{"id":22985,"date":"2026-04-20T17:02:33","date_gmt":"2026-04-20T15:02:33","guid":{"rendered":"https:\/\/www.transparentedge.eu\/en\/blog\/"},"modified":"2026-04-20T17:02:41","modified_gmt":"2026-04-20T15:02:41","slug":"what-is-post-quantum-cryptography-and-what-do-i-need-to-know","status":"publish","type":"post","link":"https:\/\/www.transparentedge.eu\/en\/blog\/what-is-post-quantum-cryptography-and-what-do-i-need-to-know\/","title":{"rendered":"What is post-quantum cryptography and what do I need to know?"},"content":{"rendered":"\n<p>Post-quantum cryptography (PQC) is a set of algorithms designed to resist attacks from both classical and quantum computers. The adjective &#8220;post-quantum&#8221; does not mean it is a technology of the future or a topic limited to academic circles, as the algorithms exist, are standardized, and have implementations in production today.<\/p>\n\n\n\n<p>Most public-key algorithms currently in use (RSA, ECDH, and ECDSA) rely on mathematical problems that are computationally intractable for a traditional computer: factoring very large numbers or solving the discrete logarithm problem over elliptic curves. A sufficiently powerful quantum computer could solve these problems in hours using <a href=\"https:\/\/en.wikipedia.org\/wiki\/Shor%27s_algorithm\" target=\"_blank\" rel=\"noreferrer noopener\">Shor&#8217;s algorithm<\/a>, thus invalidating the encryption infrastructure that currently protects web traffic, APIs, TLS certificates, and authentication systems.<\/p>\n\n\n\n<p>The U.S. National Institute of Standards and Technology (<a href=\"https:\/\/www.nist.gov\/pqc\" target=\"_blank\" rel=\"noreferrer noopener\">NIST<\/a>) has been evaluating algorithms resistant to this threat since 2016. In August 2024, it published the first definitive standards: ML-KEM for key exchange, and ML-DSA and SLH-DSA for digital signatures.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>What is the purpose of the PQC?<\/strong><\/h2>\n\n\n\n<p>The immediate purpose is twofold.<\/p>\n\n\n\n<p>On the one hand, protecting the confidentiality of traffic in transit against &#8220;<a href=\"https:\/\/medium.com\/@X-3306\/harvest-now-decrypt-later-the-silent-threat-to-internet-security-e05da9e1feab\" target=\"_blank\" rel=\"noreferrer noopener\">harvest now, decrypt later<\/a>&#8221; attacks: an adversary who captures encrypted traffic today and stores it could decrypt it when they have access to a quantum computer. This makes the threat present, not future, especially for data with a long lifespan.<\/p>\n\n\n\n<p>On the other hand, protecting the authenticity of communications is crucial: digital certificates and signature systems that verify the identity of servers and clients are also vulnerable. If an attacker can forge a digital signature, they can impersonate any server to any client.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Q-Day readiness<\/strong><\/h2>\n\n\n\n<p><a href=\"https:\/\/en.wikipedia.org\/wiki\/Harvest_now,_decrypt_later\" target=\"_blank\" rel=\"noreferrer noopener\">Q-Day<\/a> is the term used to describe the moment when a cryptographically relevant quantum computer (CRQC) will be able to break current public-key algorithms. No one knows exactly when this will happen, but experts estimate a timeframe of between five and ten years. What is known is that preparations cannot be left until the last minute: migrating cryptographic algorithms in distributed systems takes years, requiring updates to TLS stacks, renewal of certificates, modification of authentication systems, and validation of compatibility with clients and providers.<\/p>\n\n\n\n<p>NIST has taken this into account and has set 2030 as the deadline for deprecating RSA and ECC. In January 2025, the US government issued an executive order requiring federal agencies to begin the transition. The UK&#8217;s <a href=\"https:\/\/www.ncsc.gov.uk\/guidance\/pqc-migration-timelines\" target=\"_blank\" rel=\"noreferrer noopener\">National Cyber \u200b\u200bSecurity Centre<\/a> (NCSC) has also published its own <a href=\"https:\/\/www.ncsc.gov.uk\/guidance\/pqc-migration-timelines\" target=\"_blank\" rel=\"noreferrer noopener\">migration guides to PQC<\/a>, which are a useful reference for any technical team looking to structure this process.<\/p>\n\n\n\n<p>Q-Day preparation should be on the technical roadmap of any organization that handles sensitive data with a lifespan longer than a few years.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>The difference between post-quantum encryption and post-quantum authentication<\/strong><\/h2>\n\n\n\n<p>It is a distinction that is not always made clearly, but it has distinct practical implications.<\/p>\n\n\n\n<p><strong>Post-quantum encryption<\/strong> refers to the use of quantum-resistant algorithms in session key exchange: the mechanism by which two parties establish a shared secret to encrypt their communications. The current standard is ML-KEM. Protecting this mechanism is the immediate priority because HNDL attacks affect today&#8217;s encrypted traffic.<\/p>\n\n\n\n<p><strong>Post-quantum authentication<\/strong> refers to the protection of identity verification mechanisms: TLS certificates, code signatures, long-lived API keys, and root certificates. The standard here is ML-DSA or SLH-DSA. The threat is not retrospective like HNDL, but it is potentially more serious: a quantum computer capable of forging signatures could actively compromise the identity of any server in real time. Long-lived keys (root certificates, API authentication keys, code-signing certificates) are the most exposed assets because, if one is compromised, the attacker retains indefinite access until it is detected and revoked.<\/p>\n\n\n\n<p><strong>The industry has prioritized encryption migration over authentication<\/strong>, partly because post-quantum certificates are currently larger and create compatibility and performance frictions. But the very teams building quantum computers are already updating their authentication systems, a clear sign of the growing urgency.<\/p>\n\n\n\n<p><em>Want to know how Transparent Edge is managing this transition for your infrastructure? Write to  <a href=\"mailto:comercial@transparentedge.eu\">comercial@transparentedge.eu<\/a><\/em><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Frequently Asked Questions<\/h2>\n\n\n\n<div data-wp-context=\"{ &quot;autoclose&quot;: false, &quot;accordionItems&quot;: [] }\" data-wp-interactive=\"core\/accordion\" role=\"group\" class=\"wp-block-accordion is-layout-flow wp-block-accordion-is-layout-flow\">\n<div data-wp-class--is-open=\"state.isOpen\" data-wp-context=\"{ &quot;id&quot;: &quot;accordion-item-1&quot;, &quot;openByDefault&quot;: false }\" data-wp-init=\"callbacks.initAccordionItems\" data-wp-on-window--hashchange=\"callbacks.hashChange\" class=\"wp-block-accordion-item is-layout-flow wp-block-accordion-item-is-layout-flow\">\n<h3 class=\"wp-block-accordion-heading\"><button aria-expanded=\"false\" aria-controls=\"accordion-item-1-panel\" data-wp-bind--aria-expanded=\"state.isOpen\" data-wp-on--click=\"actions.toggle\" data-wp-on--keydown=\"actions.handleKeyDown\" id=\"accordion-item-1\" type=\"button\" class=\"wp-block-accordion-heading__toggle\"><span class=\"wp-block-accordion-heading__toggle-title\"><strong>What is post-quantum cryptography (PQC)?<\/strong><\/span><span class=\"wp-block-accordion-heading__toggle-icon\" aria-hidden=\"true\">+<\/span><\/button><\/h3>\n\n\n\n<div inert aria-labelledby=\"accordion-item-1\" data-wp-bind--inert=\"!state.isOpen\" id=\"accordion-item-1-panel\" role=\"region\" class=\"wp-block-accordion-panel is-layout-flow wp-block-accordion-panel-is-layout-flow\">\n<p>It is a set of cryptographic algorithms designed to resist attacks from quantum computers. The current NIST standards are ML-KEM (for key agreements) and ML-DSA and SLH-DSA (for digital signatures).<\/p>\n<\/div>\n<\/div>\n\n\n\n<div data-wp-class--is-open=\"state.isOpen\" data-wp-context=\"{ &quot;id&quot;: &quot;accordion-item-2&quot;, &quot;openByDefault&quot;: false }\" data-wp-init=\"callbacks.initAccordionItems\" data-wp-on-window--hashchange=\"callbacks.hashChange\" class=\"wp-block-accordion-item is-layout-flow wp-block-accordion-item-is-layout-flow\">\n<h3 class=\"wp-block-accordion-heading\"><button aria-expanded=\"false\" aria-controls=\"accordion-item-2-panel\" data-wp-bind--aria-expanded=\"state.isOpen\" data-wp-on--click=\"actions.toggle\" data-wp-on--keydown=\"actions.handleKeyDown\" id=\"accordion-item-2\" type=\"button\" class=\"wp-block-accordion-heading__toggle\"><span class=\"wp-block-accordion-heading__toggle-title\"><strong>Is &#8220;Harvest now, decrypt later&#8221; a current threat?<\/strong><\/span><span class=\"wp-block-accordion-heading__toggle-icon\" aria-hidden=\"true\">+<\/span><\/button><\/h3>\n\n\n\n<div inert aria-labelledby=\"accordion-item-2\" data-wp-bind--inert=\"!state.isOpen\" id=\"accordion-item-2-panel\" role=\"region\" class=\"wp-block-accordion-panel is-layout-flow wp-block-accordion-panel-is-layout-flow\">\n<p>It is an attack technique in which an adversary captures and stores encrypted traffic with the intention of decrypting it in the future, when they have the necessary computing power. Unprotected traffic is vulnerable from the moment it is transmitted.<\/p>\n<\/div>\n<\/div>\n\n\n\n<div data-wp-class--is-open=\"state.isOpen\" data-wp-context=\"{ &quot;id&quot;: &quot;accordion-item-3&quot;, &quot;openByDefault&quot;: false }\" data-wp-init=\"callbacks.initAccordionItems\" data-wp-on-window--hashchange=\"callbacks.hashChange\" class=\"wp-block-accordion-item is-layout-flow wp-block-accordion-item-is-layout-flow\">\n<h3 class=\"wp-block-accordion-heading\"><button aria-expanded=\"false\" aria-controls=\"accordion-item-3-panel\" data-wp-bind--aria-expanded=\"state.isOpen\" data-wp-on--click=\"actions.toggle\" data-wp-on--keydown=\"actions.handleKeyDown\" id=\"accordion-item-3\" type=\"button\" class=\"wp-block-accordion-heading__toggle\"><span class=\"wp-block-accordion-heading__toggle-title\"><strong>When is Q-Day?<\/strong><\/span><span class=\"wp-block-accordion-heading__toggle-icon\" aria-hidden=\"true\">+<\/span><\/button><\/h3>\n\n\n\n<div inert aria-labelledby=\"accordion-item-3\" data-wp-bind--inert=\"!state.isOpen\" id=\"accordion-item-3-panel\" role=\"region\" class=\"wp-block-accordion-panel is-layout-flow wp-block-accordion-panel-is-layout-flow\">\n<p>Q-Day will arrive when a cryptographically relevant quantum computer (CRQC) is able to break current public-key algorithms such as RSA or ECC. Current estimates range from five to fifteen years.<\/p>\n<\/div>\n<\/div>\n\n\n\n<div data-wp-class--is-open=\"state.isOpen\" data-wp-context=\"{ &quot;id&quot;: &quot;accordion-item-4&quot;, &quot;openByDefault&quot;: false }\" data-wp-init=\"callbacks.initAccordionItems\" data-wp-on-window--hashchange=\"callbacks.hashChange\" class=\"wp-block-accordion-item is-layout-flow wp-block-accordion-item-is-layout-flow\">\n<h3 class=\"wp-block-accordion-heading\"><button aria-expanded=\"false\" aria-controls=\"accordion-item-4-panel\" data-wp-bind--aria-expanded=\"state.isOpen\" data-wp-on--click=\"actions.toggle\" data-wp-on--keydown=\"actions.handleKeyDown\" id=\"accordion-item-4\" type=\"button\" class=\"wp-block-accordion-heading__toggle\"><span class=\"wp-block-accordion-heading__toggle-title\"><strong>What is a downgrade attack?<\/strong><\/span><span class=\"wp-block-accordion-heading__toggle-icon\" aria-hidden=\"true\">+<\/span><\/button><\/h3>\n\n\n\n<div inert aria-labelledby=\"accordion-item-4\" data-wp-bind--inert=\"!state.isOpen\" id=\"accordion-item-4-panel\" role=\"region\" class=\"wp-block-accordion-panel is-layout-flow wp-block-accordion-panel-is-layout-flow\">\n<p>A degradation attack in which an attacker manipulates the TLS negotiation to force the use of an older or vulnerable encryption version.<\/p>\n<\/div>\n<\/div>\n\n\n\n<div data-wp-class--is-open=\"state.isOpen\" data-wp-context=\"{ &quot;id&quot;: &quot;accordion-item-5&quot;, &quot;openByDefault&quot;: false }\" data-wp-init=\"callbacks.initAccordionItems\" data-wp-on-window--hashchange=\"callbacks.hashChange\" class=\"wp-block-accordion-item is-layout-flow wp-block-accordion-item-is-layout-flow\">\n<h3 class=\"wp-block-accordion-heading\"><button aria-expanded=\"false\" aria-controls=\"accordion-item-5-panel\" data-wp-bind--aria-expanded=\"state.isOpen\" data-wp-on--click=\"actions.toggle\" data-wp-on--keydown=\"actions.handleKeyDown\" id=\"accordion-item-5\" type=\"button\" class=\"wp-block-accordion-heading__toggle\"><span class=\"wp-block-accordion-heading__toggle-title\"><strong>What is a key agreement?<\/strong><\/span><span class=\"wp-block-accordion-heading__toggle-icon\" aria-hidden=\"true\">+<\/span><\/button><\/h3>\n\n\n\n<div inert aria-labelledby=\"accordion-item-5\" data-wp-bind--inert=\"!state.isOpen\" id=\"accordion-item-5-panel\" role=\"region\" class=\"wp-block-accordion-panel is-layout-flow wp-block-accordion-panel-is-layout-flow\">\n<p>It is a mechanism that allows two parties to establish a shared secret over an insecure channel, without prior agreement. This secret is used to derive the keys that encrypt session traffic.<\/p>\n<\/div>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Post-quantum cryptography (PQC) is a set of algorithms designed to resist attacks from both classical and quantum computers. The adjective [&hellip;]<\/p>\n","protected":false},"author":18,"featured_media":22654,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"content-type":"","footnotes":""},"categories":[7],"tags":[],"class_list":["post-22985","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>What is post-quantum cryptography and what do I need to know? - Transparent Edge<\/title>\n<meta name=\"description\" content=\"Post-quantum cryptography (PQC) is a set of algorithms that encrypt information so that it cannot be decrypted by quantum computers.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.transparentedge.eu\/blog\/what-is-post-quantum-cryptography-and-what-do-i-need-to-know\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What is post-quantum cryptography and what do I need to know? - Transparent Edge\" \/>\n<meta property=\"og:description\" content=\"Post-quantum cryptography (PQC) is a set of algorithms that encrypt information so that it cannot be decrypted by quantum computers.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.transparentedge.eu\/blog\/what-is-post-quantum-cryptography-and-what-do-i-need-to-know\/\" \/>\n<meta property=\"og:site_name\" content=\"Transparent Edge\" \/>\n<meta property=\"article:published_time\" content=\"2026-04-20T15:02:33+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-20T15:02:41+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.transparentedge.eu\/wp-content\/uploads\/2026\/02\/fibras_opticas_flux_07.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"1024\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Sonia Ar\u00e9valo\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@tedgeservices\" \/>\n<meta name=\"twitter:site\" content=\"@tedgeservices\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.transparentedge.eu\\\/blog\\\/what-is-post-quantum-cryptography-and-what-do-i-need-to-know\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.transparentedge.eu\\\/blog\\\/what-is-post-quantum-cryptography-and-what-do-i-need-to-know\\\/\"},\"author\":{\"name\":\"Sonia Ar\u00e9valo\",\"@id\":\"https:\\\/\\\/www.transparentedge.eu\\\/#\\\/schema\\\/person\\\/c5e1c51b2f3403c743346f269ffa07ec\"},\"headline\":\"What is post-quantum cryptography and what do I need to know?\",\"datePublished\":\"2026-04-20T15:02:33+00:00\",\"dateModified\":\"2026-04-20T15:02:41+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.transparentedge.eu\\\/blog\\\/what-is-post-quantum-cryptography-and-what-do-i-need-to-know\\\/\"},\"wordCount\":846,\"publisher\":{\"@id\":\"https:\\\/\\\/www.transparentedge.eu\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.transparentedge.eu\\\/blog\\\/what-is-post-quantum-cryptography-and-what-do-i-need-to-know\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.transparentedge.eu\\\/wp-content\\\/uploads\\\/2026\\\/02\\\/fibras_opticas_flux_07.png\",\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.transparentedge.eu\\\/blog\\\/what-is-post-quantum-cryptography-and-what-do-i-need-to-know\\\/\",\"url\":\"https:\\\/\\\/www.transparentedge.eu\\\/blog\\\/what-is-post-quantum-cryptography-and-what-do-i-need-to-know\\\/\",\"name\":\"What is post-quantum cryptography and what do I need to know? - Transparent Edge\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.transparentedge.eu\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.transparentedge.eu\\\/blog\\\/what-is-post-quantum-cryptography-and-what-do-i-need-to-know\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.transparentedge.eu\\\/blog\\\/what-is-post-quantum-cryptography-and-what-do-i-need-to-know\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.transparentedge.eu\\\/wp-content\\\/uploads\\\/2026\\\/02\\\/fibras_opticas_flux_07.png\",\"datePublished\":\"2026-04-20T15:02:33+00:00\",\"dateModified\":\"2026-04-20T15:02:41+00:00\",\"description\":\"Post-quantum cryptography (PQC) is a set of algorithms that encrypt information so that it cannot be decrypted by quantum computers.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.transparentedge.eu\\\/blog\\\/what-is-post-quantum-cryptography-and-what-do-i-need-to-know\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.transparentedge.eu\\\/blog\\\/what-is-post-quantum-cryptography-and-what-do-i-need-to-know\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.transparentedge.eu\\\/blog\\\/what-is-post-quantum-cryptography-and-what-do-i-need-to-know\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.transparentedge.eu\\\/wp-content\\\/uploads\\\/2026\\\/02\\\/fibras_opticas_flux_07.png\",\"contentUrl\":\"https:\\\/\\\/www.transparentedge.eu\\\/wp-content\\\/uploads\\\/2026\\\/02\\\/fibras_opticas_flux_07.png\",\"width\":1024,\"height\":1024},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.transparentedge.eu\\\/blog\\\/what-is-post-quantum-cryptography-and-what-do-i-need-to-know\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\\\/\\\/www.transparentedge.eu\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What is post-quantum cryptography and what do I need to know?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.transparentedge.eu\\\/#website\",\"url\":\"https:\\\/\\\/www.transparentedge.eu\\\/\",\"name\":\"Transparent Edge\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.transparentedge.eu\\\/#organization\"},\"alternateName\":\"Transparent Edge\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.transparentedge.eu\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.transparentedge.eu\\\/#organization\",\"name\":\"Transparent Edge Services\",\"alternateName\":\"Transparent Edge\",\"url\":\"https:\\\/\\\/www.transparentedge.eu\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.transparentedge.eu\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.transparentedge.eu\\\/wp-content\\\/uploads\\\/2023\\\/07\\\/logotipo-cuadrado.jpg\",\"contentUrl\":\"https:\\\/\\\/www.transparentedge.eu\\\/wp-content\\\/uploads\\\/2023\\\/07\\\/logotipo-cuadrado.jpg\",\"width\":1328,\"height\":1180,\"caption\":\"Transparent Edge Services\"},\"image\":{\"@id\":\"https:\\\/\\\/www.transparentedge.eu\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/tedgeservices\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/transparent-edge\\\/\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UC5zZoyZmiLGBTAdiFpj2xHA\\\/videos\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.transparentedge.eu\\\/#\\\/schema\\\/person\\\/c5e1c51b2f3403c743346f269ffa07ec\",\"name\":\"Sonia Ar\u00e9valo\",\"description\":\"Nada como la sensaci\u00f3n de maravilla e infinitud que se despierta cuando aprendo algo nuevo, cuando descubro cu\u00e1l era la historia y c\u00f3mo funciona algo. Vivo en Madrid hace poco, desarrollo sitios web hace siempre.\",\"sameAs\":[\"https:\\\/\\\/www.transparentedge.eu\\\/\",\"https:\\\/\\\/www.instagram.com\\\/aldeaglobal.web\",\"https:\\\/\\\/www.linkedin.com\\\/in\\\/soniaarevalo\\\/\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What is post-quantum cryptography and what do I need to know? - Transparent Edge","description":"Post-quantum cryptography (PQC) is a set of algorithms that encrypt information so that it cannot be decrypted by quantum computers.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.transparentedge.eu\/blog\/what-is-post-quantum-cryptography-and-what-do-i-need-to-know\/","og_locale":"en_US","og_type":"article","og_title":"What is post-quantum cryptography and what do I need to know? - Transparent Edge","og_description":"Post-quantum cryptography (PQC) is a set of algorithms that encrypt information so that it cannot be decrypted by quantum computers.","og_url":"https:\/\/www.transparentedge.eu\/blog\/what-is-post-quantum-cryptography-and-what-do-i-need-to-know\/","og_site_name":"Transparent Edge","article_published_time":"2026-04-20T15:02:33+00:00","article_modified_time":"2026-04-20T15:02:41+00:00","og_image":[{"width":1024,"height":1024,"url":"https:\/\/www.transparentedge.eu\/wp-content\/uploads\/2026\/02\/fibras_opticas_flux_07.png","type":"image\/png"}],"author":"Sonia Ar\u00e9valo","twitter_card":"summary_large_image","twitter_creator":"@tedgeservices","twitter_site":"@tedgeservices","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.transparentedge.eu\/blog\/what-is-post-quantum-cryptography-and-what-do-i-need-to-know\/#article","isPartOf":{"@id":"https:\/\/www.transparentedge.eu\/blog\/what-is-post-quantum-cryptography-and-what-do-i-need-to-know\/"},"author":{"name":"Sonia Ar\u00e9valo","@id":"https:\/\/www.transparentedge.eu\/#\/schema\/person\/c5e1c51b2f3403c743346f269ffa07ec"},"headline":"What is post-quantum cryptography and what do I need to know?","datePublished":"2026-04-20T15:02:33+00:00","dateModified":"2026-04-20T15:02:41+00:00","mainEntityOfPage":{"@id":"https:\/\/www.transparentedge.eu\/blog\/what-is-post-quantum-cryptography-and-what-do-i-need-to-know\/"},"wordCount":846,"publisher":{"@id":"https:\/\/www.transparentedge.eu\/#organization"},"image":{"@id":"https:\/\/www.transparentedge.eu\/blog\/what-is-post-quantum-cryptography-and-what-do-i-need-to-know\/#primaryimage"},"thumbnailUrl":"https:\/\/www.transparentedge.eu\/wp-content\/uploads\/2026\/02\/fibras_opticas_flux_07.png","inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.transparentedge.eu\/blog\/what-is-post-quantum-cryptography-and-what-do-i-need-to-know\/","url":"https:\/\/www.transparentedge.eu\/blog\/what-is-post-quantum-cryptography-and-what-do-i-need-to-know\/","name":"What is post-quantum cryptography and what do I need to know? - Transparent Edge","isPartOf":{"@id":"https:\/\/www.transparentedge.eu\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.transparentedge.eu\/blog\/what-is-post-quantum-cryptography-and-what-do-i-need-to-know\/#primaryimage"},"image":{"@id":"https:\/\/www.transparentedge.eu\/blog\/what-is-post-quantum-cryptography-and-what-do-i-need-to-know\/#primaryimage"},"thumbnailUrl":"https:\/\/www.transparentedge.eu\/wp-content\/uploads\/2026\/02\/fibras_opticas_flux_07.png","datePublished":"2026-04-20T15:02:33+00:00","dateModified":"2026-04-20T15:02:41+00:00","description":"Post-quantum cryptography (PQC) is a set of algorithms that encrypt information so that it cannot be decrypted by quantum computers.","breadcrumb":{"@id":"https:\/\/www.transparentedge.eu\/blog\/what-is-post-quantum-cryptography-and-what-do-i-need-to-know\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.transparentedge.eu\/blog\/what-is-post-quantum-cryptography-and-what-do-i-need-to-know\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.transparentedge.eu\/blog\/what-is-post-quantum-cryptography-and-what-do-i-need-to-know\/#primaryimage","url":"https:\/\/www.transparentedge.eu\/wp-content\/uploads\/2026\/02\/fibras_opticas_flux_07.png","contentUrl":"https:\/\/www.transparentedge.eu\/wp-content\/uploads\/2026\/02\/fibras_opticas_flux_07.png","width":1024,"height":1024},{"@type":"BreadcrumbList","@id":"https:\/\/www.transparentedge.eu\/blog\/what-is-post-quantum-cryptography-and-what-do-i-need-to-know\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/www.transparentedge.eu\/en\/"},{"@type":"ListItem","position":2,"name":"What is post-quantum cryptography and what do I need to know?"}]},{"@type":"WebSite","@id":"https:\/\/www.transparentedge.eu\/#website","url":"https:\/\/www.transparentedge.eu\/","name":"Transparent Edge","description":"","publisher":{"@id":"https:\/\/www.transparentedge.eu\/#organization"},"alternateName":"Transparent Edge","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.transparentedge.eu\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.transparentedge.eu\/#organization","name":"Transparent Edge Services","alternateName":"Transparent Edge","url":"https:\/\/www.transparentedge.eu\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.transparentedge.eu\/#\/schema\/logo\/image\/","url":"https:\/\/www.transparentedge.eu\/wp-content\/uploads\/2023\/07\/logotipo-cuadrado.jpg","contentUrl":"https:\/\/www.transparentedge.eu\/wp-content\/uploads\/2023\/07\/logotipo-cuadrado.jpg","width":1328,"height":1180,"caption":"Transparent Edge Services"},"image":{"@id":"https:\/\/www.transparentedge.eu\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/tedgeservices","https:\/\/www.linkedin.com\/company\/transparent-edge\/","https:\/\/www.youtube.com\/channel\/UC5zZoyZmiLGBTAdiFpj2xHA\/videos"]},{"@type":"Person","@id":"https:\/\/www.transparentedge.eu\/#\/schema\/person\/c5e1c51b2f3403c743346f269ffa07ec","name":"Sonia Ar\u00e9valo","description":"Nada como la sensaci\u00f3n de maravilla e infinitud que se despierta cuando aprendo algo nuevo, cuando descubro cu\u00e1l era la historia y c\u00f3mo funciona algo. Vivo en Madrid hace poco, desarrollo sitios web hace siempre.","sameAs":["https:\/\/www.transparentedge.eu\/","https:\/\/www.instagram.com\/aldeaglobal.web","https:\/\/www.linkedin.com\/in\/soniaarevalo\/"]}]}},"_links":{"self":[{"href":"https:\/\/www.transparentedge.eu\/en\/wp-json\/wp\/v2\/posts\/22985","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.transparentedge.eu\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.transparentedge.eu\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.transparentedge.eu\/en\/wp-json\/wp\/v2\/users\/18"}],"replies":[{"embeddable":true,"href":"https:\/\/www.transparentedge.eu\/en\/wp-json\/wp\/v2\/comments?post=22985"}],"version-history":[{"count":4,"href":"https:\/\/www.transparentedge.eu\/en\/wp-json\/wp\/v2\/posts\/22985\/revisions"}],"predecessor-version":[{"id":22990,"href":"https:\/\/www.transparentedge.eu\/en\/wp-json\/wp\/v2\/posts\/22985\/revisions\/22990"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.transparentedge.eu\/en\/wp-json\/wp\/v2\/media\/22654"}],"wp:attachment":[{"href":"https:\/\/www.transparentedge.eu\/en\/wp-json\/wp\/v2\/media?parent=22985"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.transparentedge.eu\/en\/wp-json\/wp\/v2\/categories?post=22985"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.transparentedge.eu\/en\/wp-json\/wp\/v2\/tags?post=22985"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}