Post-quantum Cryptography

The first quantum computers have already demonstrated their immense computing power to the general public: From analyzing large volumes of data to simulating molecular reactions to managing traffic and generating sustainable energy, these supercomputers have a multifaceted range of possible uses. However, their ability to break down prime factors make quantum computers a threat to the security of the encryption processes currently in use.

Experts at Fraunhofer AISEC are conducting research into post-quantum cryptography in order to make cryptographic systems quantum-secure and keep digital assets secure against potential attacks by quantum computers.

Nicolas Buchmann

Post-quantum cryptography in practice

The threat posed by quantum computers to the asymmetric cryptography in use today has been well known in the scientific community for more than 25 years, since Peter Shor published a polynomial algorithm for prime factorization to solve the discrete logarithm on a quantum computer. In recent years, crypto experts have increasingly been warning of the progress that is being made in quantum computing and its relevance for cryptography.

Research on post-quantum cryptography (PQC) at the Fraunhofer Institute for Applied and Integrated Security AISEC aims to enable businesses, government bodies and citizens to continue to have access to usable cryptography that will remain secure in the long term so they can keep their data secure. This blog article provides a brief overview of four ongoing projects.

Read Article ยป
Other Topics