Download Publication

The State of Post-Quantum Cryptography
Release Date: 05/23/2018
Working Group: Quantum-safe Security
Most people pay little attention to the lock icon on their browser’s address bar that signifies a secure connection called HTTPS. This connection establishes secure communications by providing authentication of the website and web server as well as encryption of communications between the client and server. If the connection is not secure, then a user may be vulnerable to malicious exploits such as malware injection, hijacking of financial transactions or stealing the user’s private information.
Download this Resource
Prefer to access this resource without an account? Download it now.
Related Resources
Acknowledgements

Kendall Scoboria
Kendall Scoboria

Ryan Bergsma
Technology Director and Security Manager, CSA
Ryan Bergsma
Technology Director and Security Manager, CSA

Bruno Huttner
Bruno Huttner
Bruno has co-chaired CSA’s Quantum-Safe Security working group, which was formed to address key generation and transmission methods and help the industry understand quantum‐safe methods for protecting their networks and their data, for approximately six years. As such, he has participated in writing most of the group’s research papers and has given several presentations about the group’s work. Bruno joined ID Quantique in 2014, where he’s r...

Jane Melia
Jane Melia

Hillary Baron
Senior Technical Director - Research, CSA
Hillary Baron
Senior Technical Director - Research, CSA

Roberta Faux
Roberta Faux
Are you a research volunteer? Request to have your profile displayed on the website here.
Interested in helping develop research with CSA?
Related Certificates & Training

Learn the core concepts, best practices and recommendation for securing an organization on the cloud regardless of the provider or platform. Covering all 14 domains from the CSA Security Guidance v4, recommendations from ENISA, and the Cloud Controls Matrix, you will come away understanding how to leverage information from CSA's vendor-neutral research to keep data secure on the cloud.
Learn more
Learn more