RSS
Логотип
Баннер в шапке 1
Баннер в шапке 2
2025/09/09 12:13:25

Post-quantum cryptography

Post-quantum cryptography - resistant to cryptographic algorithms to cyber attacks use. quantum computers

Content

The main articles are:

Postquants cryptographic algorithms are based on a special class of mathematical transformations, the inversion of which is of great complexity for both classical and. quantum computers[1]

2025

MIPT created a digital signature method resistant to quantum attacks

A graduate student at MIPT has developed the first collective digital signature system in Russia, which is resistant to hacking using quantum computers. The development is designed to protect critical infrastructure, banking systems and blockchain platforms. This was announced on October 28, 2025 by the press service of MIPT.

As reported, until now, organizations have faced a difficult choice: to use proven, but vulnerable to quantum to the attacks algorithms ones like RSA, or to implement post-quantum standards that do not support functions (digital threshold signature the approach allows you to distribute signature rights between a group of participants, avoiding the appearance of a single owner of a collective signing key). This created a fundamental dilemma between safety and practicality. blockchain scientific Leonid Kartushin, a graduate student at the Moscow Institute of Physics and Technology (the basic organization is the Idea Center), under the leadership scientific of the head Alexei Kurochkin, has developed an algorithm that can solve this problem. More. here

The first quantum-stable TLS gateway has been created in Russia

QApp and S-Terra announced to TAdviser on September 19, 2025 the completion of a pilot project to develop the first domestic quantum-resistant TLS gateway - a solution capable of protecting the network traffic of the state and business from attacks using both classical and quantum computers. Read more here.

Gazprombank, Moscow Exchange and NSPK tested post-quantum cryptography

On September 8, NSPK, Moskvskaya Exchange and Gazprombank shared their experience in using post-quantum cryptography in the financial sector. In particular, NSPK has already completed three projects, Gazprombank has five, and Moskvskaya Exchange has one.

It was the financial industry that was among the first to actively study and pilot post-quantum cryptography technologies, fearing the development of high-performance quantum computers - by 2030 their power may be enough to crack asymmetric encryption keys. And post-quantum cryptography, as experts in the field of information security expect, will not allow hacking data encryption algorithms even after creating such quantum computers.

NSPK, in particular, using the QApp PQC Gate product developed by QApp, tested the capabilities of a reverse proxy that tunneled traffic of the internal electronic document management system. QApp has implemented all the necessary cryptographic functions to ensure the protection of documents when they are transmitted through a quantum-stable tunnel. To create it, encryption keys are exchanged, for which postquant algorithms are used.

As part of the pilot project, they tested the protection of clearing, transmission of transactional reports, reports on a net position and other operational information.

File:Aquote1.png
We had our first experience of using post-quantum cryptography 4-5 years ago, "Igor Goldovsky, director of the innovation department and chief architect of the NSPK, shared his impressions. - We, together with QApp, implemented electronic document management within the NSPK. As expected, the effect of using a cryptographic algorithm on system performance was close to zero. And the main problem with the transition to new cryptography will arise with hundreds of millions of cards and millions of terminals that are used to accept payments. They will all have to be replaced and at the same time ensure the continuity of the transition. We have already begun this process and estimate that it will be completed by the mid-30s.
File:Aquote2.png

The Moscow Exchange defended the transfer of encrypted backups of large data using a quantum-stable tunnel between two remote sites. Interaction was organized between data centers in Moscow and Novosibirsk.

Olga Avryasova shared her impressions of post-quantum cryptography

File:Aquote1.png
What slows down the development of post-quantum encryption technologies is that the threat of quantum computing is underestimated, "said Olga Avryasova, head of the Moscow Exchange innovation laboratory. - Recently, a ship with aliens flew, and you scare here with a quantum computer. This is perceived by companies as something commensurate. However, now quantum computing is already an understandable reality.
File:Aquote2.png

In addition, as part of a joint pilot project between NSPK and Gazprombank, a solution called PQC Pay was developed and tested, which allowed quantum sustainable payments using Bluetooth (BLE), including offline. The project made it possible to check the operability of the post-quantum protection technology of contactless payment based on domestic algorithms of the electronic signature "Hypericum." In addition, the possibility of transmitting payment documents using Bluetooth between the client and the terminal, made in the form of a mobile application and capable of functioning without an Internet connection, has been checked.

File:Aquote1.png
It's like Sberbank's Vzhukh, only post-quantum, "Igor Goldovsky explained.
File:Aquote2.png

QApp Post-Quantum Cryptography Technology Stack

As of September 2025, the Russian standard of post-quantum cryptography, which is being developed by the technical committee of the TK-26, has not yet been adopted. Rosstandart But the corresponding subcommittee has already released methodological materials on the implementation of at least three algorithms for post-quantum encryption of domestic production: Hypericum, Sea buckthorn and Strawberry. There is their implementation in the form of a PQC library, SDK which allows you to integrate post-quantum encryption technologies into any software solution.

Some system components have already been developed based on this library, such as secure PQC VPN communications and PQC PKI certification center. There is even hardware acceleration technology for primitives for post-quantum IP PQC cryptography. In addition, ready-made solutions are already being created on the basis of these components, such as a TLS gateway using quantum secure algorithms, as well as a blockchain, where electronic signature algorithms are replaced with post-quantum ones.

According to Google estimates, a quantum computer that can hack the asymmetric encryption algorithms currently in use could appear as early as 2030. By this time, encryption technologies need to be replaced with quantum-resistant (post-quantum) technologies, which should ensure both the protection of financial transactions and the transfer of critical data over the popular TLS protocol on the Internet.

Moreover, there is not much time left to switch to new technologies, while technologies need to be replaced in a large number of components, starting with server ciphers and operating systems, ending with smart card crystals and mobile phones.

Russian cryptographic experts have proposed ways to protect against leaks through side channels for post-quantum schemes

Russian cryptographic experts have proposed ways to protect against leaks through side channels for post-quantum schemes. Kryptonite Group of Companies announced this on March 21, 2025.

cryptography Practical attention is paid to the attacks to side-channel attacks. They allow attackers to extract a secret information without hacking themselves, but algorithm enciphering only analyzing the peculiarities of its execution on physical devices. These attacks are especially dangerous because they bypass traditional methods of defense.

Such indirect attack methods become possible because computing devices absorb electrical energy during operation, emit electromagnetic and acoustic waves, and also execute instructions in different times. All this happens depending on the change in data on the registers and can carry information about the encryption key, violating Shannon's secrecy.

Even the most advanced cryptographic schemes are potentially vulnerable to side-channel attacks, including post-quantum ones being developed for the future to counter hacking using a quantum computer.

A study by Ivan Chizhov, deputy head of the cryptography laboratory for scientific work of Kryptonit and Dmitry Smirnov, master of Moscow State University, is devoted to methods of protecting post-quantum cryptographic schemes from attacks through side channels.

During the study, the authors identified vulnerable computational elements of the protocol, analyzed the main methods of attacks on them and proposed ways to protect against leaks through side channels. In particular, the authors propose a modification of the Stern protocol, which allows computing with a secret key in a masked form.

The essence of the modification is that on the registers the data is stored not in clear text, but in converted. The transformation is given as a mask with a secret. For the Rosehip scheme, when generating a mask, you can use the domestic hash function Stribog as a pseudo-random one. This will simplify the algorithm and architecture of cryptographic chips, since Stribog is already used in the Rosehip scheme.

Modification of the scheme specifies only a specific way to calculate values. The authors have shown that the resistance of the modified circuit coincides with the resistance of the original one in the absence of leaks through side channels.

2024

Global Post-Quantum Encryption Standards Approved

In mid-August 2024, the National Institute of Standards and Technology USA (NIST) announced the first global post-quantum encryption standards - FIPS 203, FIPS 204 and FIPS 205. The documents are designed to counter future attacks by quantum computers that threaten. cyber security

A widespread encryption scheme is RSA (Rivest, Shamir and Adleman), a public key cryptographic algorithm based on the computational complexity of the factorization problem (decomposition of numbers into prime factors) of large semisimple numbers. In 1994, the American scientist Peter Shore proposed a quantum factorization algorithm that allows hacking public key cryptographic systems. This jeopardizes existing information security systems. The new post-quantum encryption standards are designed to solve the problem.

Global Post-Quantum Encryption Standards Approved

FIPS 203 describes a key encapsulation mechanism based on the theory of lattices - ML-KEM (Module-Lattice-Based Key-Encapsulation Mechanism). We are talking about an asymmetric cryptographic system that is resistant to quantum attacks, which serves to transfer encryption keys between interlocutors.

The FIPS 204 standard applies to a digital signature mechanism based on algebraic lattices - ML-DSA (Module-Lattice-Based Digital Signature Algorithm). In turn, FIPS 205 describes an alternative digital signature mechanism - SLH-DSA (Stateless Hash-Based Digital Signature Algorithm).

File:Aquote1.png
Quantum computing technology is rapidly evolving, and some experts predict that a system capable of hacking existing encryption methods could emerge within a decade (by 2035), jeopardizing the security and privacy of individuals, organizations and entire countries, NIST notes.[2]
File:Aquote2.png

Cryptographers have introduced a mechanism resistant to attacks using a quantum computer

Employees the Russian of the company "" Kryptonite(part of the "ICS Holding") presented the cryptographic "Codieum" mechanism. It will remain persistent even after the advent of a powerful quantum one computer capable of hacking the latest algorithms enciphering traffic. The developer announced this on March 22, 2024. Read more here.

2023

Post-quantum algorithm of electronic signature "Rosehip" received an open implementation

Russian companies with expertise in cryptography and quantum technologies are joining forces to prevent threats to cryptographic systems from quantum computers.

Thus, the open implementation of the domestic post-quantum algorithm "company" DogroseKryptonite was "prepared by the company" "in QApp the course of its activities as part of the working group" Post-quantum cryptographic mechanisms "(TK Technical Committee 26 Rosstandart 26). The project is written in a language Xi optimized for SSE4.1, SSE2 and MMX command sets. Source code is available on [ GitHub[3] compiles into a library that can be embedded in industrial cryptographic devices and software products. This was announced on November 14, 2023 by representatives of the QApp company. More. here

Integration of QApp products with the Confident platform

On September 28, 2023, the companies QApp Web3 Tech and announced cooperation in the market. As information security part of this partnership, its participants completed an integration project to test post-quantum encryption QApp-based digital products in Web3 Tech's new Confidential blockchain platform. As part of this project, the first post-quantum Russia blockchain encryption platform appeared. More. here

Post-quantum protection for video conferencing is being tested in Russia for the first time

Russian IT-holding T1 on February 16, 2023 announced TAdviser the testing of the joint operation of the system, video conferencings Dion the development of the company ("Innotech" part of the T1 group), with a solution for post-quantum from data protection the company, a domestic QApp developer of complex products cyber security based on post-quantum. algorithms The result of the pilot integration of products was the first session video conference protected from cyber threats post-quantum. algorithms enciphering More. here

Scientists of NRNU MEPhI have proposed a way to use post-quantum cryptographic algorithms to protect group messaging in instant messengers

Scientists of the Department No. 42 "Cryptology and Cybersecurity" of NRNU MEPhI have proposed a way to use post-quantum cryptographic algorithms to protect group messaging in instant messengers. The results of the study are published in the Journal of Computer Virology and Hacking Techniques. This was announced on January 9, 2023 by representatives of the NRNU MEPhI.

Quantum cryptography
File:Aquote1.png
All over the world, work is actively underway to create quantum computers. In 20-30 years, it is expected that powerful quantum computers will be created, which will pose a threat to modern cryptosystems. The fact is that a quantum computer will be able to solve the problem of factorization of integers and the problem of discrete logarithm in a short time, on which the resistance of modern cryptography is largely based. Solving these computationally complex problems would take millions of years, even on state-of-the-art supercomputers. Quantum computers will be able to perform search algorithms much faster. Therefore, other methods of cryptographic information protection are being developed around the world, which will remain stable even after the advent of quantum computers.

told Sergey Zapechnikov, professor at the Institute of Intelligent Cybernetic Systems, NRNU MEPhI
File:Aquote2.png

According to the scientist, the principle of operation of the new methods will be that the violator, when trying to hack a cryptographic algorithm, will face not one computationally difficult task, but the need to enumerate a colossal number of computing problems of the same type. And although it will be easy for an intruder with a quantum computer to solve each of them separately, the number of tasks will be so large that even a quantum computer will be useless. With the appropriate selection of parameters, the number of problems to be sorted can even exceed the number of atoms in the Universe, and then it will be physically impossible to sort them out.

Based on this, scientists at NRNU MEPhI have proposed a way to use post-quantum cryptographic algorithms to solve one of the important application problems - the task of group messaging in instant messengers.

File:Aquote1.png
Messengers - personal instant messaging and file sharing tools - are very popular for January 2023. Almost every modern person uses them. It is assumed that in the future their role in information technology will only increase: for example, they will be used to automatically exchange information by Internet of Things devices, autonomous drones and other intelligent agents. Therefore, it is very important to provide cryptographic protocols to protect them.

stressed Sergey Zapechnikov
File:Aquote2.png

As reported, the researchers proposed a protocol for constantly updating cryptographic keys by a group of participants so that each message could be encrypted on a different key.

File:Aquote1.png
We were able to prove the theorems that even if the violator recognizes any cryptographic key from this sequence, he will still not be able to calculate either past or future keys, and thus the damage from key disclosure will be minimal.

reported scientist
File:Aquote2.png

However, according to him, the main problem of this kind of protocols is that they are quite complex, require some time to calculate from each side, and therefore significantly slow down the exchange of messages. Therefore, in in the future, the researchers plan to achieve higher protocol performance, provided that they remain resistant to attacks by violators armed with quantum computers.

2022: Russian blockchain platform Masterchain launches pilot projects in the field of post-quantum cryptography

The company, "Distributed Registry Systems" the platform developer and the Russian blockchain "Masterchain" the developer of complex software solutions cyber security based on post-quantum algorithms enciphering QApp concluded an agreement on strategic cooperation. The companies are working to create a quantum sustainable for the blockchain the Russian financial industry and have launched a number of joint pilot projects, TAdviser representatives of the Masterchain development company said on November 10, 2022.

A key area of ​ ​ cooperation between the two companies will be the development of a quantum-stable blockchain with integrated QApp software solutions: PQLR SDK and Qtunnel, created on the basis of quantum-stable algorithms.

2019: Kryptonit NPK to lead development of post-quantum cryptography standards in Russia

The heads of the cryptography laboratory of Kryptonit NPK will develop draft national standards of the Russian Federation that define post-quantum mechanisms for cryptographic information protection. The decision was made at a meeting of the technical committee for standardization "Cryptographic Information Protection" (TK 26), the Kryptonit NPK reported on November 19, 2019. Read more here.

Notes