Quantum computing will bring about a major change in the way we protect information. Many of today's cryptographic systems will no longer be secure when sufficiently advanced quantum computers exist.
Post-Quantum Cryptography (PQC) addresses this challenge through new algorithms designed to resist this type of attacks. At CTIC Quantum Lab we help organizations anticipate this change by assessing their current situation and defining secure and progressive transition strategies. Our approach is based on crypto-agility, which allows adapting data and digital identity protection without disrupting operations.
Assessment of current security
We analyze the impact of quantum computing on existing cryptographic systems:
- Public key cryptography (RSA, ECC): based on mathematical problems difficult for classical computing, but vulnerable in the future to quantum algorithms such as Shor, which would allow solving them efficiently.
- Symmetric cryptography and hash functions (AES, SHA): more resistant to quantum attacks. Algorithms such as Grover reduce their security, but this impact can be mitigated by increasing the size of the keys.
Transition to new standards
We work with the new international standards, especially those defined by NIST, which will mark the evolution of cryptography in the coming years:
- ML-KEM (Kyber): based on lattices. It is the leading standard for key exchange because of its high speed and efficiency.
- ML-DSA (Dilithium): lattice-based. The recommended digital signature algorithm for its balance and performance.
- SLH-DSA (Sphincs+): based on hash functions. Used in digital signatures and offers exceptional robustness by not relying on lattice issues.
- FN-DSA (Falcon): based on lattices. Especially efficient for signatures requiring very small size.
- Classic McEliece: based on error-correcting codes. A veteran scheme with decades of proven robustness for key exchange and encryption.