Post-Quantum Cryptography Visualization
Explore NIST's standardized post-quantum cryptographic algorithms designed to resist attacks from both classical and quantum computers.
Quantum-Resistant Algorithms
All algorithms are implemented in the pqc JavaScript library, making them accessible for web applications.
ML-KEM
Multi-Lattice Key Encapsulation Mechanism for secure key exchange resistant to quantum attacks.
Based on the hardness of lattice problems, specifically the Module Learning With Errors problem.
ML-DSA
Multi-Lattice Digital Signature Algorithm for quantum-resistant document and data signing.
Based on lattice problems (MLWE and MSIS) for cryptographic signatures that withstand quantum attacks.
SLH-DSA
Stateless Hash-based Digital Signature Algorithm with minimal security assumptions.
Relies solely on the security of cryptographic hash functions, making it a conservative choice.
Try Interactive Demos
Interact with real implementations of post-quantum algorithms. Generate keys, create signatures, and encrypt messages in your browser.
ML-KEM Interactive
Generate key pairs, encapsulate and decapsulate shared secrets, and encrypt messages using AES with ML-KEM derived keys.
ML-DSA Interactive
Create lattice-based digital signatures for messages and files, verify signatures, and visualize the underlying mathematical structures.
SLH-DSA Interactive
Generate hash-based signatures with SLH-DSA, sign files and messages, and verify signatures with multiple security levels.
Why Post-Quantum Cryptography?
Securing the Future of Digital Communication
Current public-key cryptography (like RSA and ECC) will become vulnerable to attacks by large-scale quantum computers. Post-quantum cryptography provides algorithms that remain secure against both classical and quantum computing threats.
NIST has standardized these algorithms to prepare for the transition to quantum-resistant cryptographic systems that will secure our digital infrastructure for the future.
Quantum Computing Timeline
Present Day
Early quantum computers with limited qubits
Next 5-10 Years
Advancement of quantum computing technology
Future Threat
Large-scale quantum computers could break RSA/ECC