Cybersecurity & Post-Quantum Cryptography Roadmap
The internet runs on cryptography — and a quantum computer powerful enough to run Shor's algorithm could break most of it in hours. This isn't science fiction anymore. NIST has already finalized the first post-quantum standards. Companies like Google, Cloudflare, and AWS are shipping quantum-safe options right now. This roadmap takes you from "what even is a cipher?" all the way to understanding the algorithms that will protect the internet for the next 50 years.
Phase 1: Cybersecurity Fundamentals
BeginnerGoal: Understand how attackers think, what assets we're protecting, and the bedrock concepts every security professional knows.
- What is Cybersecurity? The discipline of protecting systems and data.
- The CIA Triad: Confidentiality, Integrity, Availability — the three pillars.
- Types of Cyber Threats: Malware, phishing, MITM, ransomware, and more.
- Networking Basics: TCP/IP, DNS, firewalls, and how data moves.
- Authentication & Authorization: Who you are vs. what you can do.
Phase 2: Classical Cryptography
IntermediateGoal: Learn how modern encryption actually works — the math and logic that keeps your passwords, payments, and messages safe today.
- What is Cryptography? Ciphers, keys, and the science of secrets.
- Symmetric Encryption (AES): One key to lock and unlock everything.
- Asymmetric Encryption (RSA & ECC): Public-private key pairs and why they work.
- Hash Functions & Digital Signatures: Fingerprints and proof of identity.
- TLS, SSL & PKI: How HTTPS protects your browser traffic.
Phase 3: The Quantum Threat
IntermediateGoal: Understand exactly why a sufficiently powerful quantum computer would break the encryption protecting banks, governments, and the internet.
- Why Quantum Breaks Encryption: The hard math problems that aren't hard for quantum.
- Shor's Algorithm: The algorithm that can factor huge numbers in polynomial time.
- Grover's Algorithm: Why even AES needs doubled key lengths.
- Harvest Now, Decrypt Later: Adversaries collecting encrypted data today to break tomorrow.
Phase 4: Post-Quantum Cryptography
AdvancedGoal: Learn the new generation of algorithms designed to resist quantum attacks — standardized by NIST and already shipping in products.
- What is Post-Quantum Cryptography? Hard problems quantum can't solve easily.
- NIST PQC Standards: FIPS 203, 204, 205 — the new global standards.
- Lattice Cryptography (ML-KEM): The math of lattices and why it's quantum-resistant.
- Digital Signatures (ML-DSA): Signing documents in a post-quantum world.
- Hash-Based Signatures (SLH-DSA): Simple, conservative, and proven secure.
Phase 5: Migration & Real World
ExpertGoal: Understand how organizations are actually migrating to quantum-safe cryptography and what that means for software you build today.
- Crypto-Agility: Building systems that can swap algorithms without rebuilding everything.
- Post-Quantum TLS: How HTTPS is being upgraded right now.
- PQC in Banking & Payments: The critical deadline for financial infrastructure.
- Open Source PQC Libraries: liboqs, BoringSSL, OpenSSL — what's available today.
- The Road Ahead: QKD, quantum networks, and what comes after PQC.
What do you need to get started?
You don't need to be a mathematician or have a security background. For the first three phases you just need:
- Curiosity — the willingness to ask "but how does that actually work?"
- Basic algebra — if you know what a variable is, you're set for Phase 1 and 2.
- No prior security knowledge required — we start from absolute zero.
For Phases 4 and 5, some comfort with modular arithmetic and matrix concepts helps — but we'll explain everything from scratch when we need it.
Why this matters right now
Post-quantum cryptography is moving out of research and into production. NIST published the first three quantum-safe standards in August 2024. Adversarial nation-states are believed to already be harvesting encrypted traffic to decrypt once quantum computers mature. The US government has mandated federal agencies migrate by 2035. If you build software that handles sensitive data — payments, healthcare, communications, infrastructure — this is not optional. It's a matter of when, not if.
Frequently Asked Questions
What will I learn here?
This page covers the core concepts and techniques you need to understand the topic and progress confidently to the next lesson.
How should I use this page?
Start with the overview, then follow the section links to deepen your understanding. Use the table of contents on the right to jump to specific sections.
What should I read next?
Use the navigation below to continue to the next lesson or explore related topics.