Knowledge Base of quantum threats and quantum resistant algorithms
Cryptography is a branch of mathematics that studies methods of protecting information through mathematical transformations.
Learn more
Quantum computers are a new generation of computing devices that exploit the effects of quantum mechanics.
Learn more
The risk that a malicious actor could gain unauthorized access to data through a cyberattack carried out using a quantum computer.
Learn more
Cryptographic algorithms designed to resist attacks performed using quantum computers.
Learn more
Both approaches provide protection against quantum-computer-based attacks, but each has its own distinct characteristics. The choice between PQC and QKD depends on the specific objectives and use cases. In most cases, the optimal solution is to combine both approaches.
Learn more
A family of asymmetric cryptographic algorithms designed to remain secure against both classical and quantum attacks.
Learn more
A quantum algorithm for integer factorization.
Learn more
A quantum algorithm for solving unstructured search problems.
Learn more
A family of quantum-resistant cryptographic algorithms whose security relies on the assumed computational hardness of solving systems of nonlinear multivariate polynomial equations over a finite field.
Learn more
Cryptographic algorithms in this family offer relatively high performance but require large key sizes.
Learn more
Cryptographic algorithms in this family offer relatively high performance and feature moderate key sizes.
Learn more
Notable features of this class of algorithms include short public and secret keys, along with well-established, conservative security guarantees.
Learn more
Cryptographic algorithms in this family typically have lower performance but provide short public keys and compact ciphertexts.
Learn more
In the context of post-quantum cryptography, hybrid cryptography refers to an approach that combines two or more key-encapsulation mechanisms — typically one classical and one post-quantum.
Learn more
Secure computation protocols enable data scientists and analysts to perform collaborative, privacy-preserving computations on distributed data without revealing or transferring the underlying data.
Learn more
An encryption method that allows certain computations to be performed directly on ciphertext, such that the decrypted result is identical to the result of performing those same operations on the original plaintext.
Learn more
A type of public-key encryption in which both the user's secret key and the encrypted data are tied to attributes. Decryption succeeds only when the attributes embedded in the user's key match those associated with the ciphertext.
Learn more
A type of asymmetric encryption in which a user's public key is derived by applying a publicly known algorithm — typically a hash function — to the user's identity information.

Learn more
A standardization process organized by the U.S. National Institute of Standards and Technology (NIST) with the goal of standardizing quantum-resistant key-encapsulation mechanisms and digital signature schemes.
Learn more
An additional competition has been announced to standardize digital signature schemes.
Learn more
On August 13, 2024, the U.S. National Institute of Standards and Technology (NIST) published the final versions of its first post-quantum cryptography standards:
  • FIPS 203 (ML-KEM)
  • FIPS 204 (ML-DSA)
  • FIPS 205 (SLH-DSA)
Learn more
A post-quantum cryptography algorithm selection competition held in 2018–2019 by the Chinese Association for Cryptologic Research (CACR).
Learn more
Technical Committee 26 of Rosstandart develops normative documents covering cryptographic mechanisms used in the Russian Federation.
Learn more
GOST cryptography encompasses the core cryptographic algorithms, protocols, and methods of their application as defined in the national standards currently in force in the Russian Federation and other officially approved regulatory documents.
Learn more
Neven's Law states that the computational power of quantum computers scales at a doubly exponential rate compared to classical computers.
Learn more
The Google Quantum AI research team has published a new estimate of the number of qubits required to recover the private key of an RSA-2048 cryptosystem.
Learn more
An attack in which an adversary attempts to compromise a cryptosystem by measuring and analyzing the time it takes to perform cryptographic operations.
Learn more
Secure computation protocols enable data scientists and analysts to perform collaborative, privacy-preserving computations on distributed data without revealing or transferring the underlying data.
Learn more
An encryption method that allows certain computations to be performed directly on ciphertext, such that the decrypted result is identical to the result of performing those same operations on the original plaintext.
Learn more
Cryptography is a branch of mathematics that studies methods of protecting information through mathematical transformations.
Learn more
Quantum computers are a new generation of computing devices that exploit the effects of quantum mechanics.
Learn more
Cryptographic algorithms designed to resist attacks performed using quantum computers.
Learn more
A family of asymmetric cryptographic algorithms designed to remain secure against both classical and quantum attacks.
Learn more
A family of quantum-resistant cryptographic algorithms whose security relies on the assumed computational hardness of solving systems of nonlinear multivariate polynomial equations over a finite field.
Learn more
Cryptographic algorithms in this family offer relatively high performance but require large key sizes.
Learn more
Cryptographic algorithms in this family offer relatively high performance and feature moderate key sizes.
Learn more
Notable features of this class of algorithms include short public and secret keys, along with well-established, conservative security guarantees.
Learn more
Cryptographic algorithms in this family typically have lower performance but provide short public keys and compact ciphertexts.
Learn more
In the context of post-quantum cryptography, hybrid cryptography refers to an approach that combines two or more key-encapsulation mechanisms — typically one classical and one post-quantum.
Learn more
A type of public-key encryption in which both the user's secret key and the encrypted data are tied to attributes. Decryption succeeds only when the attributes embedded in the user's key match those associated with the ciphertext.
Learn more
A type of asymmetric encryption in which a user's public key is derived by applying a publicly known algorithm — typically a hash function — to the user's identity information.

Learn more
An attack in which an adversary attempts to compromise a cryptosystem by measuring and analyzing the time it takes to perform cryptographic operations.
Learn more
A standardization process organized by the U.S. National Institute of Standards and Technology (NIST) with the goal of standardizing quantum-resistant key-encapsulation mechanisms and digital signature schemes.
Learn more
An additional competition has been announced to standardize digital signature schemes.
Learn more
On August 13, 2024, the U.S. National Institute of Standards and Technology (NIST) published the final versions of its first post-quantum cryptography standards:
  • FIPS 203 (ML-KEM)
  • FIPS 204 (ML-DSA)
  • FIPS 205 (SLH-DSA)
Learn more
A post-quantum cryptography algorithm selection competition held in 2018–2019 by the Chinese Association for Cryptologic Research (CACR).
Learn more
Technical Committee 26 of Rosstandart develops normative documents covering cryptographic mechanisms used in the Russian Federation.
Learn more
GOST cryptography encompasses the core cryptographic algorithms, protocols, and methods of their application as defined in the national standards currently in force in the Russian Federation and other officially approved regulatory documents.
Learn more
The risk that a malicious actor could gain unauthorized access to data through a cyberattack carried out using a quantum computer.
Learn more
Quantum computers are a new generation of computing devices that exploit the effects of quantum mechanics.
Learn more
A quantum algorithm for integer factorization.
Learn more
A quantum algorithm for solving unstructured search problems.
Learn more
The Google Quantum AI research team has published a new estimate of the number of qubits required to recover the private key of an RSA-2048 cryptosystem.
Learn more
Neven's Law states that the computational power of quantum computers scales at a doubly exponential rate compared to classical computers.
Learn more