Inhaltsverzeichnis
3.1 What is Post-Quantum Cryptography?
Protection against future quantum computer attacks.
The Problem
Today's encryption (RSA1)), ECC2)) is based on mathematical problems that are hard to solve for normal computers. Quantum computers3) could solve these problems in minutes instead of millennia - using Shor's Algorithm4).
The Threat
„Harvest Now, Decrypt Later“5)
Attackers collect encrypted data today and wait for powerful quantum computers to decrypt it later.
Affects:
- Trade secrets
- Long-term contracts
- Personal data
- Health data
The Solution
Post-Quantum Cryptography (PQC)6)
New encryption methods that even quantum computers cannot break. These are based on different mathematical problems:
- Hash-based: SLH-DSA9)
- Code-based: Under evaluation
Timeline
WvdS PQ-Crypto Library
EMSR DATA provides a ready-to-use .NET library for Post-Quantum Cryptography:
Sources
1)
RSA Algorithm: https://en.wikipedia.org/wiki/RSA_(cryptosystem
2)
Elliptic Curve Cryptography: https://en.wikipedia.org/wiki/Elliptic-curve_cryptography
3)
Quantum Computing Fundamentals: https://www.ibm.com/topics/quantum-computing
4)
Shor's Algorithm: https://en.wikipedia.org/wiki/Shor%27s_algorithm
5)
ENISA: Post-Quantum Cryptography - Current State: https://www.enisa.europa.eu/publications/post-quantum-cryptography-current-state-and-quantum-mitigation
6)
NIST Post-Quantum Cryptography: https://csrc.nist.gov/Projects/post-quantum-cryptography
7)
FIPS 203 (ML-KEM): https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.203.pdf
8)
FIPS 204 (ML-DSA): https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.204.pdf
9)
FIPS 205 (SLH-DSA): https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.205.pdf
12)
NIS2 Directive: https://eur-lex.europa.eu/eli/dir/2022/2555/oj
13)
NIST: Transition to PQC: https://csrc.nist.gov/projects/post-quantum-cryptography/post-quantum-cryptography-standardization
Zuletzt geändert: on 2026/01/30 at 08:47 AM