TIMELINE

Post-Quantum Cryptography

 

Emergence of Quantum Mechanics in Information Theory

1970s

The concept of quantum mechanics in relation to information theory emerges.

Initiation of Post-Quantum Cryptography (PQC) Research

2017

NIST announces the initiation of the first round of PQC algorithm candidates. 

Publication of Initial PQC Algorithm Specifications

August 2023

NIST publishes the initial specification draft for three PQC algorithms.

 

Adoption of Hybrid Cryptography Schemes

2025-2030

Adoption of hybrid schemes combining pre-quantum cryptography with Post-Quantum Cryptography to safeguard data and operations anticipated to be relevant after 2030.

Introduction of Shor’s Algorithm

1994

Shor’s algorithm, the inaugural quantum algorithm, emerges as a threat to public key cryptography.

PQC Algorithm Development Phases

Dec 21 2017

NIST manages three additional rounds of PQC algorithm development.

Official Release of First PQC Algorithm Specifications

August 2024

Expected release date for the official specifications of the first three PQC algorithms.

Transition to Post-Quantum Cryptography

2030 and beyond

PQC becomes the primary choice, gradually phasing out hybridization.

Unleash the power of PKI

The Nexus Smart ID PKI allows governments and businesses to enable trust with certificate-based identities for citizens, employees, applications, things, and smart devices. Providing a solid security foundation for strong authentication, email encryption, digital signing, and securing IoT devices and applications.

Test our PKI service against NIST algorithms!

- FIPS 203 (ML-KEM or CRYSTALS-Kyber)
- FIPS 204 (ML-DSA or CRYSTALS-Dilithium)
- FIPS 205 (SLH-DSA or SPHINCS+)

 SIGN UP FOR OUR PKI SERVICE LEARN MORE ABOUT NEXUS PKI 

 

Be Quantum-ready

Nexus guide to protecting your organization from quantum threat
 

From quantum computing to quantum threat to post-quantum computing, discover everything you need to know to be Quantum-ready.

ACCESS OUR FREE GUIDE 

 

FAQ Post-Quantum Cryptography (PQC)

What are quantum computers?
Quantum threat: what is the impact on our current digital infrastructures?
Quantum threat: what about symmetric cryptography?
Why the quantum threat should be taken into account today?
Is quantum key distribution a solution?
What is post-quantum cryptography?
What are the different post-quantum algorithms?
Are the future NIST standards mature enough to be implemented in security products?
How to transition smoothly from pre-quantum to post-quantum algorithms?
What is cryptoagility?