🔬

post-quantum-crypto

Explore cryptographic algorithms designed to resist attacks from quantum computers. Understand why current encryption is vulnerable and how new algorithms protect our digital future.

🔬 Experimente agora

O que é isso?

🎯 Dicas do simulador

📚 Glossário

PostQuantum
Criptografia resistente a ataques de computadores quânticos
Shor
Algoritmo quântico que quebra RSA e ECC
Grover
Algoritmo quântico que acelera a pesquisa
Lattice
Grade regular de pontos no espaço de alta dimensão
LWE
Aprendendo com erros - problema de rede rígida
KEM
Mecanismo de encapsulamento de chave
MLKEM
Módulo Aprendizagem com Erros KEM (Kyber)
MLDSA
Módulo Aprendizagem com Erros Assinatura Digital (Dilithium)
Hybrid
Usando algoritmos clássicos e PQ juntos
CryptoAgility
Capacidade de trocar facilmente algoritmos criptográficos

💬 Mensagem aos estudantes

{'encouragement': "You're learning about the security infrastructure for the next 50 years. The algorithms being standardized today will protect communications long after quantum computers arrive.", 'reminder': "Post-quantum crypto is being adopted NOW - not waiting for quantum computers. 'Harvest now, decrypt later' attacks mean the transition is urgent.", 'action': 'Compare algorithm sizes in the simulator. See how lattice problems work. Understand why new approaches are needed.', 'dream': "A cryptographer from Kenya might discover new quantum-resistant algorithms. A security engineer from Nigeria might lead their country's migration. The world's digital security needs global expertise.", 'wiaVision': 'WIA Pin Code believes security education should reach everyone. Post-quantum cryptography will protect billions - everyone should understand this transition.'}

Começar

Grátis, sem cadastro

Começar →