๐ŸŒŒ
Privacy Village Academy
Join The Community!AcademyAbout HGPE
  • Hitchhiker's Guide to Privacy Engineering
    • โ“What is HGPE?
      • โš–๏ธWho is this for?
      • ๐Ÿง™โ€โ™‚๏ธPrivacy Engineering
      • ๐ŸŽจCreative Privacy
      • ๐Ÿ”ฎGenerative AI
      • ๐Ÿง‘โ€๐Ÿ’ปAbout the Author
  • ๐Ÿง™โ€โ™‚๏ธThe Ethical AI Governance Playbook 2025 Edition
    • ๐Ÿค–Chapter 1 : AI Literacy
    • ๐ŸŒChapter 2 : AI Governance in the 21st Century
    • โŒ›Chapter 3 - Getting Started with AI Act Compliance
    • ๐Ÿš€Chapter 4 : Rise of AI Governance: Building Ethical & Compliant AI
    • Chapter 5 : Introduction to the Lifecycle of AI
  • ๐ŸŽ“Privacy Engineering Field Guide Season 1
    • โ“Decoding the Digital World: Exploring Everyday Technology
    • ๐Ÿ‘๏ธIntroduction: Why Privacy Matters?
      • Age of Mass Surveillance
      • Privacy & Democracy
      • Privacy & Government Surveillance
    • โšกChapter 1 : How Computers Work?
      • Electricity
      • Bits
      • Logic Gates
      • Central Processing Unit (CPU)
      • Graphic Processing Unit (GPU)
      • Motherboard
      • Data Storage
      • Databases
      • Operating System (OS)
      • Computer Code
      • Programming Languages
      • The File System
      • Bugs and Errors
      • Computer Virus
      • Internet of Things (IoT)
      • Cloud Computing
    • ๐Ÿ›ฐ๏ธChapter 2 : How the internet works?
      • Physical Infrastructure
      • Network and Protocols
      • Switch
      • Routers
      • IP Address
      • Domain Name System (DNS)
      • Mac Address
      • TCP / IP
      • OSI Model
      • Packets
      • The Client - Server Architecture
      • Secure Socket Shell (SSH)
      • Transport Layer Security (TLS)
      • Firewall
      • Tunnels and VPNs
      • Proxy Server
    • ๐Ÿ–ฅ๏ธChapter 3 : How Websites Work?
      • HTML
      • CSS
      • Javascript
      • Web Server
      • Browser
      • HTTP
      • Databases
      • Front End (Client Side)
      • Back End (Server Side)
      • Cookies
      • Local Storage
      • Session Storage
      • IndexedDB
      • XHR Requests
      • Web APIs
      • Webhooks
      • Email Server
      • HTTPS
      • Web Application Firewall
      • Single Sign-on (SS0)
      • OAuth 2.0
      • Pixels
      • Canvas Fingerprinting
      • Email Tracking
      • Containers
      • CI/CD
      • Kubernetes
      • Serverless Architecture
    • โš›๏ธChapter 4 : How Quantum Computers Work?
      • Quantum Properties
      • Quantum Bits (Qubits)
      • Decoherence
      • Quantum Circuits
      • Quantum Algorithms
      • Quantum Sensing
      • Post-Quantum Cryptography
    • ๐Ÿ“ณChapter 5 : Mobile Apps and Privacy
      • Battery
      • Processor
      • Mobile Operating Systems
      • Mobile Data Storage
      • Cellular Data
      • Mobile Device Sensors
      • Wireless Connectivity
      • Camera & Microphone
      • Mobile Apps
      • Software Development Kits (SDKs)
      • Mobile Device Identifiers
      • Bring Your Own Device (BYOD)
  • ๐Ÿ•ต๏ธโ€โ™‚๏ธPrivacy Engineering Field Guide Season 2
    • โ“Introduction to Privacy Engineering for Non-Techs
      • ๐ŸŽญChapter 1 : Digital Identities
        • What is identity?
        • Authentication Flows
        • Authentication vs. Authorization
        • OAuth 2.0
        • OpenID Connect (OIDC)
        • Self Sovereign Identities
        • Decentralized Identifiers
        • eIDAS
      • ๐Ÿ‘๏ธโ€๐Ÿ—จ๏ธChapter 2 : De-Identification
        • Introduction to De-Identification?
        • Input / Output Privacy
        • De-identification Strategies
        • K-Anonymity
        • Differential Privacy
        • Privacy Threat Modeling
  • ๐Ÿ“–HGPE Story and Lore
    • ๐ŸชฆChapter 1 : The Prologue
    • โ˜„๏ธChapter 2 : Battle for Earth
    • ๐Ÿฆ Chapter 3 : A Nightmare To Remember
    • ๐Ÿง™โ€โ™‚๏ธChapter 4 : The Academy
    • ๐ŸŒƒChapter 5: The Approaching Darkness
    • โš”๏ธChapter 6 : The Invasion
    • ๐ŸฐChapter 7 : The Fall of the Academy
    • ๐Ÿ›ฉ๏ธChapter 8 : The Escape
    • ๐ŸชChapter 9 : The Moon Cave
    • ๐Ÿฆ‡Chapter 10: Queen of Darkness
  • ๐Ÿ“บVideos, Audio Book and Soundtracks
    • ๐ŸŽงReading Episodes
    • ๐ŸŽนSoundtracks
  • ๐Ÿ‘พHGPE Privacy Games and Challenges
    • ๐ŸŽฎData Privacy Day'23 / Privacy Treasure Hunt Game
    • ๐ŸงฉPrivacy Quest
  • ๐Ÿ“ฌSubscribe Now!
Powered by GitBook
On this page

Was this helpful?

  1. Privacy Engineering Field Guide Season 1
  2. Chapter 4 : How Quantum Computers Work?

Post-Quantum Cryptography

PreviousQuantum SensingNextChapter 5 : Mobile Apps and Privacy

Last updated 2 years ago

Was this helpful?

What is Post-quantum cryptography?

Post-quantum cryptography communities are proactively looking to come up with innovative techniques to tackle quantum computing processing power.

Because of the sheer power of quantum computers, they can crack encryption algorithms that are used to protect our sensitive data, such as credit card numbers, passwords, and even government secrets.

This means that if a quantum computer falls into the wrong hands, it could potentially be used to break into our most secure systems and steal our private information.

As a result, researchers are working tirelessly to develop quantum-resistant encryption methods that can protect our data from quantum attacks. So, while quantum algorithms may hold the key to unlocking the mysteries of the universe, they also present a challenge to our privacy and security in the digital world.

Post Quantum cryptography is catching up and different types of cryptosystems are emerging such as multivariate, elliptic curves, lattices, isogenies, hash, hybrid based signatures.

Fully realized, large-scale, and sufficiently error-free quantum computers will mean that public key encryption systems based on the RSA, Diffie-Hellman, and Elliptic Curve systems are no longer secure. But this will not mean the end of public-key cryptography.

Things that are encrypted today can not be decrypted today, but they can be decrypted in the future. NSA is hoarding encrypted data in massive data centers in Nevada, saying we canโ€™t decrypt the data yet but once we have scalable quantum computers retroactively decrypt everything that they are storing.

Quantum key distribution is a maturing technology that will offer secure communications. QKD ensures that the keys used today in encryption systems based on the RSA or Elliptic Curve public key cryptography systems will not be cracked by some powerful quantum computer in the future.

Breaking cryptography with quantum computers started with Shorโ€™s algorithm.

It has demonstrated that if you build a fully scalable quantum computer, then you can use it to find the prime factors of huge numbers and calculate discrete logarithms.

Public key cryptography that we currently used to protect the internet is based on the belief that these problems are hard. Shor showed that with scalable quantum computers, it's not exactly true.

Donโ€™t panic!

To threaten cryptography, the number of physical qubits must reach millions of physical qubits using known error correction methods. Qubits need to be also in better quality than they are right now.

There are other public key cryptosystems that we don't know how to break with even quantum computers.

This is called post-quantum cryptography. Lattice-based crypto systems are one of these candidates.

Eventually, we can migrate the internet to post-quantum cryptography and prevent the total destruction is privacy and security as we know it. This will not be the amazing use case that quantum computers will realize.

The quantum supremacy to have achieved with 53 qubits is very far from a scalable quantum computer that would be needed to threaten public key cryptography.

is hosting a competition to create standards for post-quantum cryptography that aims to upgrade every browser, and every router to use a new kind of SSL that use post-quantum cryptography.

Google claimed
NIST
๐ŸŽ“
โš›๏ธ
Red's vision began to fade as she struggled to grasp the enormity of what she had learned. She knew that the galaxy was in great peril and that she needed to warn the others about the Grandmaster's plan. She whispered her last words to Kyle, "Warn them about the approaching darkness," before she breathed her last breath. Red didn't know what to think. The voice she had always heard in her head, the one she had feared for so long, was now giving her power beyond anything she had ever imagined.
Page cover image