
Post-quantum cryptography: protecting the future of digital interactions
Cryptography keeps our everyday life secure, using algorithms that are too difficult - or time-consuming - for conventional computers to crack. But a new generation of quantum computers is being developed, which will be far more powerful.
To keep the world’s data secure against this emerging threat, a new form of cryptography is needed: post-quantum cryptography (PQC). PQC uses algorithms sophisticated enough to withstand even quantum-powered cyber-attacks, ensuring long-term cybersecurity.
The threat from quantum computing
In the ever-evolving world of digital security, post-quantum cryptography (PQC) represents the next frontier in safeguarding our data against the rising threat of quantum computing. As quantum computers become more powerful, they pose a significant risk to our traditional encryption which currently protects everything from our everyday online activities such as banking, online shopping, and emailing but also safeguarding critical infrastructure and state secrets.
Basics of today's cryptography
Public-key cryptography, also known as asymmetric cryptography, involves a pair of keys: a public key which can be shared widely and a private key which is kept secret by the owner. In contrast, private-key cryptography, or symmetric cryptography, uses a single key that must be shared between the communicating parties in secret. The security of public-key systems generally relies on mathematical problems that are currently difficult to solve without the private key, such as factoring large integers – used in Rivest-Sharmir-Adelmann (RSA) – or computing discrete logarithms used in elliptic curve cryptography (ECC). Private-key cryptography such as the block cipher AES (Advanced Encryption Standard), on the other hand is based on combining several well-established cryptographic principles and operations – like iterated permutations, combining linear and non-linear operations – that together create a secure and efficient system.
Why quantum computers are becoming a threat
The advent of quantum computers poses significant challenges to these cryptographic systems. Shor's algorithm, which can only run on a quantum computer, offers an exponential speedup for factoring large integers and compute discrete logarithms, thereby breaking public-key cryptosystems like RSA and ECC. On the other hand, Grover's algorithm can quadratically speed up the search for a specific key from a set of possible keys, potentially reducing the security of symmetric key systems. This can easily be circumvented by doubling the key length (to a level that most of today's systems already employ). Thus, the rise of quantum computing will compromise the security foundations today's public-key cryptography and push private-key cryptography to longer keys. Therefore quantum-safe cryptography needs to be adopted.
The role of NIST in post-quantum cryptography standardization
Recognizing the urgency of developing quantum-resistant algorithms, the US National Institute of Standards and Technology (NIST) has been actively leading the charge. In 2016, NIST has started a request for submitting quantum-resistant algorithms, finally in 2024 three PQC algorithms were standardized (FIPS 203, Module-Lattice-Based Key-Encapsulation Mechanism Standard, FIPS 204, Module-Lattice-Based Digital Signature Standard and FIPS 205, Stateless Hash-Based Digital Signature Standard). NIST continues the evaluation of further algorithms. For instance, a standard for a backup key encapsulation mechanism will be developed in the coming years.
The impact of the NIST-standards and the transition to PQC will be profound and far-reaching. As we move closer to a world where quantum computing is a common reality, the work done by NIST and other organizations in this field will ensure that our digital life remains secure and private. It's not just about preventing potential future threats; it's about taking proactive steps today to safeguard our tomorrow. Embrace the future confidently with PQC, your key to secure digital communications in the quantum age.
Preparing your business for quantum-safe security
Cryptography is the secret source that keeps our everyday life secure. Whole ecosystems, e.g. around payment transactions, mobile communication or identity proving need to stay active to keep their products safe and prepare for a quantum-safe future.

Download whitepaper
Learn in our whitepaper everything you need to know about quantum-safe cryptography, how it impacts your business and best practices to prepare for security in the quantum age.
FAQs about post-quantum cryptography
Post-quantum cryptography services by G+D and secunet
For several years G+D, has been deeply involved in funded initiatives aimed at implementing and optimizing quantum-resistant algorithms. We are developing prototypes in our three segments Digital Security, Financial Platforms and Currency Technology while actively participating in and contributing to the standardization efforts in these domains. As the standards for post-quantum cryptography become finalized, we are positioned to deliver products enhanced with PQC capabilities. Our publicly listed subsidiary, secunet, already provides a market-ready solution:
Explore our products & solutions

PQC-enhanced SINA by secunet
With quantum computing rapidly evolving, the threat for sensitive data becomes imminent. In the "store now, decrypt later" scenario data encrypted today already faces the risk of future decryption. secunet’s SINA product family utilizes advanced cryptographic technologies to anticipate and mitigate these threats effectively. The SINA portfolio offers tailored hardware platforms designed specifically for secure handling of sensitive data. This involves elements of PQC that help organizations to protect themselves from the "store now, decrypt later" scenario. The portfolio is constantly being further developed, consistently pursuing the path of quantum security.
More insights into post-quantum cryptography
Get in touch
If you have any questions about our end-to-end business solutions or about our SecurityTech company, seek expert advice, or want to give us your feedback, our team is here to support you, anytime.