Skip to main content

Envisioning is an emerging technology research institute and advisory.

LinkedInInstagramGitHub

2011 — 2026

research
  • Reports
  • Newsletter
  • Methodology
  • Origins
  • My Collection
services
  • Research Sessions
  • Signals Workspace
  • Bespoke Projects
  • Use Cases
  • Signal Scanfree
  • Readinessfree
impact
  • ANBIMAFuture of Brazilian Capital Markets
  • IEEECharting the Energy Transition
  • Horizon 2045Future of Human and Planetary Security
  • WKOTechnology Scanning for Austria
audiences
  • Innovation
  • Strategy
  • Consultants
  • Foresight
  • Associations
  • Governments
resources
  • Pricing
  • Partners
  • How We Work
  • Data Visualization
  • Multi-Model Method
  • FAQ
  • Security & Privacy
about
  • Manifesto
  • Community
  • Events
  • Support
  • Contact
  • Login
ResearchServicesPricingPartnersAbout
ResearchServicesPricingPartnersAbout
  1. Home
  2. Research
  3. Folio
  4. Post-Quantum Cryptography

Post-Quantum Cryptography

Encryption resistant to future quantum computing attacks.
Back to FolioView interactive version

Post-quantum cryptography represents a fundamental shift in how we protect digital information, addressing an emerging threat that could render current encryption methods obsolete. Traditional cryptographic systems, such as RSA and elliptic curve cryptography, rely on mathematical problems that are computationally difficult for classical computers to solve—specifically, factoring large numbers or computing discrete logarithms. However, quantum computers, which leverage the principles of quantum mechanics to perform certain calculations exponentially faster than classical machines, pose a direct threat to these foundations. Algorithms like Shor's algorithm, when run on sufficiently powerful quantum computers, could break these encryption schemes in a fraction of the time currently required. Post-quantum cryptography encompasses a new generation of cryptographic algorithms built on mathematical problems that remain difficult even for quantum computers to solve, including lattice-based cryptography, hash-based signatures, code-based cryptography, and multivariate polynomial equations.

The urgency of implementing post-quantum cryptography extends beyond theoretical concerns, particularly for institutions managing sensitive archives and long-term knowledge repositories. The concept of "harvest now, decrypt later" attacks presents a tangible risk: adversaries can collect encrypted data today and store it until quantum computers become powerful enough to break the encryption, potentially exposing information that was meant to remain confidential for decades. This threat is especially acute for libraries, research institutions, government archives, and cultural heritage organizations that steward materials with enduring sensitivity—medical records, classified documents, proprietary research, and personal communications. The transition to quantum-resistant algorithms addresses this vulnerability by ensuring that information encrypted today will remain secure throughout its intended lifecycle, even as quantum computing capabilities advance. This proactive approach also solves the practical challenge of cryptographic agility, enabling organizations to migrate their security infrastructure gradually rather than facing a crisis-driven overhaul when quantum threats materialize.

Standards bodies and technology organizations have already begun the transition to post-quantum cryptography, with the U.S. National Institute of Standards and Technology completing its multi-year evaluation process and publishing standardized algorithms for general encryption and digital signatures. Early adopters in the archival and knowledge management sectors are conducting pilot implementations, testing how these new algorithms integrate with existing digital preservation workflows and access control systems. Research suggests that organizations should begin planning their migration strategies now, as the process involves not only updating cryptographic libraries but also reassessing key management practices, authentication protocols, and long-term data protection policies. Industry analysts note that the timeline for widespread quantum computing capabilities remains uncertain, making the current period ideal for methodical preparation rather than rushed deployment. As digital archives increasingly serve as the collective memory of our societies, post-quantum cryptography emerges as an essential safeguard, ensuring that the knowledge we preserve today remains accessible only to those we intend, regardless of future technological developments.

TRL
6/9Demonstrated
Impact
5/5
Investment
5/5
Category
Ethics & Security

Related Organizations

NIST logo
NIST

United States · Government Agency

100%

The US federal agency leading the global competition to select and standardize post-quantum cryptographic algorithms.

Standards Body
IBM Research logo
IBM Research

United States · Company

95%

Long-standing leader in neuro-symbolic AI, combining neural networks with logical reasoning for enterprise applications.

Developer
PQShield logo
PQShield

United Kingdom · Startup

95%

A spinout from Oxford University providing hardware and software IP for PQC, including side-channel analysis tools to test resistance.

Developer
SandboxAQ logo
SandboxAQ

United States · Company

95%

Spun out of Alphabet, they provide a Security Suite that discovers cryptographic vulnerabilities and manages the migration to PQC.

Developer
Crypto4A logo
Crypto4A

Canada · Startup

90%

Develops quantum-ready Hardware Security Modules (HSMs) and security platforms.

Developer
Institute for Quantum Computing (IQC) logo
Institute for Quantum Computing (IQC)

Canada · University

90%

A scientific research institute at the University of Waterloo.

Researcher
ISARA Corporation logo
ISARA Corporation

Canada · Company

90%

Develops crypto-agile solutions and tools to test and migrate systems to quantum-safe standards.

Developer
Quantinuum logo
Quantinuum

United States · Company

90%

Integrated quantum computing company formed by Honeywell and CQC.

Developer
QuSecure logo
QuSecure

United States · Startup

90%

Provides 'QuProtect', a software platform that monitors network traffic to detect and upgrade vulnerable cryptographic connections.

Developer
Cloudflare logo
Cloudflare

United States · Company

85%

A web infrastructure and security company that has already enabled PQC support for a significant portion of the internet.

Deployer
EvolutionQ logo
EvolutionQ

Canada · Startup

85%

Co-founded by Michele Mosca, offering 'Quantum Risk Assessment' services and tools to evaluate organizational vulnerability to quantum decryption.

Developer
Infineon Technologies logo
Infineon Technologies

Germany · Company

85%

A major semiconductor manufacturer developing secure chips with hardware support for PQC algorithms.

Developer
Thales logo
Thales

France · Company

85%

Prime contractor for the TeQuantS project and a key partner in ESA's quantum satellite initiatives.

Developer

Supporting Evidence

Evidence data is not available for this technology yet.

Same technology in other hubs

Continuum
Continuum
Post-Quantum Cryptography

Encryption methods designed to resist attacks from quantum computers

Meridian
Meridian
Post-Quantum Cryptography

Encryption algorithms designed to withstand attacks from quantum computers

Sentinel
Sentinel
Post-Quantum Cryptography

Encryption methods designed to resist attacks from quantum computers

Horizons
Horizons
Post-Quantum Cryptography

Encryption methods designed to withstand attacks from quantum computers

Quadrant
Quadrant
Post-Quantum Cryptography

Encryption methods designed to withstand attacks from quantum computers

Grid
Grid
Post-Quantum Cryptography

Encryption methods designed to resist attacks from quantum computers

Polis
Polis
Post-Quantum Government Cryptography

Quantum-resistant encryption safeguarding government communications and classified data

Link
Link
Post-Quantum Cryptography (PQC)

Encryption algorithms designed to withstand attacks from quantum computers

Vault
Vault
Post-Quantum Cryptography

Encryption methods designed to withstand attacks from quantum computers

Book a research session

Bring this signal into a focused decision sprint with analyst-led framing and synthesis.
Research Sessions