Skip to main content

Envisioning is an emerging technology research institute and advisory.

LinkedInInstagramGitHub

2011 — 2026

research
  • Reports
  • Newsletter
  • Methodology
  • Origins
  • My Collection
services
  • Research Sessions
  • Signals Workspace
  • Bespoke Projects
  • Use Cases
  • Signal Scanfree
  • Readinessfree
impact
  • ANBIMAFuture of Brazilian Capital Markets
  • IEEECharting the Energy Transition
  • Horizon 2045Future of Human and Planetary Security
  • WKOTechnology Scanning for Austria
audiences
  • Innovation
  • Strategy
  • Consultants
  • Foresight
  • Associations
  • Governments
resources
  • Pricing
  • Partners
  • How We Work
  • Data Visualization
  • Multi-Model Method
  • FAQ
  • Security & Privacy
about
  • Manifesto
  • Community
  • Events
  • Support
  • Contact
  • Login
ResearchServicesPricingPartnersAbout
ResearchServicesPricingPartnersAbout
  1. Home
  2. Research
  3. Sentinel
  4. Post-Quantum Cryptography

Post-Quantum Cryptography

Encryption methods designed to resist attacks from quantum computers
Back to SentinelView interactive version

The rapid advancement of quantum computing poses an existential threat to the cryptographic systems that currently secure global digital infrastructure. Traditional encryption methods, such as RSA and elliptic curve cryptography, rely on mathematical problems that are computationally infeasible for classical computers to solve—specifically, the difficulty of factoring large numbers or solving discrete logarithm problems. However, quantum computers leverage principles of quantum mechanics to perform certain calculations exponentially faster than their classical counterparts. Algorithms like Shor's algorithm, when run on sufficiently powerful quantum computers, could break these widely-used encryption schemes in a matter of hours or even minutes. Post-Quantum Cryptography addresses this vulnerability by developing new cryptographic algorithms based on mathematical problems that remain difficult even for quantum computers to solve. These include lattice-based cryptography, hash-based signatures, code-based cryptography, and multivariate polynomial equations. Unlike traditional methods, these approaches are designed from the ground up to resist both classical and quantum attacks, ensuring that encrypted data remains secure in a post-quantum world.

The implications for industries and critical infrastructure are profound. Financial institutions, healthcare systems, government communications, and e-commerce platforms all depend on cryptographic protocols to protect sensitive data, authenticate users, and ensure transaction integrity. The threat is not merely theoretical—adversaries can employ "harvest now, decrypt later" strategies, collecting encrypted data today with the intention of decrypting it once quantum computers become sufficiently powerful. This creates an urgent need for organisations to begin transitioning to quantum-resistant algorithms before quantum computers reach the capability to break current encryption standards. Research institutions and standards bodies have recognised this urgency, with organisations working to evaluate and standardise post-quantum algorithms that can be integrated into existing systems with minimal disruption. The transition represents one of the most significant cryptographic migrations in history, requiring updates to protocols, hardware, and software across virtually every sector that relies on digital security.

Early adoption efforts are already underway across multiple sectors. Technology companies and financial institutions have begun pilot programs to test post-quantum algorithms in controlled environments, assessing their performance characteristics and compatibility with existing infrastructure. Government agencies in several countries have issued directives mandating the evaluation and eventual adoption of quantum-resistant cryptography for protecting classified and sensitive information. The challenge extends beyond simply implementing new algorithms—organisations must also address the hybrid transition period, where both classical and post-quantum systems operate simultaneously to ensure backward compatibility and uninterrupted service. This dual-layer approach allows for gradual migration while maintaining security against both current and future threats. As quantum computing continues to progress from laboratory demonstrations toward practical applications, the timeline for widespread post-quantum cryptography deployment becomes increasingly compressed. Industry analysts note that the window for proactive migration is narrowing, making post-quantum cryptography not just a future consideration but an immediate priority for any organisation committed to long-term data security and maintaining trust in an increasingly quantum-enabled world.

TRL
6/9Demonstrated
Impact
5/5
Investment
5/5
Category
Ethics Security

Related Organizations

NIST logo
NIST

United States · Government Agency

100%

The US federal agency leading the global competition to select and standardize post-quantum cryptographic algorithms.

Standards Body
IBM Research logo
IBM Research

United States · Company

95%

Long-standing leader in neuro-symbolic AI, combining neural networks with logical reasoning for enterprise applications.

Researcher
PQShield logo
PQShield

United Kingdom · Startup

95%

A spinout from Oxford University providing hardware and software IP for PQC, including side-channel analysis tools to test resistance.

Developer
SandboxAQ logo
SandboxAQ

United States · Company

95%

Spun out of Alphabet, they provide a Security Suite that discovers cryptographic vulnerabilities and manages the migration to PQC.

Developer
Institute for Quantum Computing (IQC) logo
Institute for Quantum Computing (IQC)

Canada · University

90%

A scientific research institute at the University of Waterloo.

Researcher
ISARA Corporation logo
ISARA Corporation

Canada · Company

90%

Develops crypto-agile solutions and tools to test and migrate systems to quantum-safe standards.

Developer
QuSecure logo
QuSecure

United States · Startup

90%

Provides 'QuProtect', a software platform that monitors network traffic to detect and upgrade vulnerable cryptographic connections.

Developer
Crypto4A logo
Crypto4A

Canada · Startup

85%

Develops quantum-ready Hardware Security Modules (HSMs) and security platforms.

Developer
EvolutionQ logo
EvolutionQ

Canada · Startup

85%

Co-founded by Michele Mosca, offering 'Quantum Risk Assessment' services and tools to evaluate organizational vulnerability to quantum decryption.

Developer
Infineon Technologies logo
Infineon Technologies

Germany · Company

85%

A major semiconductor manufacturer developing secure chips with hardware support for PQC algorithms.

Developer
Quantinuum logo
Quantinuum

United States · Company

85%

Integrated quantum computing company formed by Honeywell and CQC.

Developer

Supporting Evidence

Evidence data is not available for this technology yet.

Same technology in other hubs

Meridian
Meridian
Post-Quantum Cryptography

Encryption algorithms designed to withstand attacks from quantum computers

Continuum
Continuum
Post-Quantum Cryptography

Encryption methods designed to resist attacks from quantum computers

Folio
Folio
Post-Quantum Cryptography

Encryption resistant to future quantum computing attacks.

Quadrant
Quadrant
Post-Quantum Cryptography

Encryption methods designed to withstand attacks from quantum computers

Horizons
Horizons
Post-Quantum Cryptography

Encryption methods designed to withstand attacks from quantum computers

Link
Link
Post-Quantum Cryptography (PQC)

Encryption algorithms designed to withstand attacks from quantum computers

Grid
Grid
Post-Quantum Cryptography

Encryption methods designed to resist attacks from quantum computers

Vault
Vault
Post-Quantum Cryptography

Encryption methods designed to withstand attacks from quantum computers

Polis
Polis
Post-Quantum Government Cryptography

Quantum-resistant encryption safeguarding government communications and classified data

Connections

Hardware
Hardware
Quantum Key Distribution Networks

Encryption key exchange secured by quantum physics rather than mathematical algorithms

TRL
7/9
Impact
5/5
Investment
5/5
Hardware
Hardware
Quantum Random Number Generators

Hardware generating unpredictable randomness from quantum phenomena for cryptographic security

TRL
6/9
Impact
5/5
Investment
4/5

Book a research session

Bring this signal into a focused decision sprint with analyst-led framing and synthesis.
Research Sessions