Post-Quantum Cryptography: From Theory to Implementation

Module 1: The Quantum Threat Landscape

  • The “Why” of PQC: Understanding Shor’s and Grover’s algorithms and how they break RSA, ECC, and symmetric keys.
  • The urgency: “Harvest Now, Decrypt Later” attacks and the long-term sensitivity of healthcare and government data. [1, 2, 3]

Module 2: Mathematical Foundations of Quantum-Safe Algorithms

  • Lattice-Based Cryptography: Hard problems like Learning With Errors (LWE) and Shortest Vector Problem (SVP).
  • Other PQC Families: Hash-based signatures (SLH-DSA), Code-based (HQC), and Multivariate cryptography. [1, 2, 3]

Module 3: Global Standards & Regulations

  • NIST Finalized Standards: Deep dive into FIPS 203 (ML-KEM), FIPS 204 (ML-DSA), and FIPS 205 (SLH-DSA).
  • Migration Timelines: Compliance with 2030/2035 deprecation deadlines for quantum-vulnerable algorithms. [1, 2, 3]

Module 4: Implementation & Engineering Challenges

  • Hybrid Schemes: Combining classical (ECC/RSA) with PQC for immediate “defense in depth”.
  • Performance Trade-offs: Managing larger key sizes, increased memory usage, and latency issues in web handshakes.
  • Hands-on Lab: Using libraries like the Open Quantum Safe (OQS) project to test PQC in TLS or SSH environments. [1, 2, 3, 4]

Module 5: Side-Channel Attacks & Modern Defense

  • Beyond the Math: How physical implementation leaks secrets through power analysis or timing.
  • Secure Implementation: Constant-time coding and masking techniques to harden PQC algorithms. [1, 2, 3]

Module 6: Strategic Migration & Crypto-Agility

  • Inventory & Assessment: How to build a live cryptographic inventory and prioritize high-risk systems.
  • Crypto-Agility: Designing systems where algorithms can be swapped without rewriting the entire infrastructure. [1, 2, 3]