Aldova
Jan 12, 2026

What is Cryptography in Modern Security Systems?
What is Post-Quantum Cryptography (PQC)?
Why Quantum Computing is a Real Cryptographic Threat?
Background: Mathematical Foundations of Current Encryption
Quantum Algorithms and Cryptographic Collapse
The “Harvest Now, Decrypt Later” Threat Model
Post-Quantum Cryptography Algorithm Families
Security Trade-offs and Performance Considerations
Migration Strategy for Enterprise
Common Misconceptions About PQC
Conclusion
Tags:
From a cybersecurity perspective, cryptography is not just encryption. It is the root trust layer of nearly all modern digital systems.
Cryptography secures :
TLS/HTTPS traffic
API authentication (JWT, OAuth, mTLS)
Software update signing
Cloud identity systems
Blockchain consensus
Password storage
Secure boot & firmware integrity
If cryptography fails, all higher-layer security controls fail with it, including firewalls, IAM, and zero-trust architectures.
Post-Quantum Cryptography (PQC) refers to cryptographic algorithms that remain secure even if the attacker has access to a large-scale quantum computer.
Important clarification from a security standpoint:
PQC does not require quantum hardware
PQC runs on classical CPUs
PQC is a defensive response to future attacker capabilities
The goal is cryptographic longevity: data encrypted today must remain secure for decades.
Security professionals do not worry about quantum computing because it is hypothetical.
We worry because:
Nation-states are funding quantum research heavily
Cryptographic migration historically takes 10–20 years
Encrypted data has long-term value
Security is about anticipating attacker capability, not reacting to it.
Most asymmetric cryptography relies on problems that are:
Hard for classical computers
Easy to verify
Assumed to be one-way functions
Examples :
| Algorithm | Mathematical Problem |
|---|---|
“RSA” | Integer factorization |
“ECC” | Elliptic curve discrete logarithm |
“DH” | Discrete logarithm |
These assumptions collapse in the presence of quantum algorithms.
Shor’s algorithm allows a quantum computer to:
Factor large integers efficiently
Solve discrete logarithms efficiently
Impact :
RSA → Broken
ECC → Broken
ECDSA → Broken
Diffie-Hellman → Broken
This is not a “weakened” scenario. This is a complete cryptographic failure.
Grover’s algorithm reduces brute-force search complexity from:
This affects:
Symmetric encryption
Hash functions
Mitigation:
AES-256 instead of AES-128
SHA-384 instead of SHA-256
This is the most dangerous and misunderstood quantum threat.
Attacker captures encrypted traffic today
Stores it indefinitely
Decrypts it once quantum capability exists
Medical records
Government communications
Trade secrets
Legal documents
Source code
From a cybersecurity risk perspective, encryption expiration dates matter.
After years of global cryptanalysis, NIST selected several PQC algorithms.
Lattice-Based Cryptography
CRYSTALS-Kyber
CRYSTALS-Dilithium
Security based on:
Learning With Errors (LWE)
Module-LWE problems
These problems currently have no known efficient quantum attacks.
Hash-Based Cryptography
SPHINCS+
Advantages:
Extremely conservative security assumptions
Disadvantages:
Large signature sizes
Slower performance
Code-Based Cryptography
McEliece (not standardized yet)
Extremely strong but impractical due to massive key sizes.
From an operational security standpoint, PQC introduces trade-offs:
| Aspect | Impact |
|---|---|
“Key size” | Larger |
“CPU usage” | Higher |
“Network overhead” | Increased |
“Latency” | Slightly higher |
“Memory” | Increased |
However, performance is not a security argument when confidentiality requirements span decades.
A realistic, security-first migration strategy includes:
Phase 1 – Crypto Inventory
Identify all cryptographic dependencies
TLS, JWT, PKI, VPN, SSH, code signing
Phase 2 – Hybrid Cryptography
Classical + PQC algorithms combined
Safe fallback if PQC breaks
Phase 3 – Policy & Governance
Crypto agility
Certificate lifecycle updates
Vendor compliance checks
Security teams must treat PQC as risk management, not optional optimization.
Misconception 1: “Quantum computers don’t exist yet”
Reality: Attackers already collect encrypted data.
Misconception 2: “Only governments need PQC”
Reality: Enterprises hold intellectual property worth billions.
Misconception 3: “We can switch algorithms later”
Reality: Cryptographic migration is slow, complex, and fragile.
Misconception 4: “PQC is experimental”
Reality: NIST-standardized algorithms are production-ready.

From a cybersecurity expert’s perspective, Post-Quantum Cryptography is not optional, not speculative, and not hype-driven.
It is a response to:
Predictable attacker evolution
Long-term data sensitivity
Historical lessons of cryptographic collapse
Organizations that delay PQC adoption are not saving cost — they are accumulating invisible technical debt with catastrophic risk.
Quantum computing will not announce itself politely. When cryptography breaks, it breaks everywhere at once.
“NIST - Post-Quantum Cryptography Project https://csrc.nist.gov/projects/post-quantum-cryptography
“NIST - First Quantum-Resistant Cryptographic Algorithm Selection (2022)” https://www.nist.gov/news-events/news/2022/07/nist-announces-first-four-quantum-resistant-cryptographic
“Peter W. Shor (1994) - Algorithms for Quantum Computation” https://arxiv.org/abs/quant-ph/9508027
“ENISA - Post-Quantum Cryptography: Current State and Quantum Mitigation” https://www.enisa.europa.eu/publications/post-quantum-cryptography-current-state-and-quantum-mitigation
“Cloudflare Research - Post-Quantum Cryptography for All” https://blog.cloudflare.com/post-quantum-for-all/
© 2025 Tjakrabirawa Teknologi Indonesia. All Rights Reserved.