
Every day brings us closer to a future where quantum computers could radically change the cybersecurity landscape. Equipped with exponential computing power, these devices will be capable of executing algorithms like Shor's and Grover's, which can compromise classical cryptographic systems.
Shor's algorithm, for example, allows for rapid factorization of integers, rendering protocols like RSA (an asymmetric encryption algorithm based on the difficulty of factorization) vulnerable. Grover's algorithm accelerates the search through unstructured spaces, drastically reducing the security of symmetric ciphers like AES (Advanced Encryption Standard, widely used to protect digital data).
In the face of threats like "harvest now, decrypt later"—storing data today to decrypt with quantum hardware in the future—it is essential to start preparing now.
This article is aimed at developers, CTOs, and companies managing critical infrastructures and long-life cycle systems, offering a practical and updated overview of how to transition to post-quantum cryptography.
Post-Quantum Cryptography (PQC) is a set of cryptographic algorithms designed to withstand attacks from future quantum computers. Unlike classical cryptography, which relies on mathematical problems currently considered insurmountable for traditional computers (such as factorization or discrete logarithms), PQC leverages computational problems that even a quantum computer cannot solve within feasible timeframes.
The main objectives of PQC are:
The NIST (National Institute of Standards and Technology) is a U.S. government agency that develops globally recognized technological standards, including cryptographic ones. Since 2016, NIST has initiated a public program for selecting PQC algorithms to standardize those resistant to future quantum computers.
In July 2022, NIST announced the first finalist algorithms:
These algorithms are lattice-based, chosen for efficiency, robustness, and compatibility with hardware implementations. The official publication of the standards is expected by 2025.
In Europe, ETSI (European Telecommunications Standards Institute) and ENISA (European Union Agency for Cybersecurity) support the transition to quantum-safe cryptography, providing guidelines for critical sectors and promoting crypto agility.
Lattice-based cryptography is grounded in mathematical problems related to the complexity of finding structures within high-dimensional numerical lattices. These problems are considered challenging even for quantum computers and form the basis of many NIST-selected algorithms.
Advantages:
Use cases:
The concept of crypto agility refers to the ability to quickly update cryptographic algorithms in use without having to completely redesign the system. In a context where security standards evolve rapidly, this flexibility is crucial for long-term data protection.
These actions lay the foundation for a secure transition to an infrastructure resistant to quantum attacks.
The impact of post-quantum cryptography is particularly significant for highly regulated sectors and mission-critical systems. Organizations operating in areas such as finance, healthcare, public administration, and defense are at greater risk if they do not promptly begin adopting quantum-safe technologies.
Vulnerable technologies and protocols include:
Some ongoing initiatives highlight the issue's relevance:
The advent of quantum computers is no longer a remote possibility but a concrete and imminent challenge. Post-Quantum Cryptography represents the most advanced technological response to ensure digital security in the coming decades. Preparing today means securing not only present data but also future information.
For CTOs and developers: the migration to crypto-agile systems must be strategically planned, starting with an audit of existing cryptographic dependencies and experimenting with hybrid solutions in controlled environments.
For companies and public organizations: now is the time to define adoption roadmaps, train technical teams, and choose technology partners who can accompany this transformation.
CRYSTALS: suite of post-quantum cryptographic algorithms based on lattice, including Kyber (KEM) and Dilithium (signature).
Lattice: complex multidimensional mathematical structure, basis of many PQC solutions.
Kyber: algorithm for public-key encryption.
Dilithium: algorithm for quantum-resistant digital signatures.

Andrea Bellomia
One of our experts will contact you within 24 hours with an initial free assessment.