Quantum computing vs. encryption: Why post-quantum algorithms are essential

21. March, 2025

From online banking to cloud authentication – cryptography, the science of secure data encryption and authentication, forms the foundation of data security. However, current encryption methods may soon become obsolete.

The reason? Quantum computers.

Still in development, quantum computers could, in the near future, break many widely used encryption algorithms within minutes. The solution lies in post-quantum algorithms—new, resilient encryption methods that even powerful quantum computers cannot compromise.
Since integrating new encryption standards takes years, now is the right time to prepare.

Why Is Post-Quantum Cryptography Necessary?

Classical cryptography relies on mathematical problems such as the factorization of large numbers (RSA) and discrete logarithms (ECC). These methods are vulnerable to Shor’s algorithm, the most significant threat to traditional asymmetric encryption like RSA, ECC, and DH. This algorithm enables the exponentially faster factorization of large numbers and solving discrete logarithm problems, rendering these methods ineffective.

While classical computers would take thousands of years to break RSA-2048—a widely used standard for secure communication, digital signatures, and certificates—a sufficiently powerful quantum computer could accomplish this in just a few hours.

A particularly alarming aspect is that many encrypted datasets today—such as medical records, blockchain transactions, and corporate secrets—have a long lifespan. Attackers could already be intercepting and storing data today, planning to decrypt it later when quantum technology matures (“Harvest Now, Decrypt Later”). This makes it essential to transition to quantum-safe encryption as soon as possible.

The Path to Post-Quantum Cryptography

International organizations have been working for years to develop standardized quantum-resistant algorithms. The U.S. National Institute of Standards and Technology (NIST) and the EU Commission are leading these efforts. The following mathematical approaches are at the forefront:

1) Lattice-Based Cryptography

  • Based on the difficulty of finding the shortest vector in high-dimensional lattices—even for quantum computers, this remains nearly impossible.
  • Key algorithms: Kyber (encryption) and Dilithium (digital signatures).

2) Hash-Based Signatures

  • Uses cryptographic hash functions instead of classical public-key cryptography.
  • Example: SPHINCS+, a quantum-secure signature scheme with structural similarities to blockchain technologies.

3) Multivariate Quadratic Equations

  • Relies on the difficulty of solving nonlinear equation systems. However, it is less efficient than lattice-based solutions in terms of key length and computational effort.
  • Example: Rainbow (digital signatures).

4) Code-Based and Isogeny-Based Cryptography

  • Code-Based Cryptography utilizes error-correcting codes.
    • Example: Classic McEliece, known for its high security but large key sizes.
  • Isogeny-Based Cryptography relies on complex mathematical transformations of elliptic curves.
    • Example: SIDH (Supersingular Isogeny Diffie-Hellman)—however, a vulnerability discovered in 2022 compromised its security.

Standardized Algorithms for the Future

In 2024, NIST recommended the following algorithms for standardization:

  • CRYSTALS-Kyber (FIPS 203): Encryption for secure websites and general applications.
  • CRYSTALS-Dilithium (FIPS 204): Digital signature protection.
  • SPHINCS+ (FIPS 205): Hash-based digital signatures.
  • FALCON (FIPS draft): Another option for digital signatures.

These algorithms represent the first generation of quantum-safe encryption methods. Further developments are underway to address specific application fields.

A noteworthy innovation is the ASCON algorithm family, developed at TU Graz. Designed for resource-constrained environments (e.g., IoT and OT devices), ASCON has been officially recognized by NIST as an international standard for lightweight encryption.

Challenges and Practical Implementation

Despite the advancements in quantum computing, several technical hurdles remain:

  • Scalability and Error Correction: Even leading companies like Google struggle with the stability and error rates of quantum chips.
  • Migration Effort: Post-quantum algorithms often require significantly more computational power and storage.
  • Hybrid Transition Solutions: To gradually secure existing systems, hybrid encryption—combining classical and quantum-safe methods—is a practical approach.

The Need for Action: Preparing for the Quantum Era

Post-quantum cryptography is no longer a distant concept, it is a necessity. IT professionals and security leaders should proactively prepare for the migration to quantum-resistant algorithms by:

  1. Conducting a risk assessment: Identify which systems still rely on vulnerable encryption.
  2. Launching pilot projects: Test new algorithms in non-critical areas first.
  3. Monitoring industry trends: Stay updated on developments from NIST, ENISA, and other standardization bodies.
  4. Building partnerships: Engage with manufacturers and authorities to implement solutions early.

The quantum revolution may arrive sooner than expected. Organizations that take a proactive approach will protect their data in the long term and minimize future security risks.

Recommended articles:

EDR: Why anti-virus is no longer enough

Incident response planning: step-by-step emergency plan

Account management: The underestimated risk of forgotten user accounts

Ressources:
https://csrc.nist.gov/projects/post-quantum-cryptography
https://digital-strategy.ec.europa.eu/en/library/recommendation-coordinated-implementation-roadmap-transition-post-quantum-cryptography
https://ascon.isec.tugraz.at/

ARM64
Save Internet
Ethical Hacking
MITRE-HarfangLab
Sicherheitslücke
Identitätsdiebstahl
Red Teams, Blue Teams, Purple Teaming

Living Off the Land attacks

MSSP of the Year 2024

SIEM

What is a SIEM?

Nozomi Guardian Air
HarfangLab Guard
MITRE ATT&CK Framework
v.l.n.r.: Joe Pichlmayr (CEO IKARUS) – Anouck Teiller (CSO HarfangLab) –Alexander van der Bellen (Bundespräsident Österreich) - Frédéric Joureau (Erster Botschaftsrat der französischen Botschaft in Wien) – Christian Fritz (COO IKARUS)
EDR
Cyber Kill Chain

WE ARE LOOKING FORWARD TO HEARING FROM YOU!

IKARUS Security Software GmbH Blechturmgasse 11
1050 Vienna

Phone: +43 1 58995-0
Sales Hotline: +43 1 58995-500
sales@ikarus.at

SUPPORT HOTLINE

Support hotline: +43 1 58995-400
support@ikarus.at

Support hours:
Mon – Thu: 8am – 5pm
Fri: 8am – 3pm
24/7 support by arrangement

Remote maintenance software:
AnyDesk Download