Post-quantum cryptography

Securing a quantum computer world

Quantum computers – tomorrow’s reality

Due to their computing power, quantum computers have the disruptive potential to break various currently used encryption algorithms. Quantum computer attacks on today’s cryptography are expected to become reality within the next 10 to 20 years.

Once available, quantum computers can solve certain calculations much faster than today’s computers, threatening even best currently known security algorithms such as RSA and ECC. Various internet standards like Transport Layer Security (TLS), S/MIME or PGP/ GPG use cryptography based on RSA or ECC to protect data communication with smart cards, computers, servers or industrial control systems. Online banking on “https” sites or “instant messaging” encryption on mobile phones are well-known examples.

PQC introduction


Infineon experts are already exploring solutions to master "PQC".

The general impact on applications

The impact on cryptography will be dramatic: most public-key algorithms currently in use are expected to be broken easily by adequate quantum computers including RSA and ECC-based public-key cryptography algorithms. The most vulnerable applications concerning quantum-computer attacks are those where asymmetric cryptography is used:

Communication protocols: Authentication protocols verifying the authenticity via digital certificate provided through a PKI infrastructure. Various internet standards (e.g.Transport Layer Security (TLS), S/MIME, PGP, and GPG.)

Digital signatures: Digital signatures are increasingly replacing traditional, manual, signing of contracts. They protect signed contracts by veryfying every bit of the document against a digital signature. Public key, i.e. asymmetric, algorithms secure sign and/or verify data through digital signature algorithms.

Why to act now?

There are applications, for instance, energy infrastructure, space et al., where products' lifetime of 15-30 years is common. Thus, these applications and corresponding devices / infrastructure will be in use when quantum computers become a reality. Therefore, system designers must already think about migration from traditional asymmetric cryptography to PQC. This does not imply that PQC algorithms must mandatorily be implemented now, but rather a forward looking strategy must be in place.

Examples of applications of post-quantum cryptography

Identification (government) documents

Governmental applications are critical, especially due to the fact that identity theft or misuse can have major consequences. Government ID applications include travel documents (ePassport) and ID cards – often equipped with digital signature functionality.

ICT technology

ICT is one of the main applications where public-key/asymmetric cryptography is used, e.g. in order to secure protocols, secure storage, etc. ICT can be roughly clustered into communication technology, e.g. network equipment, and servers, e.g. running cloud services. ICT component suppliers will need to address the security related aspects tied to quantum computers and prepare upfront for a possible migration.

Automotive security

The increasing connectivity of cars via mobile networks enables a lot of new services and interactivity between car and end-user. Cryptography plays a major role in securing the cars against potential threats. Due to the comparable long lifetime of cars in the field, the automotive industry will need to consider the impact of quantum computing in the not too distant future.


World’s first post-quantum cryptography on a contactless security chip

In a world of quantum computers, PQC should provide a level of security that is comparable with what RSA and ECC provide today in the classical computing world. Security experts at Infineon’s Munich headquarters and the Center of Excellence for contactless technologies in Graz, Austria, made a breakthrough in this field. They implemented a post-quantum key exchange scheme on a commercially available contactless smart card chip without requiring additional memory space and hence a larger chip size.

Key exchange schemes are used to establish an encrypted channel between two parties. The deployed scheme is based on a variant of “New Hope”, a post-quantum cryptography algorithm,  also explored successfully by Google on a development version of the Chrome browser.

The next steps in post-quantum cryptography development are yet to come. Infineon continuously collaborates with the academic community, customers and partners to provide the right security solutions to our customers not only today, but also in future. 


Learn more about tomorrow's reality