Skip to main content

Envisioning is an emerging technology research institute and advisory.

LinkedInInstagramGitHub

2011 — 2026

research
  • Reports
  • Newsletter
  • Methodology
  • Origins
  • Vocab
services
  • Research Sessions
  • Signals Workspace
  • Bespoke Projects
  • Use Cases
  • Signal Scanfree
  • Readinessfree
impact
  • ANBIMAFuture of Brazilian Capital Markets
  • IEEECharting the Energy Transition
  • Horizon 2045Future of Human and Planetary Security
  • WKOTechnology Scanning for Austria
audiences
  • Innovation
  • Strategy
  • Consultants
  • Foresight
  • Associations
  • Governments
resources
  • Pricing
  • Partners
  • How We Work
  • Data Visualization
  • Multi-Model Method
  • FAQ
  • Security & Privacy
about
  • Manifesto
  • Community
  • Events
  • Support
  • Contact
  • Login
ResearchServicesPricingPartnersAbout
ResearchServicesPricingPartnersAbout
  1. Home
  2. Research
  3. Continuum
  4. Post-Quantum Cryptography

Post-Quantum Cryptography

Encryption methods designed to resist attacks from quantum computers
Back to ContinuumView interactive version

Post-quantum cryptography represents a fundamental shift in how we protect digital information, addressing the looming threat that quantum computers pose to current encryption standards. Traditional cryptographic systems, such as RSA and elliptic curve cryptography, rely on mathematical problems that are computationally difficult for classical computers to solve—specifically, factoring large numbers or solving discrete logarithm problems. However, quantum computers leveraging algorithms like Shor's algorithm could theoretically break these encryption methods in a fraction of the time required by conventional machines. Post-quantum cryptography encompasses several families of algorithms designed to resist such attacks, including lattice-based cryptography, which relies on the hardness of finding short vectors in high-dimensional lattices; hash-based signatures that build security on the collision resistance of cryptographic hash functions; code-based systems derived from error-correcting codes; and multivariate polynomial cryptography that uses systems of multivariate quadratic equations. These approaches are grounded in mathematical problems believed to remain intractable even for quantum computers, providing a foundation for secure communications in a post-quantum world.

The urgency of transitioning to post-quantum cryptography stems from what security experts call the "harvest now, decrypt later" threat, where adversaries collect encrypted data today with the intention of decrypting it once sufficiently powerful quantum computers become available. This poses existential risks to institutions managing sensitive information with long confidentiality requirements—government records, healthcare data, financial transactions, and classified communications could all be retroactively compromised. For critical infrastructure, the stakes are even higher: power grids, water treatment facilities, transportation networks, and telecommunications systems increasingly rely on encrypted control signals and authentication protocols. A successful quantum attack on these systems could enable unauthorized access, manipulation of industrial processes, or complete operational disruption. Similarly, blockchain-based governance systems and digital identity frameworks depend on cryptographic integrity; their compromise could undermine trust in decentralized institutions, digital currencies, and emerging models of civic participation. Post-quantum cryptography addresses these vulnerabilities by providing encryption methods that maintain security guarantees regardless of quantum computational advances, enabling organizations to protect both current operations and archived data against future threats.

Major standardization efforts are already underway, with the National Institute of Standards and Technology having selected several post-quantum algorithms for standardization after years of evaluation, signaling the technology's transition from research to practical deployment. Financial institutions are beginning pilot implementations to protect long-term investment records and transaction histories, while government agencies are developing migration roadmaps for classified communications systems. The technology is particularly critical for infrastructure with long operational lifespans—embedded systems in satellites, industrial control networks, and secure communication hardware that cannot be easily updated may remain vulnerable for decades without proactive cryptographic upgrades. Early adopters are implementing hybrid approaches that combine classical and post-quantum algorithms, providing defense-in-depth while the new standards mature. As quantum computing capabilities advance and the timeline for cryptographically relevant quantum computers becomes clearer, post-quantum cryptography will evolve from a precautionary measure to an essential component of civilizational resilience, ensuring that the digital foundations of modern society remain secure across generational timescales and technological paradigm shifts.

TRL
5/9Validated
Impact
5/5
Investment
4/5
Category
Software

Related Organizations

National Institute of Standards and Technology (NIST) logo
National Institute of Standards and Technology (NIST)

United States · Government Agency

100%

US federal agency that sets standards for technology, including facial recognition vendor tests (FRVT).

Standards Body
SandboxAQ logo
SandboxAQ

United States · Company

98%

Spun out of Alphabet, they provide a Security Suite that discovers cryptographic vulnerabilities and manages the migration to PQC.

Developer
IBM Research logo
IBM Research

United States · Company

95%

Long-standing leader in neuro-symbolic AI, combining neural networks with logical reasoning for enterprise applications.

Researcher
PQShield logo
PQShield

United Kingdom · Startup

95%

A spinout from Oxford University providing hardware and software IP for PQC, including side-channel analysis tools to test resistance.

Developer
QuSecure logo
QuSecure

United States · Startup

90%

Provides 'QuProtect', a software platform that monitors network traffic to detect and upgrade vulnerable cryptographic connections.

Developer
Cloudflare logo
Cloudflare

United States · Company

88%

A web infrastructure and security company that has already enabled PQC support for a significant portion of the internet.

Deployer
ISARA Corporation logo
ISARA Corporation

Canada · Company

88%

Develops crypto-agile solutions and tools to test and migrate systems to quantum-safe standards.

Developer
EvolutionQ logo
EvolutionQ

Canada · Startup

85%

Co-founded by Michele Mosca, offering 'Quantum Risk Assessment' services and tools to evaluate organizational vulnerability to quantum decryption.

Developer
Infineon Technologies logo
Infineon Technologies

Germany · Company

85%

A major semiconductor manufacturer developing secure chips with hardware support for PQC algorithms.

Developer
Thales Alenia Space logo
Thales Alenia Space

France · Company

85%

A major European satellite manufacturer leading the ASCEND feasibility study.

Deployer

Supporting Evidence

Evidence data is not available for this technology yet.

Same technology in other hubs

Meridian
Meridian
Post-Quantum Cryptography

Encryption algorithms designed to withstand attacks from quantum computers

Sentinel
Sentinel
Post-Quantum Cryptography

Encryption methods designed to resist attacks from quantum computers

Horizons
Horizons
Post-Quantum Cryptography

Encryption methods designed to withstand attacks from quantum computers

Folio
Folio
Post-Quantum Cryptography

Encryption resistant to future quantum computing attacks.

Quadrant
Quadrant
Post-Quantum Cryptography

Encryption methods designed to withstand attacks from quantum computers

Grid
Grid
Post-Quantum Cryptography

Encryption methods designed to resist attacks from quantum computers

Link
Link
Post-Quantum Cryptography (PQC)

Encryption algorithms designed to withstand attacks from quantum computers

Vault
Vault
Post-Quantum Cryptography

Encryption methods designed to withstand attacks from quantum computers

Polis
Polis
Post-Quantum Government Cryptography

Quantum-resistant encryption safeguarding government communications and classified data

Book a research session

Bring this signal into a focused decision sprint with analyst-led framing and synthesis.
Research Sessions