Here's a list of post-quantum cryptographic algorithms, including their names, descriptions, and inventors or corporations:
| Algorithm Name | Description | Inventor/Corporation |
|---|---|---|
| CRYSTALS-Kyber | A lattice-based key encapsulation mechanism (KEM) for secure key exchange. | CRYSTALS team (joint effort) |
| CRYSTALS-Dilithium | A lattice-based digital signature scheme designed for efficiency and security. | CRYSTALS team (joint effort) |
| FrodoKEM | A lattice-based KEM based on the Learning With Errors (LWE) problem. | Multiple researchers |
| NTRUEncrypt | A lattice-based encryption algorithm offering high performance. | Jeffrey Hoffstein, Jill Pipher, Joseph Silverman |
| SABER | A lattice-based KEM designed to offer strong security and performance. | Multiple researchers |
| BIKE | A code-based KEM focused on efficiency and security in post-quantum scenarios. | Arm Limited and several universities |
| HQC | A code-based KEM using the hardness of decoding random linear codes. | Multiple researchers |
| SPHINCS+ | A stateless hash-based digital signature scheme offering long-term security. | Multiple researchers |
| Rainbow | A multivariate polynomial public key encryption and signature scheme. | Jintai Ding, Dieter Schmidt |
| Picnic | A digital signature scheme based on zero-knowledge proofs and symmetric cryptography. | Multiple researchers |
| Matsumoto-Imai Scheme A | A multivariate public key encryption scheme. | Tsutomu Matsumoto, Hideki Imai |
| GeMSS | A multivariate polynomial public key encryption scheme optimized for efficiency. | Multiple researchers |
| Classic McEliece | A code-based encryption scheme known for its long-standing security. | Robert McEliece |
| SIKE (Supersingular Isogeny Key Encapsulation) | An isogeny-based KEM with small key sizes but strong security assumptions. | Multiple researchers |
| Quantum Cryptography | Post-Quantum Cryptography |
|---|---|
|
Nature and Concept: Involves using principles of quantum mechanics to secure communication, like Quantum Key Distribution (QKD). QKD allows secure key exchange by detecting eavesdropping attempts through quantum disturbances. |
Nature and Concept: Refers to cryptographic algorithms designed to be secure against quantum computers. It relies on classical mathematics to protect against future quantum threats. |
|
Underlying Technology: Relies on quantum bits (qubits) and principles of superposition and entanglement. Requires quantum hardware, such as quantum channels and detectors. |
Underlying Technology: Works on classical computers and involves hard mathematical problems like lattice-based cryptography. Can be integrated into existing digital infrastructure. |
|
Security Basis: Security is based on quantum mechanics, making it immune to attacks from classical and quantum computers. Emerging technology with practical challenges. |
Security Basis: Security is based on problems believed to be hard for quantum computers, making it a defense against future quantum threats. Actively being standardized for widespread adoption. |
Key Differences:
· Implementation: Quantum Cryptography requires specialized quantum hardware. · Purpose: Quantum Cryptography secures communication channels today, immune to all known attacks. · Adoption: Quantum Cryptography is in early deployment. |
Key Differences: · Foundation: Post-Quantum Cryptography is based on classical mathematics but designed to resist quantum attacks. · Implementation: Post-Quantum Cryptography can be implemented on classical digital infrastructure. · Purpose: Post-Quantum Cryptography prepares current encryption methods to resist future quantum threats. · Adoption: Post-Quantum Cryptography is being standardized for widespread adoption. |

Please refer to this page regarding the Post-Quantum Encryption Standards that has been released by NIST. Alternative post on Linkedin.