Understand Post-Quantum Cryptography
Understand Post-Quantum CryptographyScience & Technology
kairenner-gh/slates
Last update 2 w. agoCreated on the 23rd of March 2026

The Transition Happening Right Now

NIST ran the most open cryptographic standardization competition since AES: 69 submissions in 2016, multiple public rounds of cryptanalysis, and final standards published in 2024. The winning algorithms rely on mathematical problems believed to be hard even for quantum computers — primarily the geometry of high-dimensional lattices.

The Learning With Errors Problem

The Learning With Errors (LWE) problem: given many pairs (a_i, b_i) where b_i = a_i times s + e_i mod q, with s a secret vector and e_i small random noise, recover s. Without the noise this is easy linear algebra. With noise, no efficient classical or qua

ML-KEM: Key Encapsulation

ML-KEM (formerly Kyber) is the NIST key encapsulation mechanism, based on Module-LWE — LWE structured using module lattices for efficiency. It generates a shared secret that two parties can use for symmetric encryption. Key and ciphertext sizes are around

ML-DSA: Digital Signatures

ML-DSA (formerly Dilithium) is the primary NIST signature algorithm, based on Module-LWE and Module-SIS (short integer solution over module lattices). Signature size is approximately 2–3 KB. Security is based on the hardness of finding short vectors satis

SLH-DSA: Hash-Based Signatures

SLH-DSA (formerly SPHINCS+) builds signatures from hash functions using a hypertree of Merkle trees and one-time signature schemes. Its security assumption is minimal: if the underlying hash function is secure, the signature scheme is secure. No new mathe

PQC Migration Checklist

0%

Inventory all cryptographic primitives in use across services

Identify which use RSA, ECDH, ECDSA, or DH for key exchange or signatures

Deploy ML-KEM alongside ECDH as a hybrid for TLS key exchange (X25519+ML-KEM768)

Update TLS library to a version supporting hybrid post-quantum key exchange

Plan certificate migration to ML-DSA or use hybrid classical+PQC certificates

Prioritize systems handling long-lived secrets or data with multi-year confidentiality

Monitor NIST and library release notes for parameter updates

Go Deeper: The Geometry of Lattices

Lattice-based cryptography rests on the geometry of high-dimensional lattices — finding the shortest vector in a lattice is a deep mathematical problem connected to number theory, geometry, and the foundations of algorithms. The hardness is preserved under quantum computation because lattice problems lack the periodic structure that Shor exploits.