Quantum computing will decimate the security infrastructure of the digital economy. Quantum computing in general is certainly a blessing to humanity in many respects and it promises to disrupt evolution of technology in more than one dimensions. But it is also a curse to security, as cryptographic algorithms that proved to be secure for decade may be breached by quantum computers within minutes.

This explains why researchers all around the globe are ambitiously working on a new generation of cryptographic infrastructure and algorithms to withstand the quantum-enforced new generation of attack models. We speak of post-quantum cryptography "PQC".

New call-to-action

Work with the PQC experts

We at Utimaco have the honor to work with some of the leading researchers in quantum cryptography, who use our Hardware Security Modules. 

The ultimate goal is to prepare:

  • the security infrastructure of the digital economy,
  • algorithms and
  • HSMs in unison for the post-quantum era.

Learn from the PQC experts

In the context of Utimaco’s Applied Crypto Symposium we had the chance to interview 3 of the leading researchers, and to dive into their views and research agenda on post-quantum cryptography.

... from the Institute of quantum computing

We will start with with Michele Mosca, co-founder and professor at the Institute of Quantum Computing at the University of Waterloo.

Michele firsts sketches out the playing field. Why do we actually push forward the development of quantum computers and what can we expect to be the major takeaways?

Then Michele describes the challenges of post-quantum cryptography. He emphasizes the crucial role of HSMs in PQC and explains why.

New call-to-action... from Samsung

In the subsequent video publication, Madjid Nakhjiri, Senior Principal Security Architect at the Samsung Strategy and Innovation Center builds on Michele's statements and describes PQC from a major industry player’s point of view. Samsung is a major player in the global B2C communication and entertainment industry. Connected devices are key to their future evolution. How will they handle it.

... from Entrust Datacard 

In the third video, Sandy Carielli, Security Technologies Director at Entrust Datacard will provide the perspective of a major security company. How can cards be made post-quantum proof and what may be their role in the post-quantum era.

... from independent security experts

The posts will be accompanied by discussions of NIST’s “semifinal” selection of post-quantum algorithms. The discussions will be led by security experts such as Peter Smirnoff, co-developer of the latest release of the GOST hash function or IT-journalist Terry Anton.

Watch this video

Watch already published videos on PQC #PartnersAreKey

  • Cryptomathic: CTO talks about how quantum computers influence the use of cryptography
  • QuintessenceLabs: Why do experts in post-quantum crypto work with Utimaco HSMs?


Connect to the Utimaco PQC research network

Be informed about the release of the next post-quantum related blogs and videos. Simply enroll to our info-mail with the subscription button on the top right.

Are you part of a research institute of department and interested in participating in our collaborative research programs, please contact us for additional information.

New call-to-action