Post-Quantum Cryptography (PQC): Preparing for a Quantum-Safe Future
Quantum Computing
March 24, 2025
EXTENDED ARTICLE: Post Quantum Cryptography poses one of the biggest threats to the Financial System ever imagined. We may never be able to use Credit Cards again!!!

Disclaimer

Disclaimer: The views and opinions expressed in these articles are those of the author and do not necessarily reflect the official policy or position of AQ Intelligence. Content is provided for informational purposes only and does not constitute legal, financial, or professional advice.

Post-Quantum Cryptography (PQC): Preparing for a Quantum-Safe Future

Executive Summary

Post-Quantum Cryptography (PQC) refers to new encryption algorithms designed to resist attacks by quantum computers. Advances in quantum computing, notably Shor’s Algorithm, threaten today’s common encryption (like RSA and ECC) by allowing a future large quantum computer to crack those systems quickly​

btq.com

This report explains what PQC is and why it’s needed, how experts believe it will impact society, the progress of the U.S. National Institute of Standards and Technology (NIST) PQC standardization competition, the leading candidate algorithms (their strengths and challenges), and how everyday digital activities – from ATM use to online credit card payments – may evolve in a post-quantum world.

Why PQC Matters: Encryption underpins nearly all digital infrastructure – securing websites, financial transactions, communications, and more. Modern society relies on cryptographic algorithms to protect private conversations, sensitive data, and digital infrastructure, but quantum computing can render some current cryptography obsolete. Shor’s Algorithm, if run on a sufficiently powerful fault-tolerant quantum computer, could crack RSA and elliptic-curve encryption in a matter of seconds or hours (versus billions of years on a classical computer)​

btq.com

This looming “quantum threat” has prompted a global race to develop PQC algorithms that can secure our data against quantum attacks.

Expected Societal Impact: Experts anticipate that PQC will bring one of the most significant shifts in internet security everever seen​

blog.redsift.com

Digital infrastructure will need updates – for example, web browsers, banking systems, and secure communications protocols must adopt quantum-resistant algorithms. Online transactions and secure communications may undergo changes to incorporate new encryption, potentially using hybrid methods (combining classical and post-quantum algorithms) during the transition. While end-users might not notice a change in their day-to-day use of ATMs or credit cards initially, behind the scenes those systems will be upgraded to new cryptographic standards to maintain security. Failing to do so could make current methods of digital banking and e-commerce vulnerable to quantum-era criminals​

atmmarketplace.com

NIST PQC Competition and Global Effort: In 2016, NIST launched an open competition to identify and standardize quantum-resistant cryptography. This process has been highly collaborative and international, with 82 algorithm submissions from 25 countries

nist.gov

Over multiple elimination rounds, NIST and experts worldwide scrutinized candidates for security and performance. In 2022, NIST announced four finalist algorithms (one for encryption/key-establishment and three for digital signatures) for standardization. Draft standards were released in 2023 and the first official PQC standards were published in 2024

csrc.nist.gov

Work continues with additional algorithms (e.g., a code-based encryption scheme) selected in 2025 to ensure diversity​

csrc.nist.gov

Other nations and regions – including the European Union, China, and Japan – are also investing in PQC research and planning, often in coordination with or parallel to NIST’s effort, to secure their own systems. Industry adoption is accelerating, with companies like Google, Cloudflare, IBM, and others beginning to implement PQC in products and services.

Leading Algorithms at a Glance: The frontrunner PQC algorithms each use different hard mathematical problems (lattices, hash functions, error-correcting codes, etc.) believed to resist quantum attacks. For encryption, CRYSTALS-Kyber (lattice-based) is favored for its strong security and efficiency. For digital signatures, CRYSTALS-Dilithium(lattice-based) and Falcon (lattice-based) offer fast signing and verification with relatively small signatures, while SPHINCS+ (hash-based) provides a more conservative approach (no new math assumptions) at the cost of larger signatures​

nccgroup.com

Another scheme, Classic McEliece (code-based encryption), is renowned for its decades-old security track record, albeit with very large public keys​

en.wikipedia.org

Each candidate must balance security, performance, and practicality – for example, lattice-based schemes are fast with small messages but require more computation than current RSA or ECC, and code-based schemes have huge key sizes that could be impractical for memory-constrained devices. Implementing these algorithms securely (avoiding side-channel leaks and integrating with existing protocols) is an ongoing challenge for engineers.

Financial Transactions in a Post-Quantum Era: Banking and payment systems are among the critical infrastructure that must be upgraded before quantum computers arrive. Today’s ATMs, chip-and-PIN credit cards, and online payment platforms often rely on RSA or ECC-based protocols (for PIN encryption, card authentication, or TLS secure connections). Quantum computing could eventually break these, potentially exposing bank account info or allowing fraud if no action is taken​

atmmarketplace.com

In a post-quantum world, these traditional activities will either be secured by new PQC algorithms or replaced by new secure methods. In practical terms, the user experience of withdrawing cash or paying online might not drastically change, but the cryptographic handshake between your card/bank and the server will use PQC under the hood. In the long run, some current tools might be phased out as obsolete – for instance, older credit cards or ATMs that cannot be updated might need replacement. We may also see more use of digital wallets or QR-code payments secured by PQC, and possibly new forms of secure digital cash. Financial institutions are already planning for this transition, conducting inventory of cryptographic systems and preparing upgrades now to avoid disruption​

atmmarketplace.com

The goal is that consumers continue to trust and use digital payments safely, with PQC ensuring that even the advent of quantum computers won’t compromise the confidentiality of transactions or personal financial data.

The following sections delve into these points in detail, using accessible language to demystify PQC and illustrate the road ahead for our quantum-safe digital future.

What is Post-Quantum Cryptography (PQC)?

Post-Quantum Cryptography refers to cryptographic algorithms (especially for encryption and digital signatures) designed to be secure against attacks by quantum computers. Unlike quantum cryptography (which leverages quantum physics for new ways of transmitting information, like QKD), PQC algorithms run on conventional computers but are built on mathematical problems that even quantum computers should find intractable. The need for PQC arises from the expected capabilities of future quantum machines. In 1994, mathematician Peter Shor developed Shor’s Algorithm, which showed that a sufficiently powerful quantum computer could factor large integers and solve discrete logarithms exponentially faster than any known classical algorithm​

btq.com

This is significant because modern encryption schemes like RSA (which relies on the difficulty of factoring) and ECC (elliptic-curve cryptography, relying on discrete log) would be vulnerable – tasks that would take classical computers billions of years could take a quantum computer mere hours or seconds​

btq.com

In essence, Shor’s algorithm demonstrated that RSA/ECC “locks” have a “quantum key” that could eventually open them.

Today’s public-key cryptosystems are secure only under the assumption that adversaries lack such quantum capabilities. Experts warn that once “cryptographically relevant” quantum computers exist (machines with enough stable, error-corrected qubits to run Shor’s algorithm on large keys), they could “crack all RSA/ECC cryptography” used in practice​

quintessencelabs.com

For example, RSA-2048 (widely used for secure websites and VPNs) could theoretically be broken in around 10 seconds by a perfect quantum computer with about 4,000 logical qubits​

evolutionq.com

Likewise, elliptic-curve based schemes (like the ECDSA signatures securing Bitcoin or your phone’s secure communication apps) would succumb to quantum algorithms even faster (ECC is actually an “easier target” than RSA in terms of required qubits)​ However, current quantum computers are far from this scale – they have only tens or low hundreds of physicalqubits and are noisy (error-prone), nowhere near the thousands of error-corrected qubits needed to threaten RSA/ECC. So, the threat is not immediate, but it is anticipated in the future (some optimists project a decade or more, though no one knows for sure​ because of this uncertainty, security experts advocate starting the transition to PQC well before quantum computers arrive. One reason is “harvest now, decrypt later” attacks​

blog.redsift.com

An adversary could record sensitive encrypted data today (for example, intercepting and saving an encrypted financial transaction or government communication) and simply store it. Years later, if they obtain a quantum computer, they can decrypt that saved data. Thus even data exchanged now can be at risk in the future if it needs to remain confidential for a long time. To counter this, new algorithms must be deployed in advance. PQC algorithms are designed around math problems believed to be resistant to both classical and quantum attacks – for example, problems based on lattices (geometric structures in multidimensional grids), error-correcting codes, multivariate equations, or hash functions. Crucially, these new schemes have to be practical for real-world use: that means reasonably fast, with manageable key sizes and message sizes, and able to integrate into existing protocols.

In summary, PQC is a proactive defense: developing and standardizing encryption that can withstand the power of quantum computing. It’s a global effort involving academia, industry, and government agencies. The next sections explore what adopting PQC means for society and what progress has been made so far.

How PQC Will Affect Society and Digital Life

The advent of quantum computers will challenge the security of virtually every sector that relies on digital cryptography. Experts often emphasize that the impact of quantum computing on digital security and privacy could be one of its most immediate societal effects

digicert.com

As PQC is introduced to counter this threat, we can expect changes across our digital infrastructure:

  • Internet and Communications: Today’s internet traffic (websites, emails, messaging apps, etc.) is protected by protocols like TLS/SSL that use RSA or ECC for key exchange and authentication. With PQC, those components will be replaced or augmented by quantum-safe algorithms. This is a massive undertaking – “one of the most significant shifts in internet security we’ve ever seen,” according to cybersecurity experts​

blog.redsift.com

  • Every device and server that performs encrypted communications (from your browser and smartphone to servers at Google or Amazon) will need updates. There may be a period of “hybrid cryptography”, where systems use both classical and PQC algorithms in tandem – for example, a web browser could establish two parallel secure connections, one with traditional ECC and one with a PQC KEM, to be safe against either type of attacker. Organizations that start early by adopting such hybrid solutions will lead in tomorrow’s secure internet ecosystem​

blog.redsift.com

  • Digital Infrastructure: Critical infrastructure like power grids, transportation, and government systems also rely on cryptography for secure communication and authentication. PQC migration plans are being developed at national and international levels. The European Commission, for instance, recommended in 2024 that EU member states create a coordinated roadmap for transitioning to PQC across public services and critical infrastructures, using harmonized timelines and even exploring hybrid schemes (combining PQC with existing methods) during the changeover​

industrialcyber.co

  • This means governments are treating PQC readiness as a strategic priority to ensure continuity of secure operations.
  • Financial Services: The finance sector is often highlighted as one that “must stay ahead by adopting post-quantum encryption standards”, given the high stakes​

atmmarketplace.com

  • Banks and payment networks are assessing where cryptography is used – ATMs, inter-bank communication, credit card chips, online banking portals, etc. – and how to update them. In practice, your bank’s website or app will switch to using PQC-based TLS for HTTPS, and ATM software will be updated to use quantum-safe encrypted channels. These changes ideally occur behind the scenes; customers should continue to use services as usual, but with assurance that the security won’t silently fail one day. Regulators and industry groups are already issuing guidance. For example, the U.S. National Cybersecurity Center of Excellence (NCCoE) has published a draft migration framework for organizations to inventory and gradually replace vulnerable cryptography by 2035​

gsablogs.gsa.gov

  • In payment card industry forums, experts discuss how to handle the upgrade of point-of-sale terminals and chip cards. One promising development in Japan was a successful pilot of a smart card embedded with a PQC digital signature (Dilithium), demonstrating that next-generation bank cards could work securely with PQC algorithms

nict.go.jp

  • Secure Communications and Privacy: Ordinary users might wonder, “Will my encrypted messaging app or VPN still be secure?” The answer with PQC is yes – but those apps will undergo upgrades. Signal, a popular secure messaging app, is already experimenting with quantum-resistant protocols, and Apple announced it will secure iMessage with PQC by the end of 2024​

blog.cloudflare.com

  • In the future, everything from your car’s key fob to your home Wi-Fi router might use PQC to protect against snoopers. There’s also an international aspect: countries worry about securing state secrets and citizens’ data against foreign quantum capabilities. China, for example, has heavily invested in quantum research (both offensive and defensive); it’s reportedly working on its own suite of PQC standards and even quantum-proof networks. Ensuring global interoperability is important – we want, say, a U.S. web browser to safely communicate with a European or Chinese website using PQC, which is why collaboration in standards bodies is ongoing.

Despite the need for change, experts reassure that this transition can be managed much like previous crypto migrations (e.g., from weaker algorithms like DES to AES, or from SHA-1 to SHA-256 hashing). It will require careful planning, testing, and widespread software updates. It’s a long-term effort: NIST estimates it can take 10–20 years to fully deploy new cryptographic standards across all systems​

nist.gov

During that time, both old and new algorithms will coexist. Organizations are urged not to “procrastinate” – waiting too long could leave a gap if a breakthrough in quantum computing occurs faster than expected​

evolutionq.com

The overarching societal impact of PQC will be an increased resilience of our digital world: if done right, users will continue banking, shopping, and communicating with confidence that their privacy and security endure in the quantum era.

The NIST PQC Standardisation Competition (2016–2025)

One of the most significant initiatives propelling PQC forward has been the NIST Post-Quantum Cryptography Standardisation Project. NIST (the U.S. National Institute of Standards and Technology) recognized early on the need to prepare for quantum threats. In 2016, NIST formally launched an open call for quantum-resistant cryptographic algorithms​

csrc.nist.gov

This call was global – open to scientists and teams worldwide, emphasizing collaboration over competition.

The response was tremendous: by the end of 2017, NIST had received 69 complete algorithm submissions that met their requirements​

csrc.nist.gov

These came from academia, industry, and government research labs around the world (in total, researchers from 25 countries contributed to proposals​

nist.gov

The submissions spanned a variety of mathematical approaches – lattice-based schemes, code-based schemes, hash-based, multivariate polynomial, even exotic ones like isogeny-based encryption. Given the volume, NIST structured the evaluation as a multi-round elimination process, somewhat analogous to a tournament (though NIST carefully calls it a “selection process” rather than a competition​

nccgroup.com

The goals were to evaluate security (resistance to all known attacks), performance (speed and resource use), and other factors like key sizes, bandwidth, and ease of implementation.

Over the next few years, NIST and the global cryptographic community scrutinized these candidates through workshops and conferences:

  • Round 1 (2018): All 69 algorithms were analyzed. Many were broken or deemed impractical, and some teams voluntarily merged similar proposals. By early 2019, NIST announced 26 algorithms advancing to Round 2

csrc.nist.gov

  • (others were dropped). Round 2 involved more intensive cryptanalysis; researchers published papers poking at the security claims and testing implementations for speed.
  • Round 3 (2020): NIST further narrowed the field to 7 finalist algorithms and 8 alternates

csrc.nist.gov

  • The finalists were those NIST felt most promising for standardization, while alternates were algorithms that weren’t frontrunners but still worthy of consideration in case something befell the finalists or for future needs. At this stage, the finalists included CRYSTALS-Kyber (encryption/KEM), CRYSTALS-Dilithium (signature), Falcon (signature), SPHINCS+ (signature), Classic McEliece (encryption), SABER (encryption), and NTRU(encryption) in various categories​

en.wikipedia.org

  • ​The alternates included candidates like BIKE, HQC (both code-based encryption), Rainbow (multivariate signature), GeMSS (multivariate signature), and others​
  • The third round was intense: for example, one alternate signature (Rainbow) got completely broken by a clever classical attack during this period​

en.wikipedia.org

  • Underscoring the importance of the vetting process.
  • Selection (2022): After six years of evaluation, NIST announced in July 2022 the first group of winners to be standardized. These were:
    • CRYSTALS-Kyber – a lattice-based Key Encapsulation Mechanism (KEM) for encryption/key exchange.
    • CRYSTALS-Dilithium – a lattice-based digital signature scheme.
    • Falcon – a lattice-based digital signature scheme (using a different lattice approach, NTRU lattices).
    • SPHINCS+ – a hash-based digital signature scheme.​
      en.wikipedia.org
    These choices gave one encryption method and three options for signatures. NIST’s rationale was that Kyber clearly outperformed other encryption candidates in the finalist pool on the balance of security and efficiency, and having multiple signature algorithms provides diversity (Falcon signatures are much smaller than Dilithium’s, and SPHINCS+ offers a non-lattice alternative)​nccgroup.comnccgroup.com. It was indeed a “diverse mix” of math problems – lattices and hashes – to hedge bets in case any single approach faces unexpected breakthrough. After 2022 – Round 4 and Beyond: NIST wasn’t completely done. They acknowledged the need for at least one more encryption/KEM algorithm to not “put all eggs in one basket” with lattices​

nccgroup.com

  • . Thus, they carried four encryption candidates into an additional Round 4: BIKE, Classic McEliece, HQC, and (initially) SIKE

nccgroup.com

  • Remarkably, in late 2022, SIKE (the only finalist based on elliptic curve isogenies) was defeated by a novel attack – a classical cryptanalysis result that showed SIKE’s underlying problem wasn’t as hard as believed​

nccgroup.com

  • This left three. Through 2023, evaluation of those continued, and in March 2025 NIST selected HQC (Hamming Quasi-Cyclic), a code-based KEM, for standardization​

csrc.nist.gov

  • Classic McEliece, while still unbroken, might be standardized later or used in niche applications due to its very large key size; BIKE is also being studied further.

As shown in the timeline, what began with preliminary workshops in 2015–2016 led to a formal call in 2016, rounds of narrowing candidates from 2017 through 2020, and initial standards by 2024. Global collaboration was a hallmark of this project – NIST “rallied the world’s cryptography experts and many candidates were joint efforts by international teams. For instance, the CRYSTALS algorithms had contributors from Europe and North America; Classic McEliece is based on an algorithm invented in 1978 by an American but had updated proposals from European researchers; HQC was developed by French researchers, etc. Throughout the competition, worldwide cryptographers participated in analysis, often publishing research papers that helped NIST in the decision-making. This open process increased confidence that the chosen algorithms have withstood intense scrutiny.

It’s worth noting that PQC standardization is also being pursued outside NIST. The European Telecommunications Standards Institute (ETSI) has a Quantum-Safe Cryptography working group that has held workshops since the mid-2010s. Germany’s BSI, France’s ANSSI, and other national bodies have been tracking NIST’s process closely to align their future standards. China has launched its own PQC standardization effort (separate from but informed by NIST’s results), reportedly favoring some lattice-based and hash-based algorithms in its standards. Japan has supported PQC research through its National Institute of Information and Communications Technology (NICT) – the earlier example of a PQC smart card came from a Japan-led project​

nict.go.jp

In other words, while NIST’s competition is the de facto focal point (much as earlier NIST competitions produced AES and SHA-3, used globally), it is by no means a purely American effort; it’s a worldwide quest to secure the future internet.

By mid-2024, NIST had released draft standards (FIPS 203, 204, 205) for Kyber (now renamed “ML-KEM”), Dilithium (“ML-DSA”), and SPHINCS+​

csrc.nist.gov

These were finalized into official standards in August 2024​

csrc.nist.gov

With HQC’s selection in 2025, additional standards will follow. Governments and industries now have concrete algorithms to implement, and we’re entering the phase of deploying these in real-world systems, guided by the standards and best practices that come out of this long competition process.

Suitability of Leading PQC Algorithms: Candidates and Trade-offs

While many algorithms were evaluated, a few stand out as the leading candidates that will form the core of post-quantum cryptography. Each has different strengths and weaknesses. Below is a comparison of some key algorithms and their characteristics (security basis, performance, and implementation considerations):

Algorithm (Type)Security BasisKey & Message SizesPros and ConsCRYSTALS-Kyber(KEM)Lattice (Module-LWE)Encryption/Key ExchangePublic key ≈ 1184 bytes, Ciphertext ≈ 1088 bytesopenquantumsafe.org

openquantumsafe.org

Pros: Very fast key generation and encryption; relatively small key and ciphertext (on par with or smaller than RSA keys); chosen as NIST’s primary PQC encryption standard.Cons: Relies on newer hardness assumptions (lattice problems) – well-studied now but not as time-tested as RSA; requires more computing power on low-end devices than ECC (though still efficient).CRYSTALS-Dilithium(Signature)Lattice (Module-LWE)Digital SignaturePublic key ≈ 1312 bytes, Signature ≈ 2420 bytes

nccgroup.com

Pros: Efficient signing and verification; moderate-size keys and signatures (a few kilobytes); chosen as a main signature standard due to strong security and simplicity of implementation (no exotic math).Cons: Signatures are larger than current ECC signatures (which are ~64 bytes), meaning more bandwidth/storage use – acceptable for most applications, but not ultra-compact.Falcon(Signature)Lattice (NTRU) Digital SignaturePublic key ≈ 897 bytes, Signature ≈ 666 bytes

nccgroup.com

Pros: Compact and fast. Falcon signatures are much smaller than Dilithium’s (under 1 K which is useful for bandwidth-sensitive cases (e.g., blockchain transactions, DNSSEC). Verification is very fast. Provides diversity as an alternative lattice approach (NTRU lattice).Cons: Trickier to implement. Falcon uses complex mathematics (floating-point arithmetic in Fourier domain); implementing it securely against side-channel attacks is more challenging. It’s considered more “delicate” for programmers, so it may be used where its size advantage is critical, but not everywhere.SPHINCS+(Signature)Hash-based (Merkle trees)Digital SignaturePublic key ≈ 32 bytes, Signature ≈ ~7856 bytes (≈7.7 KB)​

nccgroup.com

Pros: Most conservative. Security relies only on well-understood hash functions (like SHA-256); even if quantum algorithms improved, hash functions only lose a bit of security (Grover’s algorithm halves the security, which is mitigated by using larger outputs). Stateless variant avoids state management issues. Ideal for high-assurance applications that value long-term security over performance​

nccgroup.com

Cons: Large signature size and slower speed. Signatures can be tens of kilobytes (up to ~8 KB at 128-bit security​ which is far larger than lattice signatures. Verification and signing are slower, which could be a bottleneck if doing many signatures per second. Thus, SPHINCS+ might be used sparingly, where its unique security property is needed (for example, auditing systems or software signing), rather than for every TLS connection.Classic McEliece (KEM) Code-based (binary Goppa codes)Encryption/Key EncapsulationPublic key ≈ 0.5–1 MB, Ciphertext ≈ 128–240 bytes

en.wikipedia.org

Pros: Highly trusted security. Based on a problem that’s been studied since 1978 – in over 40 years, no one has found a viable attack that significantly weakens it. Very small ciphertext size and very fast decryption/encryption. Provides excellent diversity (non-lattice).Cons: Enormous public keys (hundreds of thousands of bytes) which are impractical for many uses like TLS certificates or IoT devices with little memory​

en.wikipedia.org

This limits McEliece to niche applications unless key size can be reduced or one is willing to accept the storage/transmission cost. Because of this, NIST kept McEliece as an alternate; it might still be standardized for specialized scenarios (e.g., secure backups or as a root certificate algorithm) where its large key is manageable.

(Sizes above are approximate for NIST Level 1/128-bit security. “KEM” refers to key encapsulation mechanism, used for establishing shared secrets in encryption protocols.)

As the table shows, there is a trade-off triangle between security assumptions, performance, and size. Lattice-based schemes like Kyber and Dilithium are generally favored for broad use: they are fast (on the order of microseconds to milliseconds for operations) and have key/signature sizes in the kilobyte range, which today’s networks and hardware can handle easily. Their security rests on problems like the Learning With Errors (LWE) problem on lattices, which is believed to be hard even for quantum computers. While not proven, lattice problems have been studied for a few decades and withstood all attempts so far, giving confidence. One advantage is that symmetric encryption and hash functions remain secure against quantum attacks (just with larger keys/hashes), and lattice schemes have some connections to those (in that their security reductions often rely on hash functions too), further bolstering trust.

Hash-based signatures (SPHINCS+) have the appeal of using no unproven math assumptions – if our hash functions (SHA-2, SHA-3 families) remain secure, so will SPHINCS+. This “insurance” comes at the cost of efficiency. For many consumer applications, a 8 KB signature is actually not a deal-breaker (consider that a single photo on your phone is several megabytes; 8 KB is trivial in comparison), but the slower speed and the bulk do add up if, say, a server must verify thousands of signatures per second.

Code-based systems like McEliece and HQC have very large public keys, which historically made people shy away from them. However, HQC (selected in 2025) uses structured codes to shrink keys somewhat (HQC’s public key is on the order of a few thousand bytes, much smaller than McEliece’s) at the expense of a larger ciphertext (~also a couple thousand bytes). This is a pattern in PQC design: often we can trade off key size vs. ciphertext size by adding structure. Kyber, for example, has much smaller keys than an unstructured lattice scheme would, because it uses algebraic structure (module lattices) – but one must be careful that this structure doesn’t introduce a weakness. NIST was cautious about structured vs. unstructured: they picked mostly structured schemes due to efficiency, but tried to ensure nothing known compromises their security.

Another aspect is implementation challenges. Many PQC algorithms require careful programming to avoid side-channel leaks (like timing or power consumption variations that could reveal secrets). For instance, lattice algorithms involve lots of matrix arithmetic and random noise sampling; ensuring that is done in constant time and without leakage is an active area of research. The PQC finalists have reference implementations, but developers are now creating optimized versions for specific platforms (CPUs, smart cards, hardware accelerators). Industry consortia and open-source projects (like Open Quantum Safe, and PQCrypto libraries) are working to make adoption easier by providing tested implementations.

In summary, the leading PQC algorithms are suitable replacements for our current cryptosystems, each with some caveats:

  • Kyber/Dilithium: likely to replace RSA/ECC in most applications due to their balanced performance.
  • Falcon: likely to be used where its smaller signatures matter (or as an alternative if any issue arises with Dilithium).
  • SPHINCS+: a fallback for those ultra-cautious about lattice security, or for specific use-cases requiring its unique trust properties.
  • McEliece/HQC: might secure certain communications (like government/military systems or as backup encryption methods) where keys can be distributed in advance or where high throughput is not required.

The good news is that in tests and trials so far, these algorithms have shown they can run on everything from cloud servers to smartphones – sometimes with minimal impact. For example, Google and Cloudflare ran an experiment adding Kyber to TLS handshakes and found it workable, with only modest increases in handshake packet sizes and computation​

blog.cloudflare.com

As PQC moves from theory to practice, ongoing evaluation will continue, but we now have a toolkit of quantum-safe algorithms that seem suitable for protecting society’s digital infrastructure going forward.

A Post-Quantum World: The Future of Financial Transactions

Among the daily activities that could be disrupted by quantum threats are those involving financial transactions – using ATMs, swiping or inserting credit cards, and paying online. These systems rely heavily on cryptography for security, and thus will be significantly affected (or transformed) by the transition to PQC. Let’s consider how these might change:

  • ATM Withdrawals: When you use an ATM, several cryptographic functions ensure security. Your card and the ATM establish a secure channel (often using RSA/ECC-based protocols) to send your PIN to the bank for verification, and the ATM software itself is authenticated by the bank. In a quantum-vulnerable scenario, an attacker with a quantum computer could potentially eavesdrop on the ATM-bank communication if it’s not upgraded, deciphering PINs or forging transaction commands. In a post-quantum world, ATMs will use quantum-resistant key exchange (likely a PQC KEM like Kyber or a hybrid PQC+classical exchange) to communicate with bank servers. The encryption of PIN codes and transaction data will use algorithms that quantum computers can’t crack. Banks may also move to digitally sign ATM software updates with PQC signatures, so that criminals cannot spoof ATM software once quantum computers render current signatures forgeable. Ideally, the ATM user will not notice any difference – you would still enter your PIN and receive cash – but behind the scenes the cryptographic “lock” is new. There’s a possibility that older ATM machines that can’t support the new algorithms (due to hardware limitations or lack of updates) might need to be replaced, accelerating ATM hardware refresh cycles industry-wide. In the long term, biometric authentication and mobile integrations might complement card-and-PIN usage, but those too will be secured with PQC in their communication with backend systems.
  • Credit Card Payments (Point-of-Sale and Online): Credit and debit cards (EMV chips) use cryptographic protocols to authenticate the card and issuer bank when you make a purchase. For example, the chip on your card may generate a digital signature for each transaction (using RSA or ECC) to prove to the point-of-sale terminal and bank that the card is genuine and the transaction hasn’t been tampered with. If quantum computers made ECC insecure, a fraudster could theoretically clone cards or alter transactions by forging these signatures. In response, the payments industry will shift to PQC-based card security. This might involve issuing new cards with chips capable of running PQC signature algorithms. By the time quantum computers are mature, it’s likely that a new standard for EMV (the card protocol) will mandate a PQC algorithm for transaction signatures – possibly a variant of Dilithium or Falcon, which could be optimized for smart card chips. These chips have limited processing power, so finding efficient PQC for them is a priority in research (Falcon’s small signatures might make it a candidate here, if its implementation can be made small and secure). Similarly, when you pay online by entering card details, the connection to the payment gateway uses TLS; that TLS will use PQC going forward, ensuring your card details aren’t exposed via a broken encryption scheme.
  • There’s also a chance that the form of transactions might evolve: for instance, more payments could move to mobile wallets (like Apple Pay, Google Pay) or digital currencies. These already rely on public-key cryptography and would likewise integrate PQC. If physical credit cards were deemed too hard to upgrade, the industry might push faster towards phone-based payments which can be updated via software to use PQC. However, given the long timelines, it’s more likely the cards themselves will get upgraded rather than becoming obsolete overnight. Indeed, the first PQC smart card prototype (mentioned earlier from Japan) shows that it’s feasible to implement algorithms like Dilithium on a card’s secure chip​

nict.go.jp

  • This indicates your future credit/debit card could be labeled “Quantum-Safe” internally, even if it looks the same on the outside.
  • Online Banking & Digital Commerce: When you log in to online banking or send money through an app, several layers of cryptography protect you – the SSL/TLS for the website, the tokenization of your credentials, digital signatures on transactions, etc. All these will be upgraded to quantum-resistant equivalents. Banks and financial institutions are already planning for this. As of 2023, regulations (like a U.S. financial industry directive) require institutions to start inventorying their cryptographic usage and develop a PQC migration plan

gsablogs.gsa.gov

  • In practical terms, you might see new security notices from your bank in the coming years mentioning upgrades, or perhaps issuing you a new smart token or security device that is PQC-enabled. Some banks might adopt quantum-resistant hardware security modules (HSMs) in their data centers – these are the locked-down devices that store keys and process cryptographic operations for transactions. By swapping those out for PQC-capable HSMs, banks ensure at the server level they can handle thousands of PQC operations per second needed for customer transactions.
  • Potential Obsolescence or New Systems: The prompt suggests traditional financial activities may become obsolete – this is an interesting point to explore. It could mean that the way we conduct these activities might fundamentally change due to quantum tech. One angle is that if quantum computers emerged before we completed a PQC transition, there could be a crisis of confidence in digital transactions (imagine a period where people fear using credit cards online because they hear quantum computers can hack them). In that hypothetical scenario, one could see a temporary reversion to analog or in-person methods until security is restored – e.g., increased use of cash or physical bank drafts. However, the proactive work on PQC is precisely to prevent such a disruption. The aim is that by the time quantum codebreaking is practical, all our financial pipelines have been retrofitted. Another angle is that quantum technology itself might introduce new methods: for instance, quantum-secure communication networks (using QKD) between bank data centers, or even quantum computers used by banks for secure multiparty computation. Those are beyond PQC and more speculative.

In all likelihood, financial transactions won’t become obsolete but will undergo an invisible metamorphosis. Much like how we moved from swipe cards to chip-and-PIN for better security, we will move from classical crypto to post-quantum crypto in our payment systems. Chip cards didn’t make credit cards obsolete – they made them more secure. Similarly, PQC will make digital payments more secure against future threats. Consumers might only notice subtle changes: perhaps new cards, maybe slightly longer transaction times in some cases (if an old payment terminal is slow with the new math), or new security policies (like banks encouraging the use of updated mobile banking apps that support PQC). The financial industry is highly motivated to not let quantum computing undermine trust, because trust is the bedrock of banking.

Encouragingly, experts say we are still within a safe time window to do this right: Quantum computers are not an immediate threat, giving the industry a number of years to test and roll out PQC​

atmmarketplace.com

But the work must begin now. In the words of one financial cybersecurity expert: “For us, it’s not an option to just wait and see what happens. We want to be ready and implement solutions as soon as possible.”

spectrum.ieee.org

This proactive stance means that by the time you slide your card in a post-quantum 2030s, the transaction will proceed securely — and quantum hackers will be left empty-handed.

Global Perspectives and Industry Adoption

The transition to post-quantum cryptography is a global effort, not confined to any one country or sector. Here we highlight some global initiatives and trends in industry adoption:

  • United States: Beyond the NIST competition, U.S. federal agencies are preparing for PQC. In 2022, the White House issued a memorandum (NSM-10) requiring federal agencies to inventory their cryptographic systems and be ready to switch to PQC once standards are in place​

gsablogs.gsa.gov

  • The Department of Homeland Security (DHS) has published a roadmap for organizations on how to prepare for PQC, including an infographic and guide​

dhs.gov

  • The U.S. National Security Agency (NSA) also stated that it plans to transition its Suite B cryptographic standards to quantum-resistant solutions (and in fact, had already deprecated some classical algorithms in anticipation). Major American tech companies (IBM, Google, Microsoft, AWS) are not only researching quantum computers but also contributing to PQC. For example, IBM researchers co-authored algorithms like CRYSTALS-Dilithium, and Google has tested PQC in Chrome (the browser) – recently, Chrome began supporting a hybrid X25519+Kyber key exchange in early 2023 for securing TLS, which is now enabled in some Chrome and Firefox versions​

thesslstore.com

  • This means some percentage of web traffic from modern browsers is already “quantum-safe” without users realizing it.
  • Europe: The European Union has been very active in PQC research. Early EU-funded projects like PQCRYPTO (circa 2015–2018) helped lay groundwork for several NIST submissions (e.g., SPHINCS+ had contributors from EU). In April 2024, as noted, the European Commission recommended a coordinated roadmap for PQC transition​

industrialcyber.co

  • The aim is to unify efforts across member states, so that, for instance, France’s finance ministry and Germany’s power grid and Italy’s healthcare system all move in step to PQC, avoiding weak links. Europe’s GDPR and eIDAS regulations, which handle data security and digital signatures, are looking at updates to mandate quantum-resistant algorithms for compliance in the future. On the industry side, European companies like Siemens, Infineon, and Thales are developing PQC solutions (Thales, for example, has a line of quantum-resistant HSMs for banks). The EU’s Quantum Flagship program also addresses cryptography as part of its agenda to ensure European readiness for quantum technologies.
  • China: China views quantum computing as part of a technological race and has made headlines for both quantum research and claims. In late 2022, Chinese researchers claimed to have used a quantum computer to factor a 48-bit RSA integer (a tiny toy problem) and speculated on breaking 2048-bit RSA, though Western experts remain skeptical of some of those claims​

livescience.com

  • Nonetheless, China has strong programs in quantum communication (e.g., a quantum satellite QKD demonstration) and is certainly aware of the need for PQC. It’s believed that China will adopt its own set of standard PQC algorithms, possibly including lattice-based schemes similar to those from NIST’s competition and some indigenous designs. There is also significant academic output from China on PQC; for instance, several Round-2 NIST candidates had Chinese co-authors. The Chinese financial industry (e.g., UnionPay, big state banks) are likely testing PQC for their future systems, and given the centralized nature of infrastructure there, a nationwide rollout could be swift once standards are chosen.
  • Japan: Japan’s approach marries both innovation and adoption. NICT’s work on the PQC smart card (PQC CARD® with Dilithium) in 2022 was a pioneering implementation​

nict.go.jp

  • Japan has a Cybersecurity Council where PQC is discussed in context of securing critical infrastructure for “Society 5.0.” Companies like Toshiba have developed secure communication systems combining QKD and PQC for maximum security. Also, Japanese researchers have been instrumental in some algorithms (for example, several authors of the lattice-based scheme NTRU are at Japanese institutions, and Mitsubishi Electric researchers contributed to some code-based proposals). Japan is expected to update its government encryption guidelines (similar to NIST’s standards) to include PQC soon, ensuring that everything from government communications to citizen ID systems (like the “My Number” system) use quantum-safe crypto.
  • Other Regions: Canada has significant contributions (e.g., the company ISARA is a leader in PQC integration tools, and many academics in the field are Canadian). Australia’s government issued a PQC strategy as part of its cybersecurity roadmap. Russia has shown interest in PQC as well; its engineers participated in some submissions (though geopolitics may affect collaboration). International standards bodies like ISO and the ITU will eventually codify PQC standards so that devices globally can conform. We can expect PQC to be a topic in diplomatic discussions around tech standards.
  • Industry Adoption Trends: In the tech industry, there’s a notable trend of early adoption and testing:
    • Web and Internet Companies: Cloudflare, which handles a large chunk of internet traffic, has been very forward-looking. As of early 2024, about 2% of all TLS 1.3 connections through Cloudflare are using post-quantum cryptography, a figure expected to rise to double digits by the end of 2024​
      blog.cloudflare.com
    • This includes traffic from updated browsers that negotiate a post-quantum key agreement (like the hybrid X25519+Kyber). Cloudflare has also integrated PQC into its own internal systems and contributed to open-source libraries. Google’s CECPQ experiments (combining classical and PQC key exchanges) proved that PQC can work at scale on the internet​
      blog.cloudflare.com
    • Major browser vendors plan to make PQC cipher suites a default option in the near future.
    • Financial Firms: MasterCard and Visa have both published thought leadership on quantum security. MasterCard in 2023 announced efforts on quantum-safe networks and exploring PQC and QKD for payment data protection​
      1950.ai
    • Banks such as JPMorgan have run tests using quantum key distribution and are also exploring PQC for their communication. The FS-ISAC (Financial Services Information Sharing and Analysis Center) has issued guidance to banks about quantum threats and PQC solutions​
      thequantuminsider.com
    • We’re seeing consortiums form where banks team up with tech firms to pilot PQC in interbank messaging (like SWIFT or central bank digital currency experiments).
    • Telecommunications: Telcos are looking to secure future 5G/6G communication with PQC. For instance, Europe’s 6G research includes quantum-resistant cryptography to ensure that cellular communications and IoT devices remain secure in the next decades. Some telecom companies are already marketing “quantum-safe VPN” products that use PQC algorithms for the key exchange in VPN tunnels, targeting clients in government or finance who want to be early adopters.
    • Software and Hardware Providers: Companies like Microsoft and Oracle are updating their developer libraries (e.g., OpenSSL, BoringSSL have added support for PQC algorithms). Hardware makers like Intel and ARM are assessing whether new CPU instructions can optimize lattice math or hashing for PQC performance. Smart chip manufacturers (used in credit cards, SIM cards, etc.) are developing next-gen secure elements that can run PQC. It’s a whole ecosystem effort.

In summary, the world is mobilizing to meet the quantum challenge. Collaboration is key: nations are sharing research, companies are open-sourcing their implementations, and standards bodies are ensuring interoperability. While there may be geopolitical divergence in exactly which algorithms are adopted (for instance, one country might favor a locally developed algorithm), the mathematical problems tend to be similar, and many PQC algorithms are converging to a few well-vetted families (lattice and hash-based for now, with code-based as a backup). As a general public audience, one can be reassured that PQC is not some theoretical fancy – it is a very active engineering project, with prototypes running today and deployment plans in motion across the globe. The goal is that the average person, wherever they are in the world, will continue to enjoy secure digital life – chatting, shopping, traveling, banking – without interruption, even as quantum computers rise in the background.

Conclusion

The journey to a post-quantum cryptographic world is underway. PQC provides the tools to ensure that our digital society – built on billions of secure transactions and communications every day – remains safe against the next leap in computing power. We have identified strong candidate algorithms, vetted by years of analysis, and the first standards are in place. The impact will be felt gradually: software updates here, a new card or device there, maybe a news headline about a “quantum-safe” VPN or browser. For most people, PQC will simply become the new normal for security, much like longer passwords or chip cards did – a necessary evolution to keep trust in our systems.

Experts paint a hopeful picture that if we act in time, critical data and infrastructure will transition smoothly, and the quantum computer will be a marvel for science and industry without becoming a catastrophe for cybersecurity. Society’s dependence on digital encryption will only grow (think of expanding IoT, autonomous vehicles, digital currencies), so PQC is arriving not a moment too soon. As individuals, being aware of this change is useful: over the coming years, you might hear terms like “quantum-ready” or “X.509 certificates with Dilithium signatures” – these are indicators that organizations are embracing the future. Governments and businesses are investing now so that, by the time a quantum computer is powerful enough to matter, the world’s secrets and transactions will already be locked by new quantum-proof keys.

In the end, PQC is about preserving the privacy and security principles that underpin the internet and modern life, even in the face of groundbreaking technological shifts. It’s a fascinating convergence of advanced mathematics, computer science, engineering, and policy on a global scale. And while quantum computers promise to solve complex problems in chemistry, optimization, and AI, thanks to PQC they won’t get to solve the problem of undermining our encryption. The collaborative effort of the international cryptographic community is ensuring that when the quantum future arrives, we’ll be ready.

Eamonn Darcy
Director: AI Technology
Sources:
  • NIST Post‑Quantum Cryptography Standardization
    • NIST’s official webpage on the PQC project provides documentation, timelines, and updates on candidate evaluations and standard releases.
    • NIST PQC Project
  • Shor’s Algorithm (1994)
    • Shor, P. W. “Algorithms for Quantum Computation: Discrete Logarithms and Factoring.”
    • This seminal paper introduced the quantum algorithm that underpins the need for PQC by demonstrating how quantum computers could break RSA/ECC encryption.
  • Academic and Technical Publications on Post‑Quantum Cryptography
    • Bernstein, D. J., Buchmann, J., & Dahmen, E. (Eds.). Post‑Quantum Cryptography. Springer (2009).
    • Various research articles (published in conferences like Crypto, Eurocrypt, and journals) covering lattice‑based cryptography, hash‑based signatures, and code‑based schemes.
  • Official NIST Announcements and Documentation on PQC Candidates
    • Documents and press releases detailing the progression from Round 1 through Round 4, including the selection of CRYSTALS‑Kyber, CRYSTALS‑Dilithium, Falcon, SPHINCS+, and HQC.
    • These can be found on the NIST website and in accompanying publications (e.g., FIPS publications related to PQC).
  • Industry Reports and Blog Posts
    • Google’s Security Blog and Cloudflare’s technical posts on PQC experiments (e.g., hybrid key exchanges integrating classical and post‑quantum algorithms).
    • These resources discuss real‑world trials and implementation insights that informed parts of the discussion on practical impacts.
  • Global and Regional Initiatives on Quantum‑Safe Cryptography
    • Publications and reports by the European Commission, ETSI, and national cybersecurity agencies (e.g., Japan’s NICT) describing coordinated roadmaps and pilot projects for PQC integration.
    • These sources provide context on how different regions are approaching quantum‑resistant security measures.
  • Whitepapers and Industry Whitepapers from Technology Providers
    • Reports from companies such as IBM, Microsoft, and others on integrating PQC into existing systems and addressing challenges (including implementation and performance trade-offs).