Under the leadership of the U.S. National Institute of Standards and Technology (NIST), asymmetric cryptography methods are currently being standardized that are also intended to withstand an attack using powerful quantum computers. The first methods will probably be standardized in 2-4 years. Although current quantum computers are not yet powerful enough, Shor's algorithm has been known since 1997 as a method that breaks classical methods such as RSA.
Thus, research institutions and companies are already dealing with the question of how a migration process from classical, asymmetric cryptography to post-quantum cryptography can be designed. Asymmetric cryptography methods are found in practically all relevant IT security solutions and Internet prot ...