Classical vs. Post-Quantum Cryptography: Preparing for the Quantum Era π
Explore a detailed comparison between traditional and emerging post-quantum cryptographic algorithms, highlighting their importance in securing data against future quantum threats.

Aljazari Foundation
6 views β’ Oct 31, 2025

About this video
A Comparative Study of Classical and
Post-Quantum Cryptographic Algorithms in the
Era of Quantum Computing
Arimondo Scrivano
β
August 5, 2025
Abstract
The advent of quantum computing poses a significant threat to the foundational cryptographic algorithms that secure modern digital communications. [27]. Protocols such as HTTPS, digital certificates, and public key infrastructures (PKIs) heavily rely on cryptographic primitives like RSA, ECC, and Diffie-Hellman, which are vulnerable to quantum attacks most notably Shorβs algorithm. [18]. This paper presents a comprehensive comparative analysis between classical cryptographic algorithms currently in widespread use and emerging post-quantum cryptographic schemes designed to withstand quantum adversaries. [24]. We review the cryptographic mechanisms underpinning modern internet security, outline the mathematical foundations of quantum attacks, and evaluate the security, performance, and implementation feasibility of quantum-resistant alternatives such as Kyber, Dilithium, and Falcon. [25]. Additionally, we assess the hybrid approaches currently being explored by institutions and tech companies to enable a smooth transition to post-quantum cryptography. [23]. By providing an in-depth comparison, this study aims to guide researchers, developers, and policymakers in understanding the critical implications of quantum computing on cryptographic infrastructures and the necessary steps for securing communications in the quantum era. [16].
#comparativestudy #PostQuantumCryptographic #quantumcomputing
Post-Quantum Cryptographic Algorithms in the
Era of Quantum Computing
Arimondo Scrivano
β
August 5, 2025
Abstract
The advent of quantum computing poses a significant threat to the foundational cryptographic algorithms that secure modern digital communications. [27]. Protocols such as HTTPS, digital certificates, and public key infrastructures (PKIs) heavily rely on cryptographic primitives like RSA, ECC, and Diffie-Hellman, which are vulnerable to quantum attacks most notably Shorβs algorithm. [18]. This paper presents a comprehensive comparative analysis between classical cryptographic algorithms currently in widespread use and emerging post-quantum cryptographic schemes designed to withstand quantum adversaries. [24]. We review the cryptographic mechanisms underpinning modern internet security, outline the mathematical foundations of quantum attacks, and evaluate the security, performance, and implementation feasibility of quantum-resistant alternatives such as Kyber, Dilithium, and Falcon. [25]. Additionally, we assess the hybrid approaches currently being explored by institutions and tech companies to enable a smooth transition to post-quantum cryptography. [23]. By providing an in-depth comparison, this study aims to guide researchers, developers, and policymakers in understanding the critical implications of quantum computing on cryptographic infrastructures and the necessary steps for securing communications in the quantum era. [16].
#comparativestudy #PostQuantumCryptographic #quantumcomputing
Tags and Topics
Browse our collection to discover more content in these categories.
Video Information
Views
6
Duration
48:03
Published
Oct 31, 2025
Related Trending Topics
LIVE TRENDSRelated trending topics. Click any trend to explore more videos.