Skip to main content

Envisioning is an emerging technology research institute and advisory.

LinkedInInstagramGitHub

2011 — 2026

research
  • Reports
  • Newsletter
  • Methodology
  • Origins
  • Vocab
services
  • Research Sessions
  • Signals Workspace
  • Bespoke Projects
  • Use Cases
  • Signal Scanfree
  • Readinessfree
impact
  • ANBIMAFuture of Brazilian Capital Markets
  • IEEECharting the Energy Transition
  • Horizon 2045Future of Human and Planetary Security
  • WKOTechnology Scanning for Austria
audiences
  • Innovation
  • Strategy
  • Consultants
  • Foresight
  • Associations
  • Governments
resources
  • Pricing
  • Partners
  • How We Work
  • Data Visualization
  • Multi-Model Method
  • FAQ
  • Security & Privacy
about
  • Manifesto
  • Community
  • Events
  • Support
  • Contact
  • Login
ResearchServicesPricingPartnersAbout
ResearchServicesPricingPartnersAbout
  1. Home
  2. Research
  3. Horizons
  4. Post-Quantum Cryptography

Post-Quantum Cryptography

Encryption methods designed to withstand attacks from quantum computers
Back to HorizonsView interactive version

Post-quantum cryptography (PQC) refers to cryptographic algorithms designed to be secure against attacks from both classical and quantum computers. Current cryptographic systems like RSA and elliptic curve cryptography rely on mathematical problems that quantum computers could solve efficiently using algorithms like Shor's algorithm, potentially breaking encryption and digital signatures that protect sensitive data, financial transactions, and digital infrastructure. Post-quantum algorithms use different mathematical foundations—such as lattice-based, hash-based, or code-based cryptography—that are believed to resist quantum attacks.

The technology addresses the existential threat that quantum computing poses to current cryptographic security. As quantum computers advance, they could break the encryption protecting everything from financial transactions to government communications to blockchain systems. Post-quantum cryptography provides a migration path to algorithms that will remain secure even when powerful quantum computers exist. Applications include securing financial systems, protecting government communications, securing blockchain and cryptocurrency systems, and ensuring long-term security of data that needs protection for decades. Standards bodies like NIST are standardizing post-quantum algorithms, and organizations are beginning migration.

At TRL 4, post-quantum cryptography algorithms have been selected and standardized, though migration and deployment are in early stages. The technology faces challenges including transitioning existing systems to new algorithms, ensuring interoperability, managing larger key sizes and computational requirements, and the need to migrate before quantum computers become a threat (since encrypted data can be stored now and decrypted later). However, as quantum computing advances, migration becomes urgent. The technology is essential for maintaining security in a post-quantum world, potentially protecting critical infrastructure, financial systems, and sensitive data from future quantum attacks, though the transition requires careful planning and coordination across industries and systems.

TRL
4/9Formative
Impact
5/5
Investment
3/5
Category
Software

Related Organizations

NIST logo
NIST

United States · Government Agency

100%

The US federal agency leading the global competition to select and standardize post-quantum cryptographic algorithms.

Standards Body
IBM Research logo
IBM Research

United States · Company

95%

Long-standing leader in neuro-symbolic AI, combining neural networks with logical reasoning for enterprise applications.

Researcher
PQShield logo
PQShield

United Kingdom · Startup

95%

A spinout from Oxford University providing hardware and software IP for PQC, including side-channel analysis tools to test resistance.

Developer
SandboxAQ logo
SandboxAQ

United States · Company

95%

Spun out of Alphabet, they provide a Security Suite that discovers cryptographic vulnerabilities and manages the migration to PQC.

Developer
ISARA Corporation logo
ISARA Corporation

Canada · Company

90%

Develops crypto-agile solutions and tools to test and migrate systems to quantum-safe standards.

Developer
QuSecure logo
QuSecure

United States · Startup

90%

Provides 'QuProtect', a software platform that monitors network traffic to detect and upgrade vulnerable cryptographic connections.

Developer
EvolutionQ logo
EvolutionQ

Canada · Startup

85%

Co-founded by Michele Mosca, offering 'Quantum Risk Assessment' services and tools to evaluate organizational vulnerability to quantum decryption.

Developer
Infineon Technologies logo
Infineon Technologies

Germany · Company

85%

A major semiconductor manufacturer developing secure chips with hardware support for PQC algorithms.

Developer
Quantinuum logo
Quantinuum

United States · Company

85%

Integrated quantum computing company formed by Honeywell and CQC.

Developer
Thales Alenia Space logo
Thales Alenia Space

France · Company

85%

A major European satellite manufacturer leading the ASCEND feasibility study.

Deployer
Cloudflare logo
Cloudflare

United States · Company

80%

A web infrastructure and security company that has already enabled PQC support for a significant portion of the internet.

Deployer

Supporting Evidence

Evidence data is not available for this technology yet.

Same technology in other hubs

Continuum
Continuum
Post-Quantum Cryptography

Encryption methods designed to resist attacks from quantum computers

Meridian
Meridian
Post-Quantum Cryptography

Encryption algorithms designed to withstand attacks from quantum computers

Sentinel
Sentinel
Post-Quantum Cryptography

Encryption methods designed to resist attacks from quantum computers

Link
Link
Post-Quantum Cryptography (PQC)

Encryption algorithms designed to withstand attacks from quantum computers

Folio
Folio
Post-Quantum Cryptography

Encryption resistant to future quantum computing attacks.

Quadrant
Quadrant
Post-Quantum Cryptography

Encryption methods designed to withstand attacks from quantum computers

Grid
Grid
Post-Quantum Cryptography

Encryption methods designed to resist attacks from quantum computers

Vault
Vault
Post-Quantum Cryptography

Encryption methods designed to withstand attacks from quantum computers

Connections

Hardware
Hardware
Quantum Computing

Harnessing quantum mechanics to solve problems beyond classical computing limits

TRL
5/9
Impact
5/5
Investment
5/5

Book a research session

Bring this signal into a focused decision sprint with analyst-led framing and synthesis.
Research Sessions