Skip to main content

Envisioning is an emerging technology research institute and advisory.

LinkedInInstagramGitHub

2011 — 2026

research
  • Reports
  • Newsletter
  • Methodology
  • Origins
  • My Collection
services
  • Research Sessions
  • Signals Workspace
  • Bespoke Projects
  • Use Cases
  • Signal Scanfree
  • Readinessfree
impact
  • ANBIMAFuture of Brazilian Capital Markets
  • IEEECharting the Energy Transition
  • Horizon 2045Future of Human and Planetary Security
  • WKOTechnology Scanning for Austria
audiences
  • Innovation
  • Strategy
  • Consultants
  • Foresight
  • Associations
  • Governments
resources
  • Pricing
  • Partners
  • How We Work
  • Data Visualization
  • Multi-Model Method
  • FAQ
  • Security & Privacy
about
  • Manifesto
  • Community
  • Events
  • Support
  • Contact
  • Login
ResearchServicesPricingPartnersAbout
ResearchServicesPricingPartnersAbout
  1. Home
  2. Research
  3. Grid
  4. Post-Quantum Cryptography

Post-Quantum Cryptography

Encryption methods designed to resist attacks from quantum computers
Back to GridView interactive version

Post-quantum cryptography represents a fundamental shift in how we protect digital communications and data, specifically designed to withstand attacks from quantum computers that could render current encryption methods obsolete. Unlike classical cryptographic systems that rely on mathematical problems like integer factorization or discrete logarithms—which quantum computers could solve exponentially faster using algorithms like Shor's algorithm—post-quantum approaches are built on mathematical structures believed to be resistant to both classical and quantum computational attacks. These include lattice-based cryptography, hash-based signatures, code-based cryptography, and multivariate polynomial equations. The urgency of this transition stems from the "harvest now, decrypt later" threat, where adversaries could collect encrypted data today and decrypt it once sufficiently powerful quantum computers become available, potentially exposing sensitive information that remains valuable for decades.

For energy grid operators and utilities, this technology addresses a critical vulnerability in infrastructure that must remain secure for 30 to 50 years or longer. Current public key infrastructure protecting supervisory control and data acquisition systems, smart meters, and grid communication networks could become compromised as quantum computing advances, exposing operational technology to manipulation or surveillance. The energy sector faces unique challenges because grid control systems cannot be easily upgraded or replaced, and encrypted operational data—such as consumption patterns, infrastructure vulnerabilities, or control protocols—retains strategic value far into the future. Post-quantum cryptography enables utilities to implement "crypto-agility," the ability to transition encryption methods without wholesale infrastructure replacement, while ensuring that long-term investments in grid modernization and smart infrastructure remain protected against evolving computational threats.

Several utilities and grid operators have begun pilot programs to assess post-quantum algorithms in operational environments, particularly for securing communication between substations and control centers. The U.S. National Institute of Standards and Technology has standardized initial post-quantum cryptographic algorithms, providing a foundation for industry adoption. Early implementations focus on hybrid approaches that combine classical and post-quantum methods, offering protection against both current and future threats while the technology matures. As quantum computing capabilities advance and become more accessible, the integration of post-quantum cryptography into grid infrastructure will transition from a forward-looking precaution to an operational necessity, particularly for protecting critical energy infrastructure that underpins economic stability and national security. This evolution aligns with broader trends toward zero-trust security architectures and resilient infrastructure design, ensuring that the energy grid can maintain confidentiality and integrity in an era of rapidly advancing computational capabilities.

TRL
5/9Validated
Impact
3/5
Investment
2/5
Category
Ethics Security

Related Organizations

National Institute of Standards and Technology (NIST) logo
National Institute of Standards and Technology (NIST)

United States · Government Agency

100%

US federal agency that sets standards for technology, including facial recognition vendor tests (FRVT).

Standards Body
IBM Research logo
IBM Research

United States · Company

95%

Long-standing leader in neuro-symbolic AI, combining neural networks with logical reasoning for enterprise applications.

Developer
Institute for Quantum Computing (University of Waterloo) logo
Institute for Quantum Computing (University of Waterloo)

Canada · University

90%

A leading research institute that has contributed significantly to the development and analysis of post-quantum algorithms.

Researcher
PQShield logo
PQShield

United Kingdom · Startup

90%

A spinout from Oxford University providing hardware and software IP for PQC, including side-channel analysis tools to test resistance.

Developer
SandboxAQ logo
SandboxAQ

United States · Company

90%

Spun out of Alphabet, they provide a Security Suite that discovers cryptographic vulnerabilities and manages the migration to PQC.

Developer
Infineon Technologies logo
Infineon Technologies

Germany · Company

85%

A major semiconductor manufacturer developing secure chips with hardware support for PQC algorithms.

Developer
ISARA Corporation logo
ISARA Corporation

Canada · Company

85%

Develops crypto-agile solutions and tools to test and migrate systems to quantum-safe standards.

Developer
NXP Semiconductors logo
NXP Semiconductors

Netherlands · Company

85%

Leading manufacturer of Near Field Communication (NFC) and Secure Element chips used in offline payment hardware.

Developer
Siemens Energy logo
Siemens Energy

Germany · Company

85%

Provides HVDC Plus technology (VSC) and transformers for ultra-high-voltage transmission projects globally.

Deployer
Thales logo
Thales

France · Company

85%

Prime contractor for the TeQuantS project and a key partner in ESA's quantum satellite initiatives.

Developer
EvolutionQ logo
EvolutionQ

Canada · Startup

80%

Co-founded by Michele Mosca, offering 'Quantum Risk Assessment' services and tools to evaluate organizational vulnerability to quantum decryption.

Developer

Supporting Evidence

Evidence data is not available for this technology yet.

Same technology in other hubs

Quadrant
Quadrant
Post-Quantum Cryptography

Encryption methods designed to withstand attacks from quantum computers

Continuum
Continuum
Post-Quantum Cryptography

Encryption methods designed to resist attacks from quantum computers

Meridian
Meridian
Post-Quantum Cryptography

Encryption algorithms designed to withstand attacks from quantum computers

Sentinel
Sentinel
Post-Quantum Cryptography

Encryption methods designed to resist attacks from quantum computers

Folio
Folio
Post-Quantum Cryptography

Encryption resistant to future quantum computing attacks.

Horizons
Horizons
Post-Quantum Cryptography

Encryption methods designed to withstand attacks from quantum computers

Link
Link
Post-Quantum Cryptography (PQC)

Encryption algorithms designed to withstand attacks from quantum computers

Vault
Vault
Post-Quantum Cryptography

Encryption methods designed to withstand attacks from quantum computers

Connections

Software
Software
Quantum Grid Optimization

Quantum computing applied to electricity supply-demand balancing and distributed energy coordination

TRL
4/9
Impact
3/5
Investment
3/5
Ethics Security
Ethics Security
Critical Infrastructure Cyber Resilience

Frameworks protecting energy systems from cyber attacks that could cause blackouts or physical damage

TRL
6/9
Impact
3/5
Investment
3/5
Software
Software
Cyber-Physical Anomaly Detection

AI monitoring of power grid control systems to detect cyber threats before they cause outages

TRL
6/9
Impact
3/5
Investment
2/5

Book a research session

Bring this signal into a focused decision sprint with analyst-led framing and synthesis.
Research Sessions