Quantum Cryptography and Post-Quantum Cryptology Training

Module 1: Introduction to Quantum and Post-Quantum Cryptography

Learning Objectives

  • Understand why quantum computing poses a threat to many classical cryptographic systems.
  • Distinguish between quantum cryptography (QKD etc.) and post-quantum cryptography (PQC).
    Topics
  • The quantum computing threat: how and why quantum computers matter for cryptography.
  • Shor’s algorithm and Grover’s algorithm: what they do.
  • Classical vs. quantum security paradigms: symmetric vs asymmetric, factoring/DLP vs quantum algorithms.
  • Introduction to quantum cryptography (e.g., quantum key distribution (QKD)).
  • Introduction to post-quantum cryptography: scope, what “quantum-resistant” means.
    Self-Assessment Questions
  1. What is the primary risk posed by Shor’s algorithm to current cryptographic standards?
  2. How does quantum cryptography differ fundamentally from post-quantum cryptography?

Module 2: Fundamentals of Quantum Computing

Learning Objectives

  • Gain foundational understanding of quantum mechanics principles as used in quantum computing.
  • Understand qubits, superposition, entanglement, quantum gates and quantum circuits.
    Topics
  • Qubits vs classical bits: superposition, measurement.
  • Entanglement, no-cloning theorem.
  • Common quantum gates: Hadamard, Pauli X/Y/Z, CNOT, etc.
  • Simple quantum circuits: preparation, measurement, basic algorithms.
  • How quantum computing relates to cryptographic threats.
    Suggested Task: Try an online quantum simulator (such as IBM Q Experience) to build a simple quantum circuit and observe measurement outcomes.
    Self-Assessment Questions
  1. What property of qubits allows them to represent more information than classical bits?
  2. Why is the no-cloning theorem critical for quantum cryptography?

Module 3: Quantum Cryptography (QKD and related)

Learning Objectives

  • Understand the principles and mechanisms of quantum cryptography.
  • Learn about QKD protocols and practical implementation issues.
    Topics
  • Quantum Key Distribution (QKD) basics: concept, why it works.
  • Protocols: BB84 protocol, E91 protocol (entanglement-based).
  • Quantum random number generation, quantum channels, photon polarization etc.
  • Security proofs of QKD, eavesdropping detection, quantum channel loss and detector attacks.
  • Implementation challenges: real-world optical channels, hardware limits, side-channels.
    Self-Assessment Questions
  1. Describe the BB84 protocol and its reliance on quantum mechanics.
  2. What are some real-world limitations in deploying QKD systems?

Module 4: Post-Quantum Cryptography (PQC) – Overview

Learning Objectives

  • Explore classical cryptographic algorithms believed to remain secure against quantum attackers.
  • Understand the standardization initiatives (e.g., NIST PQC process).
    Topics
  • Why PQC is needed: quantum computing impact on classical crypto. arXiv+2arXiv+2
  • Overview of families of PQC algorithms: lattice-based, code-based, hash-based signatures, multivariate, isogeny-based.
  • Trade-offs: performance, key sizes, security assumptions.
  • NIST PQC standardization process: finalists, timeline. EECS at Michigan+1
    Self-Assessment Questions
  1. Why are lattice-based algorithms considered secure against quantum attacks?
  2. Name one advantage and one limitation of hash-based signature schemes.

Module 5: Lattice-Based Cryptography in Depth

Learning Objectives

  • Understand the mathematical foundations of lattice problems.
  • Explore top lattice-based schemes selected by NIST (e.g., Kyber, Dilithium).
    Topics
  • Learning With Errors (LWE) problem, Ring-LWE, NTRU, security reductions. arXiv+1
  • Description of Kyber (key-encapsulation) & Dilithium (signatures) as NIST finalists.
  • Practical considerations: key sizes, performance, implementation issues.
    Suggested Task: Review scholarly tutorial “A Tutorial Introduction to Lattice-based Cryptography” for mathematical depth. arXiv
    Self-Assessment Questions
  1. How does the LWE problem provide hardness assumptions for cryptographic schemes?
  2. Compare Kyber and Dilithium in terms of their roles in post-quantum security.

Module 6: Code-Based, Hash-Based, Isogeny-Based Cryptography

Learning Objectives

  • Learn the principles of alternative PQC families beyond lattice-based.
    Topics
  • Code-based cryptography: e.g., McEliece cryptosystem, Niederreiter, decoding-based challenges. org
  • Hash-based signatures: e.g., SPHINCS+, stateless vs stateful.
  • Multivariate polynomial cryptography, isogeny-based cryptography (e.g., SIDH/SIKE legacy) and their status.
  • Use-cases, efficiency, key/ signature size issues.
    Self-Assessment Questions
  1. Why has SIKE been deprecated in recent cryptographic discussions?
  2. What is the significance of statelessness in SPHINCS+?

Module 7: Hybrid Cryptography and Migration Strategies

Learning Objectives

  • Understand how organizations can transition from classical to quantum-resistant cryptography using hybrid approaches.
    Topics
  • Hybrid schemes: combining classical + post-quantum (e.g., TLS handshake with classical + PQC).
  • Crypto-agility: designing systems capable of algorithm swap.
  • Key encapsulation, digital signature hybrids.
  • Migration strategy: readiness assessment, impact on existing systems, vendor/legacy issues.
  • Risk analysis: what happens if you don’t move early.
    Self-Assessment Questions
  1. What is crypto-agility and why is it essential in PQC deployment?
  2. What are the risks of not deploying hybrid cryptography during transition?

Module 8: Threat Models, Security Proofs & Implementation Considerations

Learning Objectives

  • Analyze threat models specific to both quantum and post-quantum cryptography.
  • Understand formal security proofs and practical implementation challenges.
    Topics
  • Adaptive vs chosen-ciphertext attacks in PQC.
  • Side-channel attacks on PQC implementations (timing, power, fault).
  • Formal security reductions: from hardness assumptions to scheme security.
  • QKD trust models, assumptions (e.g., device independence).
  • Implementation pitfalls: hardware, software, constrained devices.
    Self-Assessment Questions
  1. Why is side-channel resistance critical for PQC schemes?
  2. How do formal reductions help validate security claims?

Module 9: Standards, Tools & Implementations

Learning Objectives

  • Become familiar with the tools, libraries, and standardization bodies relevant to quantum/post-quantum cryptography.
    Topics
  • Standardization bodies and initiatives: NIST, ETSI, ISO.
  • Toolkits and libraries: liboqs, PQClean, reference implementations. com
  • Hardware accelerators, integration into existing systems.
  • Compliance requirements, certification frameworks.
    Suggested Task: Explore open-source PQC library, compile and run example KEM/signature, inspect performance.
    Self-Assessment Questions
  1. What are PQClean and liboqs, and how are they used?
  2. What role does ETSI play in quantum cryptography?

Module 10: Case Studies and Applications

Learning Objectives

  • Examine real-world implementations, deployment experiences, and future trends.
    Topics
  • QKD networks (e.g., national scale, experiments).
  • PQC in TLS 1.3, cloud environments, IoT ecosystems.
  • Blockchain and PQC, constrained devices (IoT, embedded).
  • Future trends: quantum computing hardware progress, quantum-safe certification, migrating legacy systems.
    Self-Assessment Questions
  1. What are the challenges of deploying PQC in constrained environments like IoT?
  2. How has QKD been tested in international communications?

Want to learn more? Tonex offers Certified Quantum Cryptography and Post-Quantum Cryptology Professional (CQPQC-P), a 2-day course where participants learn how quantum computing disrupts classical cryptography as well as learn to analyze threats posed by Shor’s and Grover’s algorithms to current cryptographic systems.

Attendees also design secure systems using quantum key distribution (QKD), compare and implement post-quantum cryptographic algorithms, including lattice-based, code-based, and multivariate systems, develop transition strategies for enterprises moving to quantum-resistant security and evaluate compliance and regulatory requirements related to quantum security.

This course is especially beneficial for:

  • Cybersecurity professionals
  • Cryptographers and security architects
  • IT infrastructure and network engineers
  • Risk managers and compliance officers
  • Government and defense technologists
  • Researchers in cryptology and quantum computing
  • Technical leads responsible for cryptographic systems

Tonex is the leader in AI certifications, offering more than six dozen courses, including in the Certified GenAI and LLM Cybersecurity Professional area, such as:

Certified AI Data Strategy and Management Expert (CAIDS) Certification

Certified AI Compliance Officer (CAICO) certification 

Certified AI Electronic Warfare (EW) Analyst (CAIEWS)

Certified GenAI and LLM Cybersecurity Professional (CGLCP) for Professionals   

Certified GenAI and LLM Cybersecurity Professional for Data Scientists

Certified GenAl and LLM Cybersecurity Professional for Developers Certification

Certified GenAI and LLM Cybersecurity Professional for Security Professionals (CGLCP-SP) Certification

Additionally, Tonex offers even more specialized AI courses through its Neural Learning Lab (NLL.AI). Check out the certification list here.

—————————-

*Why Choose Tonex?*

Tonex is more than a global leader of cutting-edge technology courses. For more than three decades, Tonex has also been prominent in philanthropy as well, topped off by a $6.7 million donation to Penn State’s College of Information Sciences and Technology (IST) to support curricular development in the field of enterprise architecture.

Tonex takes education seriously, which is why so many professionals in academia and innovative organizations have turned to Tonex for advice on everything from digital transformations to best strategies and guides for implementing new AI programs while meeting important ethical and governance challenges.

For more information, questions, comments, contact us.

Quantum Cryptography and Post-Quantum Cryptology Training

 

 

 

 

 

 

 

 

Request More Information