Skip to main content

Envisioning is an emerging technology research institute and advisory.

LinkedInInstagramGitHub

2011 — 2026

research
  • Reports
  • Newsletter
  • Methodology
  • Origins
  • My Collection
services
  • Research Sessions
  • Signals Workspace
  • Bespoke Projects
  • Use Cases
  • Signal Scanfree
  • Readinessfree
impact
  • ANBIMAFuture of Brazilian Capital Markets
  • IEEECharting the Energy Transition
  • Horizon 2045Future of Human and Planetary Security
  • WKOTechnology Scanning for Austria
audiences
  • Innovation
  • Strategy
  • Consultants
  • Foresight
  • Associations
  • Governments
resources
  • Pricing
  • Partners
  • How We Work
  • Data Visualization
  • Multi-Model Method
  • FAQ
  • Security & Privacy
about
  • Manifesto
  • Community
  • Events
  • Support
  • Contact
  • Login
ResearchServicesPricingPartnersAbout
ResearchServicesPricingPartnersAbout
  1. Home
  2. Research
  3. Vault
  4. Post-Quantum Cryptography

Post-Quantum Cryptography

Encryption methods designed to withstand attacks from quantum computers
Back to VaultView interactive version

Post-quantum cryptography represents a fundamental shift in how financial institutions protect sensitive data against an emerging threat: quantum computers capable of breaking current encryption standards. Traditional cryptographic systems, including RSA and elliptic curve cryptography that underpin modern banking, payment processing, and blockchain networks, rely on mathematical problems that are computationally infractible for classical computers to solve. However, quantum computers leveraging algorithms like Shor's algorithm could theoretically crack these encryption methods in minutes rather than millennia. Post-quantum cryptography addresses this vulnerability by developing new cryptographic algorithms based on mathematical problems that remain difficult even for quantum computers, such as lattice-based cryptography, hash-based signatures, and code-based encryption. The National Institute of Standards and Technology (NIST) has led a multi-year standardization process, selecting algorithms like CRYSTALS-Kyber for key encapsulation and CRYSTALS-Dilithium for digital signatures as the foundation for quantum-resistant security protocols.

The financial services industry faces particularly acute risks from quantum computing advances, as the sector depends entirely on cryptographic security for transaction authentication, customer data protection, and regulatory compliance. A sufficiently powerful quantum computer could retroactively decrypt archived financial communications, compromise digital signatures on contracts and transactions, or undermine the cryptographic foundations of blockchain-based assets and central bank digital currencies. Post-quantum cryptography provides financial institutions with migration pathways to quantum-resistant security before quantum computers reach operational capability. This transition addresses not only future threats but also "harvest now, decrypt later" attacks, where adversaries collect encrypted data today with the intention of decrypting it once quantum computers become available. The technology enables banks, insurance companies, and payment processors to maintain the confidentiality and integrity guarantees that customers and regulators expect, even in a post-quantum world.

Major financial institutions and technology providers have begun implementing hybrid cryptographic approaches that combine classical and post-quantum algorithms, providing security against both current and future threats while allowing gradual system migration. Payment networks are exploring quantum-resistant protocols for card transactions and digital wallets, while blockchain platforms are developing quantum-safe consensus mechanisms and wallet architectures. Regulatory bodies are increasingly recognizing quantum computing as a material cybersecurity risk, with some jurisdictions beginning to establish timelines for post-quantum cryptography adoption in critical financial infrastructure. The technology connects to broader industry trends around cryptographic agility—the ability to rapidly update security protocols as threats evolve—and zero-trust architecture principles that assume potential compromise at every layer. As quantum computing capabilities advance and become more accessible, post-quantum cryptography will transition from a forward-looking precaution to an essential component of financial security infrastructure, ensuring that the digital foundations of modern finance remain secure in an era of unprecedented computational power.

TRL
6/9Demonstrated
Impact
5/5
Investment
4/5
Category
Software

Related Organizations

National Institute of Standards and Technology (NIST) logo
National Institute of Standards and Technology (NIST)

United States · Government Agency

100%

US federal agency that sets standards for technology, including facial recognition vendor tests (FRVT).

Standards Body
Bank for International Settlements (BIS) logo
Bank for International Settlements (BIS)

Switzerland · Consortium

95%

International financial institution owned by central banks that fosters international monetary and financial cooperation.

Researcher
PQShield logo
PQShield

United Kingdom · Startup

95%

A spinout from Oxford University providing hardware and software IP for PQC, including side-channel analysis tools to test resistance.

Developer
SandboxAQ logo
SandboxAQ

United States · Company

95%

Spun out of Alphabet, they provide a Security Suite that discovers cryptographic vulnerabilities and manages the migration to PQC.

Developer
ISARA Corporation logo
ISARA Corporation

Canada · Company

90%

Develops crypto-agile solutions and tools to test and migrate systems to quantum-safe standards.

Developer
QuSecure logo
QuSecure

United States · Startup

90%

Provides 'QuProtect', a software platform that monitors network traffic to detect and upgrade vulnerable cryptographic connections.

Developer
EvolutionQ logo
EvolutionQ

Canada · Startup

85%

Co-founded by Michele Mosca, offering 'Quantum Risk Assessment' services and tools to evaluate organizational vulnerability to quantum decryption.

Developer
ID Quantique logo
ID Quantique

Switzerland · Company

85%

A global leader in quantum cybersecurity solutions, specifically known for their Quantis QRNG chips and appliances.

Developer
Quantinuum logo
Quantinuum

United States · Company

85%

Integrated quantum computing company formed by Honeywell and CQC.

Developer
Thales logo
Thales

France · Company

80%

Prime contractor for the TeQuantS project and a key partner in ESA's quantum satellite initiatives.

Developer

Supporting Evidence

Evidence data is not available for this technology yet.

Same technology in other hubs

Meridian
Meridian
Post-Quantum Cryptography

Encryption algorithms designed to withstand attacks from quantum computers

Sentinel
Sentinel
Post-Quantum Cryptography

Encryption methods designed to resist attacks from quantum computers

Continuum
Continuum
Post-Quantum Cryptography

Encryption methods designed to resist attacks from quantum computers

Quadrant
Quadrant
Post-Quantum Cryptography

Encryption methods designed to withstand attacks from quantum computers

Folio
Folio
Post-Quantum Cryptography

Encryption resistant to future quantum computing attacks.

Horizons
Horizons
Post-Quantum Cryptography

Encryption methods designed to withstand attacks from quantum computers

Grid
Grid
Post-Quantum Cryptography

Encryption methods designed to resist attacks from quantum computers

Connections

Ethics Security
Ethics Security
Quantum-Resistant Digital Identity

Identity systems using post-quantum cryptography to resist future quantum attacks

TRL
4/9
Impact
5/5
Investment
4/5
Hardware
Hardware
Quantum Financial Processors

Quantum computing hardware designed for portfolio optimization and financial risk modeling

TRL
5/9
Impact
5/5
Investment
5/5
Hardware
Hardware
Distributed Custody HSM Clusters

Multi-location hardware security modules that split cryptographic keys across nodes to protect digital assets

TRL
7/9
Impact
4/5
Investment
5/5
Software
Software
Fully Homomorphic Encryption (FHE)

Performing computations on encrypted data without ever decrypting it

TRL
5/9
Impact
5/5
Investment
5/5

Book a research session

Bring this signal into a focused decision sprint with analyst-led framing and synthesis.
Research Sessions