Quantum Computers and the Race to Save the Internet: Explaining Post-Quantum Cryptography (PQC)

Today, we do practically everything online. We pay bills, exchange private messages, and manage our bank accounts. We take for granted that a digital lock—cryptography—protects our data from prying eyes. And so far, it has worked great.

But there is a huge “but” on the horizon, and it’s called a quantum computer. This is no longer the stuff of science fiction films; it’s a technology that, while still in its infancy, is advancing by leaps and bounds. And when a sufficiently powerful quantum computer becomes a reality, nearly all the digital locks we use today will become useless, like armored doors without a lock.

Are you ready to take a leap into the future (and understand how to avoid being caught unprepared)?

The Problem: The Quantum Ticking Time Bomb

The cryptography that our current security relies on (think of algorithms like RSA and ECC) is based on a simple principle: it uses mathematical problems that are extremely difficult for traditional computers to solve. For example, taking two very large prime numbers and multiplying them is an instantaneous operation. But doing the reverse—that is, given the result, finding the two original numbers—would take a classical computer a disproportionate amount of time, even thousands of years. Our security is based on this “it takes too long” principle.

The problem? A quantum computer, thanks to something called Shor’s algorithm, is a cheater. It can solve this type of problem in the blink of an eye.

This means that on the day we have a stable and powerful quantum computer (the so-called “Q-day”), every secret protected with current cryptography could be revealed. Bank transactions, military secrets, government communications, our private chats. Everything. That’s why many call it a “data apocalypse.”

The Solution: Enter PQC (Post-Quantum Cryptography)

If the problem is a new type of key (the quantum computer), the solution is to create entirely new locks. And that’s exactly what post-quantum cryptography (PQC) does.

PQC is not quantum cryptography (that’s another fascinating thing that uses quantum physics to communicate). It is, more simply, a set of new cryptographic algorithms designed to run on the computers we use every day but based on mathematical problems that are believed to be extremely difficult for even a quantum computer to solve.

In practice, we are changing the type of mathematical puzzle. Instead of prime factorization, other brain-teasers are used, such as:

  • Lattice-based cryptography: Imagine an infinite, multidimensional maze. Finding the way out is a titanic feat even for a quantum computer.
  • Hash-based cryptography: This is based on “one-way” functions, a bit like breaking an egg. It’s easy to do, but impossible to go back and reassemble the shell.

For years, mathematicians and cryptographers from all over the world have worked to find the best candidates. The U.S. National Institute of Standards and Technology (NIST) launched a global competition to standardize these new algorithms, and after a long process, the first winners have already been announced. In short, we already have the new locks ready.

The Great Migration: What Now?

Okay, we have the new locks. The problem is that we have to replace them everywhere. On every server, in every piece of software, in every device connected to the internet. It’s a colossal undertaking, the largest “renovation” in the history of the internet.

It won’t be a switch that you can just flip on and off. For a while, we will see a hybrid approach: systems will use both traditional and post-quantum cryptography, a bit like having a double lock on your front door. If one fails, the other is there.

The race has already begun. Companies and governments are already experimenting and planning for this transition. Because the risk isn’t just in the future: a malicious actor could be recording encrypted data today to then decrypt it at their leisure in a few years, as soon as quantum technology is mature.

The good news? There’s no reason to panic. The data apocalypse is entirely avoidable. The scientific and technological community has acted in time.

The real challenge now is implementation. A silent but critical race against time to ensure our digital world remains a safe place. The important thing is not to be caught unprepared at the finish line.