- Asymmetric cryptography lies at the heart of digital security
- The asymmetric algorithms (e.g. RSA and ECC) are deemed not to be resistant to cryptanalysis methods that will be achievable with the new generation of quantum computers
- Post-quantum cryptography is the newest generation of cryptographic algorithms, which is resistant to the cryptanalysis methods that will be possible with quantum computers
Asymmetric cryptosystems are at the heart of digital security as they are the cornerstone for the Public Key Infrastructure (PKI), as well as – amongst other things – secure authentication, digital Identities and trusted services. In particular, they are widely deployed in secure elements to perform safe authentication of people and things (IoT).
Indeed, it is believed that quantum computers will be able to break various asymmetric cryptographic algorithms (such as RSA or ECC) within the next 20 years.
Read more here.