Phase 4: Post-Quantum Cryptography
Post-quantum cryptography (PQC) is the answer to the quantum threat. These are classical algorithms — they run on today's computers — but they rely on mathematical problems that even a quantum computer can't solve efficiently. NIST finalized the first three standards in August 2024. This is the future of encryption.
What is Post-Quantum Cryptography?
Classical algorithms that quantum computers can't break. The four main families and the hard problems they're built on.
Start here →NIST PQC Standards (FIPS 203/204/205)
The 8-year standardization process that selected the algorithms the world will use. What FIPS 203, 204, and 205 mean and when to use each.
Explore NIST standards →Lattice-Based Cryptography (ML-KEM)
The most important family of post-quantum algorithms. How lattices and the "Learning With Errors" problem create unbreakable encryption.
Explore lattice crypto →Digital Signatures (ML-DSA)
How to sign documents and code in a quantum-safe way. CRYSTALS-Dilithium, now standardized as ML-DSA under FIPS 204.
Explore ML-DSA →Hash-Based Signatures (SLH-DSA)
The most conservative post-quantum signature scheme — security reducible to the hash function alone. SPHINCS+, now FIPS 205.
Explore SLH-DSA →Frequently Asked Questions
What will I learn here?
This page covers the core concepts and techniques you need to understand the topic and progress confidently to the next lesson.
How should I use this page?
Start with the overview, then follow the section links to deepen your understanding. Use the table of contents on the right to jump to specific sections.
What should I read next?
Use the navigation below to continue to the next lesson or explore related topics.