What Is Post-Quantum Cryptography (PQC)? Preparing for the Quantum Era of Encryption
Quantum computing is advancing โ and with it comes a fundamental shift in how we protect digital information. In this video, we explain what post-quantum cry...

Cyberpedia by Palo Alto Networks
45 views โข Feb 17, 2026

About this video
Quantum computing is advancing โ and with it comes a fundamental shift in how we protect digital information. In this video, we explain what post-quantum cryptography (PQC) is, why traditional encryption like RSA and elliptic-curve cryptography are at risk, and how new quantum-resistant algorithms are being standardized today. Learn how organizations can begin preparing for a quantum-resilient future through crypto-agility, hybrid cryptography, and phased migration strategies.
Key Details:
โ Explains how quantum algorithms like Shorโs threaten RSA and elliptic-curve cryptography
โ Breaks down major PQC algorithm families: lattice-based, hash-based, code-based, multivariate, and isogeny-based
โ Covers NIST-standardized algorithms: CRYSTALS-Kyber, CRYSTALS-Dilithium, and SPHINCS+
โ Outlines five practical steps to become quantum-ready, including crypto-agility and hybrid deployments
Links:
โ Learn about cryptographic security solutions: https://www.paloaltonetworks.com/network-security
โ Discover Zero Trust Network Security: https://www.paloaltonetworks.com/cyberpedia/what-is-zero-trust-network-security
0:00 What Is Post-Quantum Cryptography (PQC)?
0:23 Why Quantum Computing Threatens Todayโs Encryption
1:12 Classical vs. Post-Quantum Cryptography
1:45 Families of Post-Quantum Algorithms
2:55 NIST-Standardized PQC Algorithms
3:39 Hybrid Cryptography and Real-World Deployment
4:19 Five Steps to Become Quantum-Ready
5:03 PQC vs. Quantum Cryptography
5:30 The Future of Quantum-Resilient Security
#PostQuantumCryptography #PQC #QuantumSecurity #Cybersecurity #Encryption #QuantumComputing #CryptoAgility
__
Transcript
What is post-quantum cryptography?
Post-quantum cryptography, or PQC, is designed to protect digital information from attacks by quantum computers. It replaces encryption methods that could be broken by quantum algorithms and introduces new approaches built to resist both classical and quantum threats.
Todayโs public-key cryptography โ including RSA and elliptic-curve cryptography โ depends on mathematical problems that are intentionally difficult for classical computers to solve. But quantum algorithms, such as Shorโs algorithm, can solve these problems dramatically faster. That means future quantum computers could decrypt sensitive data or forge digital signatures.
Symmetric encryption, like AES-256, can be strengthened with larger keys. Public-key cryptography cannot simply scale the same way. Thatโs why new cryptographic systems are being built from the ground up.
Post-quantum algorithms use different mathematical foundations, including lattice problems, hash functions, and error-correcting codes. Importantly, they run on classical computers โ not quantum machines โ which means organizations can begin deploying them today.
The goal is dual resistance: encryption that remains secure now and in a future where quantum computers are practical.
There are several families of post-quantum algorithms. Lattice-based cryptography is currently the leading approach and forms the basis for many new standards. Hash-based cryptography provides conservative, well-understood signature schemes. Code-based systems like Classic McEliece have decades of cryptanalysis behind them. Multivariate and isogeny-based approaches are also part of ongoing research and evaluation.
The National Institute of Standards and Technology has selected three primary algorithms for standardization: CRYSTALS-Kyber for key establishment, CRYSTALS-Dilithium for digital signatures, and SPHINCS+ as a hash-based signature alternative. Additional candidates remain under review to increase diversity and resilience.
In the real world, organizations are beginning to test hybrid cryptography, where classical and post-quantum algorithms operate together. This approach maintains compatibility while introducing quantum resistance.
Migration is complex. Public-key infrastructures, certificates, and trust chains must be updated carefully. Thatโs why crypto-agility โ the ability to quickly replace cryptographic algorithms โ is critical for long-term resilience.
Becoming quantum-ready starts with five steps: inventory cryptographic assets, prioritize long-lived sensitive data, plan hybrid rollouts, design crypto-agile systems, and coordinate across vendors and supply chains.
Itโs also important to distinguish post-quantum cryptography from quantum cryptography. PQC is math-based and software-ready. Quantum cryptography, such as quantum key distribution, relies on physics and specialized hardware and is not broadly scalable across the internet.
The first PQC standards are finalized, but adoption is only beginning. Over the coming years, hardware manufacturers, cloud providers, and browser vendors will integrate quantum-resistant encryption more broadly.
Post-quantum cryptography is how we keep data secure in a world where quantum computing becomes a reality โ ensuring long-term trust, resilience, and security.
Key Details:
โ Explains how quantum algorithms like Shorโs threaten RSA and elliptic-curve cryptography
โ Breaks down major PQC algorithm families: lattice-based, hash-based, code-based, multivariate, and isogeny-based
โ Covers NIST-standardized algorithms: CRYSTALS-Kyber, CRYSTALS-Dilithium, and SPHINCS+
โ Outlines five practical steps to become quantum-ready, including crypto-agility and hybrid deployments
Links:
โ Learn about cryptographic security solutions: https://www.paloaltonetworks.com/network-security
โ Discover Zero Trust Network Security: https://www.paloaltonetworks.com/cyberpedia/what-is-zero-trust-network-security
0:00 What Is Post-Quantum Cryptography (PQC)?
0:23 Why Quantum Computing Threatens Todayโs Encryption
1:12 Classical vs. Post-Quantum Cryptography
1:45 Families of Post-Quantum Algorithms
2:55 NIST-Standardized PQC Algorithms
3:39 Hybrid Cryptography and Real-World Deployment
4:19 Five Steps to Become Quantum-Ready
5:03 PQC vs. Quantum Cryptography
5:30 The Future of Quantum-Resilient Security
#PostQuantumCryptography #PQC #QuantumSecurity #Cybersecurity #Encryption #QuantumComputing #CryptoAgility
__
Transcript
What is post-quantum cryptography?
Post-quantum cryptography, or PQC, is designed to protect digital information from attacks by quantum computers. It replaces encryption methods that could be broken by quantum algorithms and introduces new approaches built to resist both classical and quantum threats.
Todayโs public-key cryptography โ including RSA and elliptic-curve cryptography โ depends on mathematical problems that are intentionally difficult for classical computers to solve. But quantum algorithms, such as Shorโs algorithm, can solve these problems dramatically faster. That means future quantum computers could decrypt sensitive data or forge digital signatures.
Symmetric encryption, like AES-256, can be strengthened with larger keys. Public-key cryptography cannot simply scale the same way. Thatโs why new cryptographic systems are being built from the ground up.
Post-quantum algorithms use different mathematical foundations, including lattice problems, hash functions, and error-correcting codes. Importantly, they run on classical computers โ not quantum machines โ which means organizations can begin deploying them today.
The goal is dual resistance: encryption that remains secure now and in a future where quantum computers are practical.
There are several families of post-quantum algorithms. Lattice-based cryptography is currently the leading approach and forms the basis for many new standards. Hash-based cryptography provides conservative, well-understood signature schemes. Code-based systems like Classic McEliece have decades of cryptanalysis behind them. Multivariate and isogeny-based approaches are also part of ongoing research and evaluation.
The National Institute of Standards and Technology has selected three primary algorithms for standardization: CRYSTALS-Kyber for key establishment, CRYSTALS-Dilithium for digital signatures, and SPHINCS+ as a hash-based signature alternative. Additional candidates remain under review to increase diversity and resilience.
In the real world, organizations are beginning to test hybrid cryptography, where classical and post-quantum algorithms operate together. This approach maintains compatibility while introducing quantum resistance.
Migration is complex. Public-key infrastructures, certificates, and trust chains must be updated carefully. Thatโs why crypto-agility โ the ability to quickly replace cryptographic algorithms โ is critical for long-term resilience.
Becoming quantum-ready starts with five steps: inventory cryptographic assets, prioritize long-lived sensitive data, plan hybrid rollouts, design crypto-agile systems, and coordinate across vendors and supply chains.
Itโs also important to distinguish post-quantum cryptography from quantum cryptography. PQC is math-based and software-ready. Quantum cryptography, such as quantum key distribution, relies on physics and specialized hardware and is not broadly scalable across the internet.
The first PQC standards are finalized, but adoption is only beginning. Over the coming years, hardware manufacturers, cloud providers, and browser vendors will integrate quantum-resistant encryption more broadly.
Post-quantum cryptography is how we keep data secure in a world where quantum computing becomes a reality โ ensuring long-term trust, resilience, and security.
Tags and Topics
Browse our collection to discover more content in these categories.
Video Information
Views
45
Duration
6:05
Published
Feb 17, 2026
Related Trending Topics
LIVE TRENDSRelated trending topics. Click any trend to explore more videos.
Trending Now