Post-quantum cryptographic algorithms

Here's a list of post-quantum cryptographic algorithms, including their names, descriptions, and inventors or corporations:

Algorithm Name Description Inventor/Corporation
CRYSTALS-Kyber A lattice-based key encapsulation mechanism (KEM) for secure key exchange. CRYSTALS team (joint effort)
CRYSTALS-Dilithium A lattice-based digital signature scheme designed for efficiency and security. CRYSTALS team (joint effort)
FrodoKEM A lattice-based KEM based on the Learning With Errors (LWE) problem. Multiple researchers
NTRUEncrypt A lattice-based encryption algorithm offering high performance. Jeffrey Hoffstein, Jill Pipher, Joseph Silverman
SABER A lattice-based KEM designed to offer strong security and performance. Multiple researchers
BIKE A code-based KEM focused on efficiency and security in post-quantum scenarios. Arm Limited and several universities
HQC A code-based KEM using the hardness of decoding random linear codes. Multiple researchers
SPHINCS+ A stateless hash-based digital signature scheme offering long-term security. Multiple researchers
Rainbow A multivariate polynomial public key encryption and signature scheme. Jintai Ding, Dieter Schmidt
Picnic A digital signature scheme based on zero-knowledge proofs and symmetric cryptography. Multiple researchers
Matsumoto-Imai Scheme A A multivariate public key encryption scheme. Tsutomu Matsumoto, Hideki Imai
GeMSS A multivariate polynomial public key encryption scheme optimized for efficiency. Multiple researchers
Classic McEliece A code-based encryption scheme known for its long-standing security. Robert McEliece
SIKE (Supersingular Isogeny Key Encapsulation) An isogeny-based KEM with small key sizes but strong security assumptions. Multiple researchers

Difference between quantum cryptography and post-quantum cryptography

Quantum Cryptography Post-Quantum Cryptography
Nature and Concept:
Involves using principles of quantum mechanics to secure communication, like Quantum Key Distribution (QKD). QKD allows secure key exchange by detecting eavesdropping attempts through quantum disturbances.
Nature and Concept:
Refers to cryptographic algorithms designed to be secure against quantum computers. It relies on classical mathematics to protect against future quantum threats.
Underlying Technology:
Relies on quantum bits (qubits) and principles of superposition and entanglement. Requires quantum hardware, such as quantum channels and detectors.
Underlying Technology:
Works on classical computers and involves hard mathematical problems like lattice-based cryptography. Can be integrated into existing digital infrastructure.
Security Basis:
Security is based on quantum mechanics, making it immune to attacks from classical and quantum computers. Emerging technology with practical challenges.
Security Basis:
Security is based on problems believed to be hard for quantum computers, making it a defense against future quantum threats. Actively being standardized for widespread adoption.
Key Differences:
    · Foundation: Quantum Cryptography is based on quantum mechanics.
    · Implementation: Quantum Cryptography requires specialized quantum hardware.
    · Purpose: Quantum Cryptography secures communication channels today, immune to all known attacks.
    · Adoption: Quantum Cryptography is in early deployment.
Key Differences:
· Foundation: Post-Quantum Cryptography is based on classical mathematics but designed to resist quantum attacks.
· Implementation: Post-Quantum Cryptography can be implemented on classical digital infrastructure.
· Purpose: Post-Quantum Cryptography prepares current encryption methods to resist future quantum threats.
· Adoption: Post-Quantum Cryptography is being standardized for widespread adoption.

Post quantum cryptography vs quantum cryptography

Difference between post quantum cryptography and quantum cryptography


Post-Quantum Encryption Standards

Please refer to this page regarding the Post-Quantum Encryption Standards that has been released by NIST. Alternative post on Linkedin.