G+D Magazine
EN DE
a digital animation of a classic red lock in front of digital numbers and figures

Post-quantum cryptography: protecting the future of digital interactions

Cryptography keeps our everyday life secure, using algorithms that are too difficult - or time-consuming - for conventional computers to crack. But a new generation of quantum computers is being developed, which will be far more powerful.

To keep the world’s data secure against this emerging threat, a new form of cryptography is needed: post-quantum cryptography (PQC). PQC uses algorithms sophisticated enough to withstand even quantum-powered cyber-attacks, ensuring long-term cybersecurity.

The threat from quantum computing

In the ever-evolving world of digital security, post-quantum cryptography (PQC) represents the next frontier in safeguarding our data against the rising threat of quantum computing. As quantum computers become more powerful, they pose a significant risk to our traditional encryption which currently protects everything from our everyday online activities such as banking, online shopping, and emailing but also safeguarding critical infrastructure and state secrets.

Basics of today's cryptography

Public-key cryptography, also known as asymmetric cryptography, involves a pair of keys: a public key which can be shared widely and a private key which is kept secret by the owner. In contrast, private-key cryptography, or symmetric cryptography, uses a single key that must be shared between the communicating parties in secret. The security of public-key systems generally relies on mathematical problems that are currently difficult to solve without the private key, such as factoring large integers – used in Rivest-Sharmir-Adelmann (RSA) – or computing discrete logarithms used in elliptic curve cryptography (ECC). Private-key cryptography such as the block cipher AES (Advanced Encryption Standard), on the other hand is based on combining several well-established cryptographic principles and operations – like iterated permutations, combining linear and non-linear operations – that together create a secure and efficient system.

artsy variant of a classic lock in silver gold on a laptop touchpad

Why quantum computers are becoming a threat

The advent of quantum computers poses significant challenges to these cryptographic systems. Shor's algorithm, which can only run on a quantum computer, offers an exponential speedup for factoring large integers and compute discrete logarithms, thereby breaking public-key cryptosystems like RSA and ECC. On the other hand, Grover's algorithm can quadratically speed up the search for a specific key from a set of possible keys, potentially reducing the security of symmetric key systems. This can easily be circumvented by doubling the key length (to a level that most of today's systems already employ). Thus, the rise of quantum computing will compromise the security foundations today's public-key cryptography and push private-key cryptography to longer keys. Therefore quantum-safe cryptography needs to be adopted.

The role of NIST in post-quantum cryptography standardization

Recognizing the urgency of developing quantum-resistant algorithms, the US National Institute of Standards and Technology (NIST) has been actively leading the charge. In 2016, NIST has started a request for submitting quantum-resistant algorithms, finally in 2024 three PQC algorithms were standardized (FIPS 203, Module-Lattice-Based Key-Encapsulation Mechanism Standard, FIPS 204, Module-Lattice-Based Digital Signature Standard and FIPS 205, Stateless Hash-Based Digital Signature Standard). NIST continues the evaluation of further algorithms. For instance, a standard for a backup key encapsulation mechanism will be developed in the coming years.

The impact of the NIST-standards and the transition to PQC will be profound and far-reaching. As we move closer to a world where quantum computing is a common reality, the work done by NIST and other organizations in this field will ensure that our digital life remains secure and private. It's not just about preventing potential future threats; it's about taking proactive steps today to safeguard our tomorrow. Embrace the future confidently with PQC, your key to secure digital communications in the quantum age.

Preparing your business for quantum-safe security

Cryptography is the secret source that keeps our everyday life secure.  Whole ecosystems, e.g. around payment transactions, mobile communication or identity proving need to stay active to keep their products safe and prepare for a quantum-safe future. 

Download whitepaper

Learn in our whitepaper everything you need to know about quantum-safe cryptography, how it impacts your business and best practices to prepare for security in the quantum age.

FAQs about post-quantum cryptography

What is the purpose of post-quantum cryptography (PQC)?
What is a cryptographically relevant quantum computer?
When are cryptographically relevant quantum computers available?
How do quantum computers threaten cybersecurity?
Is all currently used cryptography affected by the threat of quantum computer?
What is public-key cryptography?
What is private-key cryptography?
What is the difference between traditional cryptography and post-quantum cryptography?
Which quantum computing threats are affecting my business now?

Post-quantum cryptography services by G+D and secunet

For several years G+D, has been deeply involved in funded initiatives aimed at implementing and optimizing quantum-resistant algorithms. We are developing prototypes in our three segments Digital Security, Financial Platforms and Currency Technology  while actively participating in and contributing to the standardization efforts in these domains. As the standards for post-quantum cryptography become finalized, we are positioned to deliver products enhanced with PQC capabilities. Our publicly listed subsidiary, secunet, already provides a market-ready solution:

Explore our products & solutions

Secunet SINA Product showing multiple electronic devices including a computer screen. a telephone, a laptop and harddrive in front of a white screen

PQC-enhanced SINA by secunet

With quantum computing rapidly evolving, the threat for sensitive data becomes imminent. In the "store now, decrypt later" scenario data encrypted today already faces the risk of future decryption. secunet’s SINA product family utilizes advanced cryptographic technologies to anticipate and mitigate these threats effectively. The SINA portfolio offers tailored hardware platforms designed specifically for secure handling of sensitive data. This involves elements of PQC that help organizations to protect themselves from the "store now, decrypt later" scenario. The portfolio is constantly being further developed, consistently pursuing the path of quantum security.

More insights into post-quantum cryptography

Post-Quantum Cryptography and Quantum-Resistant Cryptography – PQC – Conceptual Illustration

Quantum computing and CBDC cybersecurity

The risk to CBDC wallets’ security from quantum computing needs to be reckoned with now. The technological developments fueling the threat to existing cryptography are moving too quickly to allow for the slow adoption of countermeasures.

Double exposure of abstract programming language hologram with world map and hands typing on laptop on background, research and development concept
Insights into careers in cryptography

Cryptography is an ancient field with very modern applications. However, for many people the area remains something of a mystery. A G+D expert in the field shares some insights about life as a cryptographer and the many ways in which cryptography touches our lives every day.

Get in touch

If you have any questions about our end-to-end business solutions or about our SecurityTech company, seek expert advice, or want to give us your feedback, our team is here to support you, anytime.