Skip to main content

Envisioning is an emerging technology research institute and advisory.

LinkedInInstagramGitHub

2011 — 2026

research
  • Reports
  • Newsletter
  • Methodology
  • Origins
  • My Collection
services
  • Research Sessions
  • Signals Workspace
  • Bespoke Projects
  • Use Cases
  • Signal Scanfree
  • Readinessfree
impact
  • ANBIMAFuture of Brazilian Capital Markets
  • IEEECharting the Energy Transition
  • Horizon 2045Future of Human and Planetary Security
  • WKOTechnology Scanning for Austria
audiences
  • Innovation
  • Strategy
  • Consultants
  • Foresight
  • Associations
  • Governments
resources
  • Pricing
  • Partners
  • How We Work
  • Data Visualization
  • Multi-Model Method
  • FAQ
  • Security & Privacy
about
  • Manifesto
  • Community
  • Events
  • Support
  • Contact
  • Login
ResearchServicesPricingPartnersAbout
ResearchServicesPricingPartnersAbout
  1. Home
  2. Research
  3. Quadrant
  4. Post-Quantum Cryptography

Post-Quantum Cryptography

Encryption methods designed to withstand attacks from quantum computers
Back to QuadrantView interactive version

Post-quantum cryptography represents a fundamental shift in how industrial systems protect sensitive data and communications against an emerging threat: quantum computers capable of breaking current encryption standards. Traditional cryptographic methods, such as RSA and elliptic curve cryptography, rely on mathematical problems that are computationally difficult for classical computers to solve. However, quantum computers leverage principles of quantum mechanics to perform certain calculations exponentially faster, potentially rendering these widely-used encryption methods obsolete. Post-quantum cryptography addresses this vulnerability by developing new algorithms based on mathematical problems that remain difficult even for quantum computers to crack. These include lattice-based cryptography, hash-based signatures, code-based cryptography, and multivariate polynomial equations. Standards like ML-KEM (Module-Lattice-Based Key-Encapsulation Mechanism) exemplify this new generation of cryptographic protocols, designed specifically to withstand both classical and quantum computational attacks while maintaining practical performance for real-world deployment.

The industrial sector faces a unique challenge known as "harvest now, decrypt later," where adversaries could intercept and store encrypted data today with the intention of decrypting it once sufficiently powerful quantum computers become available. This threat is particularly acute for operational technology environments, where critical infrastructure components such as power grids, manufacturing systems, and industrial control networks often operate for decades. Equipment installed today may still be processing sensitive information twenty or thirty years from now, well into an era when quantum computing capabilities could be widespread. Post-quantum cryptography solves this problem by enabling organizations to implement quantum-resistant security measures immediately, protecting long-lifecycle assets throughout their operational lifespan. This proactive approach prevents the costly and disruptive need to retrofit security systems across vast industrial networks once quantum threats materialize. Furthermore, regulatory bodies and industry standards organizations are increasingly recognizing the importance of quantum-resistant security, with guidelines emerging that recommend or mandate post-quantum cryptographic implementations for critical infrastructure.

Early adoption of post-quantum cryptography is already underway across various industrial sectors, with pilot programs testing the integration of quantum-resistant algorithms into programmable logic controllers, supervisory control and data acquisition systems, and other operational technology platforms. Research indicates that hybrid approaches—combining traditional and post-quantum algorithms—are gaining traction as organizations transition toward full quantum resistance while maintaining backward compatibility. The manufacturing sector, energy utilities, and transportation infrastructure operators are among the early adopters, recognizing that the window for implementing these protections is narrowing as quantum computing advances accelerate. Industry analysts note that the convergence of cyber-physical systems and the Industrial Internet of Things amplifies the urgency, as interconnected devices create expanded attack surfaces that must be secured against both present and future threats. As quantum computing continues its rapid development trajectory, post-quantum cryptography will transition from a forward-looking precaution to an essential component of industrial cybersecurity frameworks, ensuring that the Fourth Industrial Revolution's digital infrastructure remains resilient against the computational capabilities of tomorrow.

TRL
7/9Operational
Impact
5/5
Investment
4/5
Category
Ethics Security

Related Organizations

IBM Research logo
IBM Research

United States · Company

98%

Long-standing leader in neuro-symbolic AI, combining neural networks with logical reasoning for enterprise applications.

Developer
PQShield logo
PQShield

United Kingdom · Startup

95%

A spinout from Oxford University providing hardware and software IP for PQC, including side-channel analysis tools to test resistance.

Developer
SandboxAQ logo
SandboxAQ

United States · Company

95%

Spun out of Alphabet, they provide a Security Suite that discovers cryptographic vulnerabilities and manages the migration to PQC.

Developer
QuSecure logo
QuSecure

United States · Startup

92%

Provides 'QuProtect', a software platform that monitors network traffic to detect and upgrade vulnerable cryptographic connections.

Developer
ISARA Corporation logo
ISARA Corporation

Canada · Company

90%

Develops crypto-agile solutions and tools to test and migrate systems to quantum-safe standards.

Developer
EvolutionQ logo
EvolutionQ

Canada · Startup

88%

Co-founded by Michele Mosca, offering 'Quantum Risk Assessment' services and tools to evaluate organizational vulnerability to quantum decryption.

Developer
Quantinuum logo
Quantinuum

United States · Company

88%

Integrated quantum computing company formed by Honeywell and CQC.

Developer
Cloudflare logo
Cloudflare

United States · Company

85%

A web infrastructure and security company that has already enabled PQC support for a significant portion of the internet.

Deployer
Infineon Technologies logo
Infineon Technologies

Germany · Company

85%

A major semiconductor manufacturer developing secure chips with hardware support for PQC algorithms.

Developer
Thales logo
Thales

France · Company

85%

Prime contractor for the TeQuantS project and a key partner in ESA's quantum satellite initiatives.

Deployer

Supporting Evidence

Evidence data is not available for this technology yet.

Same technology in other hubs

Continuum
Continuum
Post-Quantum Cryptography

Encryption methods designed to resist attacks from quantum computers

Meridian
Meridian
Post-Quantum Cryptography

Encryption algorithms designed to withstand attacks from quantum computers

Sentinel
Sentinel
Post-Quantum Cryptography

Encryption methods designed to resist attacks from quantum computers

Grid
Grid
Post-Quantum Cryptography

Encryption methods designed to resist attacks from quantum computers

Folio
Folio
Post-Quantum Cryptography

Encryption resistant to future quantum computing attacks.

Horizons
Horizons
Post-Quantum Cryptography

Encryption methods designed to withstand attacks from quantum computers

Link
Link
Post-Quantum Cryptography (PQC)

Encryption algorithms designed to withstand attacks from quantum computers

Vault
Vault
Post-Quantum Cryptography

Encryption methods designed to withstand attacks from quantum computers

Connections

Ethics Security
Ethics Security
Privacy-Preserving Computation

Cryptographic methods enabling secure computation on encrypted data without exposing sensitive information

TRL
5/9
Impact
5/5
Investment
4/5
Hardware
Hardware
Quantum Computing for Industrial Optimization

Quantum processors tackling complex scheduling, routing, and optimization problems in manufacturing

TRL
4/9
Impact
5/5
Investment
5/5

Book a research session

Bring this signal into a focused decision sprint with analyst-led framing and synthesis.
Research Sessions