Skip to main content

Envisioning is an emerging technology research institute and advisory.

LinkedInInstagramGitHub

2011 — 2026

research
  • Reports
  • Newsletter
  • Methodology
  • Origins
  • My Collection
services
  • Research Sessions
  • Signals Workspace
  • Bespoke Projects
  • Use Cases
  • Signal Scanfree
  • Readinessfree
impact
  • ANBIMAFuture of Brazilian Capital Markets
  • IEEECharting the Energy Transition
  • Horizon 2045Future of Human and Planetary Security
  • WKOTechnology Scanning for Austria
audiences
  • Innovation
  • Strategy
  • Consultants
  • Foresight
  • Associations
  • Governments
resources
  • Pricing
  • Partners
  • How We Work
  • Data Visualization
  • Multi-Model Method
  • FAQ
  • Security & Privacy
about
  • Manifesto
  • Community
  • Events
  • Support
  • Contact
  • Login
ResearchServicesPricingPartnersAbout
ResearchServicesPricingPartnersAbout
  1. Home
  2. Research
  3. Link
  4. Post-Quantum Cryptography (PQC)

Post-Quantum Cryptography (PQC)

Encryption algorithms designed to withstand attacks from quantum computers
Back to LinkView interactive version

The advent of quantum computing poses an existential threat to the cryptographic foundations that secure modern telecommunications networks, financial transactions, and sensitive data transmissions. Current public-key encryption standards, including RSA and Elliptic Curve Cryptography (ECC), rely on mathematical problems that are computationally infeasible for classical computers to solve—such as factoring large prime numbers or solving discrete logarithm problems. However, quantum computers leverage principles of quantum mechanics to perform certain calculations exponentially faster than classical systems. Algorithms like Shor's algorithm, when run on sufficiently powerful quantum computers, could break these encryption schemes in hours or even minutes, rendering decades of established security protocols obsolete. Post-Quantum Cryptography addresses this vulnerability by developing new cryptographic algorithms based on mathematical problems that remain difficult even for quantum computers to solve, such as lattice-based cryptography, hash-based signatures, code-based cryptography, and multivariate polynomial equations.

The telecommunications industry faces a particularly urgent challenge known as "Harvest Now, Decrypt Later" attacks, where adversaries collect encrypted data today with the intention of decrypting it once quantum computers become sufficiently powerful. This threat is especially critical for information that must remain confidential for decades, such as government communications, healthcare records, financial data, and proprietary business intelligence. The transition to Post-Quantum Cryptography addresses these challenges by providing encryption methods that can withstand both classical and quantum attacks, ensuring long-term data confidentiality. This migration also enables new security architectures for emerging technologies like 5G and 6G networks, satellite communications, and Internet of Things deployments, where the lifespan of devices and the sensitivity of transmitted data demand forward-looking security measures. Industry standards bodies and government agencies have recognised this urgency, with organisations working to establish PQC standards that can be implemented before large-scale quantum computers become operational.

Major telecommunications providers and network infrastructure companies have begun pilot programs to test and integrate PQC algorithms into their systems, though widespread commercial deployment remains in early stages. The National Institute of Standards and Technology has been leading standardisation efforts, selecting several quantum-resistant algorithms for different use cases, which has accelerated industry adoption timelines. Current applications include securing backbone network communications, protecting satellite links, and safeguarding critical infrastructure control systems. The technology is also being integrated into virtual private networks, secure messaging platforms, and authentication systems that handle sensitive credentials. As quantum computing capabilities continue to advance, the implementation of Post-Quantum Cryptography represents not merely an upgrade but a fundamental transformation of how the telecommunications sector approaches data security, ensuring that the infrastructure supporting global connectivity remains resilient against emerging computational threats for decades to come.

TRL
7/9Operational
Impact
5/5
Investment
5/5
Category
Ethics Security

Related Organizations

NIST logo
NIST

United States · Government Agency

100%

The US federal agency leading the global competition to select and standardize post-quantum cryptographic algorithms.

Standards Body
IBM Research logo
IBM Research

United States · Company

95%

Long-standing leader in neuro-symbolic AI, combining neural networks with logical reasoning for enterprise applications.

Researcher
PQShield logo
PQShield

United Kingdom · Startup

95%

A spinout from Oxford University providing hardware and software IP for PQC, including side-channel analysis tools to test resistance.

Developer
SandboxAQ logo
SandboxAQ

United States · Company

95%

Spun out of Alphabet, they provide a Security Suite that discovers cryptographic vulnerabilities and manages the migration to PQC.

Developer
QuSecure logo
QuSecure

United States · Startup

92%

Provides 'QuProtect', a software platform that monitors network traffic to detect and upgrade vulnerable cryptographic connections.

Developer
ETSI logo
ETSI

France · Consortium

90%

European standards organization that launched the Industry Specification Group on Reconfigurable Intelligent Surfaces (ISG RIS).

Standards Body
ISARA Corporation logo
ISARA Corporation

Canada · Company

90%

Develops crypto-agile solutions and tools to test and migrate systems to quantum-safe standards.

Developer
Thales logo
Thales

France · Company

88%

Prime contractor for the TeQuantS project and a key partner in ESA's quantum satellite initiatives.

Developer
QuintessenceLabs logo
QuintessenceLabs

Australia · Company

85%

Australian quantum cybersecurity company offering high-throughput QRNG appliances.

Developer

Supporting Evidence

Evidence data is not available for this technology yet.

Same technology in other hubs

Horizons
Horizons
Post-Quantum Cryptography

Encryption methods designed to withstand attacks from quantum computers

Sentinel
Sentinel
Post-Quantum Cryptography

Encryption methods designed to resist attacks from quantum computers

Continuum
Continuum
Post-Quantum Cryptography

Encryption methods designed to resist attacks from quantum computers

Meridian
Meridian
Post-Quantum Cryptography

Encryption algorithms designed to withstand attacks from quantum computers

Quadrant
Quadrant
Post-Quantum Cryptography

Encryption methods designed to withstand attacks from quantum computers

Grid
Grid
Post-Quantum Cryptography

Encryption methods designed to resist attacks from quantum computers

Folio
Folio
Post-Quantum Cryptography

Encryption resistant to future quantum computing attacks.

Connections

Hardware
Hardware
Quantum Communication Backbones

Fiber and satellite networks that distribute quantum encryption keys using quantum mechanics

TRL
3/9
Impact
5/5
Investment
4/5
Hardware
Hardware
Quantum Timing & Positioning Systems

Navigation and timing using quantum sensors instead of satellite signals

TRL
3/9
Impact
4/5
Investment
4/5
Ethics Security
Ethics Security
Lawful Interception vs. Encryption Backdoor Debate

Policy debate over government access to encrypted communications for law enforcement

TRL
7/9
Impact
5/5
Investment
3/5

Book a research session

Bring this signal into a focused decision sprint with analyst-led framing and synthesis.
Research Sessions