Quantum Cryptography and Post-Quantum Cryptography

  1. NIST Post-Quantum Cryptography Standardization
    1. Standardization Process Overview
      1. Call for Proposals
        1. Submission Requirements
          1. Evaluation Timeline
          2. Evaluation Criteria
            1. Security Requirements
              1. Classical Attack Resistance
                1. Quantum Attack Resistance
                  1. Security Level Categories
                  2. Performance Metrics
                    1. Key Sizes
                      1. Ciphertext and Signature Sizes
                        1. Computational Efficiency
                        2. Implementation Characteristics
                          1. Side-Channel Resistance
                            1. Implementation Simplicity
                              1. Hardware Suitability
                            2. Selection Rounds
                              1. Round 1 Analysis
                                1. Initial Submissions
                                  1. Preliminary Evaluation
                                  2. Round 2 Evaluation
                                    1. Detailed Security Analysis
                                      1. Performance Assessment
                                      2. Round 3 Finalists
                                        1. Final Candidate Selection
                                          1. Intensive Review Process
                                        2. Standardized Algorithms
                                          1. Key Encapsulation Mechanisms
                                            1. CRYSTALS-Kyber
                                            2. Digital Signatures
                                              1. CRYSTALS-Dilithium
                                                1. FALCON
                                                  1. SPHINCS+
                                                2. Alternative Candidates
                                                  1. Ongoing Evaluation
                                                    1. Future Standardization Rounds
                                                      1. Backup Algorithm Selection