Technology

How Quantum Computing Will Change Cryptography

Quantum computers promise breakthroughs—and risks. Here’s what will (and won’t) break, what “post-quantum” really means, and how to prepare.

Alex Rivera Alex Rivera • Jan 18, 2025 — min read
Article hero
A patterned quantum circuit—photonic approaches are rapidly evolving.

Quantum isn’t here to replace classical computing; it’s a new instrument in the orchestra. Let’s tune our security to match.

What is quantum computing?

Quantum computing leverages quantum mechanical properties—superposition, entanglement, and interference—to perform certain calculations exponentially faster than classical computers. While today’s machines are noisy and small-scale, progress is steady.

“Quantum won’t replace classical computing; it will complement it for specific problem classes.”

Which crypto breaks—and which survives?

Shor’s algorithm threatens widely used public-key schemes like RSA and ECDSA. Symmetric crypto (e.g., AES) fares better; Grover’s algorithm provides a quadratic, not exponential, speedup—so doubling key sizes is a practical countermeasure.

Tip: AES-256 and SHA-384/512 are considered safe choices in a post-quantum transition plan.

Post-quantum algorithms

  • CRYSTALS-Kyber (KEM) and CRYSTALS-Dilithium (signatures) are NIST’s frontrunners.
  • Falcon offers compact signatures but is trickier to implement.
  • SPHINCS+ is hash-based and stateless—larger signatures, great security margins.

Migration roadmap

  1. Inventory all crypto usage: TLS, data at rest, backups, code signing.
  2. Prioritize long-lived secrets. Protect data that must remain confidential for 10+ years.
  3. Adopt hybrid key exchange (classical + PQ) during the transition.
  4. Enable PQ in test environments; add metrics and fallbacks.
  5. Rotate certificates and keys with PQ-ready options when available.

Performance & benchmarks

PQ algorithms vary in size and speed. As a rule of thumb, Kyber key sizes are larger than ECDH, but handshake latency remains acceptable for most web apps.

Laptop with code
Benchmarks depend heavily on implementation and parameter sets.

FAQ

When should we start?

Now. Inventory and hybrid rollouts take time; you’ll be ready when vendors ship PQ-enabled updates.

Will quantum kill passwords?

No—passwords aren’t directly affected. But PQ strengthens key exchange and signatures; use passkeys and MFA for auth.


Alex Rivera
Alex Rivera

Security researcher and writer exploring the edge of applied cryptography.

Comments (2)

Avatar
Maya
Jan 18, 2025

Loved the migration checklist—printing it for the team.

Avatar
Jon
Jan 18, 2025

Any pointers on Kyber performance on mobile clients?