1. The Post-Quantum Threat
1.1 The Problem
Quantum computers pose an existential threat to current public-key cryptography:
RSA: Shor's algorithm can break RSA encryption in polynomial time
ECDSA: Elliptic curve cryptography equally vulnerable
Current Infrastructure: Estimated 75% of internet security relies on vulnerable algorithms
Harvest Now, Decrypt Later: Adversaries are already capturing encrypted data for future decryption
Timeline: NIST estimates cryptographically relevant quantum computers within 10-15 years, but conservative security planning requires migration now.
1.2 NIST Post-Quantum Standards (2024)
In August 2024, NIST published the first post-quantum cryptographic standards:
ML-KEM-768 (Kyber768)
Key Encapsulation
NIST Level 3
2,400 bytes
ML-DSA-65 (Dilithium3)
Digital Signatures
NIST Level 3
4,595 bytes
SLH-DSA (SPHINCS+)
Stateless Signatures
NIST Level 3
49 KB
Cryptic implements Dilithium3 and Kyber768 as primary algorithms, with SPHINCS+ support planned.
1.3 The Key Management Challenge
Migrating to post-quantum cryptography creates operational challenges:
Key Size: PQC keys are 10-100x larger than traditional keys
Algorithm Complexity: Requires specialized implementations
Transition Period: Must support hybrid classical/quantum-resistant schemes
Key Lifecycle: Generation, storage, rotation, and deletion at scale
Compliance: FIPS certification lags behind NIST standards
Market Gap: No production-ready, TEE-backed, post-quantum KMaaS exists today.
Last updated
