Post-Quantum Cryptography (PQC)
Post-quantum cryptography develops algorithms that resist quantum attacks, ensuring long-term security for sensitive data against both classical and quantum threats.
Post-quantum [cryptography](/en/terms/quantum-cryptography) studies algorithms and protocols that are secure against quantum adversaries capable of running Shor-like algorithms. It covers public-key cryptosystems, digital signatures, and cryptographic protocols. The goal is to ensure confidentiality, integrity, and authenticity even when large-scale fault-tolerant quantum computers become feasible. Common families include lattice-based, code-based, multivariate, and hash-based cryptography. Transition strategies emphasize agility, standardization (e.g., NIST PQC process), and interoperability, including hybrid deployments during the migration from legacy schemes.
graph LR
Center["Post-Quantum Cryptography (PQC)"]:::main
Pre_asymmetric_encryption["asymmetric-encryption"]:::pre --> Center
click Pre_asymmetric_encryption "/terms/asymmetric-encryption"
Rel_homomorphic_encryption["homomorphic-encryption"]:::related -.-> Center
click Rel_homomorphic_encryption "/terms/homomorphic-encryption"
Rel_lattice_based_cryptography["lattice-based-cryptography"]:::related -.-> Center
click Rel_lattice_based_cryptography "/terms/lattice-based-cryptography"
Rel_decryption["decryption"]:::related -.-> Center
click Rel_decryption "/terms/decryption"
classDef main fill:#7c3aed,stroke:#8b5cf6,stroke-width:2px,color:white,font-weight:bold,rx:5,ry:5;
classDef pre fill:#0f172a,stroke:#3b82f6,color:#94a3b8,rx:5,ry:5;
classDef child fill:#0f172a,stroke:#10b981,color:#94a3b8,rx:5,ry:5;
classDef related fill:#0f172a,stroke:#8b5cf6,stroke-dasharray: 5 5,color:#94a3b8,rx:5,ry:5;
linkStyle default stroke:#4b5563,stroke-width:2px;
🧒 Explain Like I'm 5
New types of secret codes that even future, super-powerful quantum computers won't be able to crack.
🤓 Expert Deep Dive
Generated expert content