🔬

post-quantum-crypto

Explore cryptographic algorithms designed to resist attacks from quantum computers. Understand why current encryption is vulnerable and how new algorithms protect our digital future.

🔬 Jetzt ausprobieren

Was ist das?

🎯 Simulator-Tipps

📚 Glossar

PostQuantum
Kryptographie, die gegen Quantencomputerangriffe resistent ist
Shor
Quantenalgorithmus, der RSA und ECC durchbricht
Grover
Quantenalgorithmus, der die Suche beschleunigt
Lattice
Regelmäßiges Punktegitter im hochdimensionalen Raum
LWE
Lernen mit Fehlern – hartes Gitterproblem
KEM
Schlüsselkapselungsmechanismus
MLKEM
Modul Lernen mit Fehlern KEM (Kyber)
MLDSA
Modul Lernen mit Fehlern Digitale Signatur (Dilithium)
Hybrid
Gemeinsame Verwendung klassischer und PQ-Algorithmen
CryptoAgility
Möglichkeit, kryptografische Algorithmen einfach auszutauschen

💬 Nachricht an Lernende

{'encouragement': "You're learning about the security infrastructure for the next 50 years. The algorithms being standardized today will protect communications long after quantum computers arrive.", 'reminder': "Post-quantum crypto is being adopted NOW - not waiting for quantum computers. 'Harvest now, decrypt later' attacks mean the transition is urgent.", 'action': 'Compare algorithm sizes in the simulator. See how lattice problems work. Understand why new approaches are needed.', 'dream': "A cryptographer from Kenya might discover new quantum-resistant algorithms. A security engineer from Nigeria might lead their country's migration. The world's digital security needs global expertise.", 'wiaVision': 'WIA Pin Code believes security education should reach everyone. Post-quantum cryptography will protect billions - everyone should understand this transition.'}

Loslegen

Kostenlos, ohne Anmeldung

Loslegen →