A software engineer's accessible explanation of quantum-safe cryptography, covering the history of encryption from Caesar ciphers to RSA and ECC, how Shor's algorithm threatens asymmetric cryptography, and why the 'harvest now, decrypt later' threat is already relevant. Explains post-quantum alternatives like lattice-based
Table of contents
How It All StartedWhy Encryption ExistsKeeping Secrets by HandThe Shift to One-Way MathsBigger Keys, Bigger Safety NetQuantum Computing Changes the RulesShor's AlgorithmHarvest Now, Decrypt LaterPost-Quantum CryptographyWhere We Are NowWhat Should We Do?Final ThoughtFurther ReadingSort: