Generation QRNG

    Introduction to Quantum Random Number Generation (QRNG)

    Cryptographic systems rely on the unpredictability and randomness of numbers to secure data. In cryptography, the strength of encryption keys depends on their unpredictability. Unpredictable and truly random numbers—those that remain secure even against extensive computational resources and are completely unknown to adversaries—are among the most essential elements in cryptography…

    Read More »
  • Shor's Algorithm Quantum

    Shor’s Algorithm: A Quantum Threat to Modern Cryptography

    Shor’s Algorithm is more than just a theoretical curiosity – it’s a wake-up call for the security community. By understanding its principles and implications, we can appreciate why the cryptographic landscape must evolve. The goal of this guide is to equip you with that understanding, without delving into complex mathematics,…

    Read More »
  • Grover's Algorithm

    Grover’s Algorithm and Its Impact on Cybersecurity

    Grover’s algorithm was one of the first demonstrations of quantum advantage on a general problem. It highlighted how quantum phenomena like superposition and interference can be harnessed to outperform classical brute force search. Grover’s is often described as looking for “a needle in a haystack” using quantum mechanics.

    Read More »
  • Quantum Safe Quantum Secure

    Quantum-Safe vs. Quantum-Secure Cryptography

    In 2010, I was serving as an interim CISO for an investment bank. During that time, I was already trying to figure out the risks posed by quantum computing. One day, I was approached by a vendor who, with great confidence, made two bold claims. First, they insisted that the…

    Read More »