Certified Quantum Cryptography and Security Specialist (CQCSS)

MODULE 1: Introduction to Quantum and Post-Quantum Cryptography

Lesson Objectives:

  • Understand why quantum computing poses a threat to classical cryptographic systems.
  • Differentiate between quantum cryptography and post-quantum cryptography.

Topics:

  • The Quantum Computing Threat
  • Shor’s and Grover’s Algorithms
  • Classical vs. Quantum Security Paradigms
  • Quantum Key Distribution (QKD)
  • Post-Quantum Cryptography (PQC) definition and scope

Self-Assessment:

  1. What is the primary risk posed by Shor’s algorithm to current cryptographic standards?
  2. How does quantum cryptography differ fundamentally from post-quantum cryptography?

—————————————

IMPORTANT/PLEASE READ

Tonex has an upcoming Certified Quantum Cryptography and Post-Quantum Cryptology Professional course:

Oct 23-24, 2025

Register Here

—————————————

MODULE 2: Fundamentals of Quantum Computing

Lesson Objectives:

  • Gain a foundational understanding of quantum mechanics principles used in quantum computing.
  • Understand quantum bits (qubits), entanglement, and superposition.

Topics:

  • Qubits vs. classical bits
  • Superposition and Measurement
  • Entanglement and No-Cloning Theorem
  • Quantum Gates and Circuits (Hadamard, CNOT, Pauli, etc.)
  • Basic Quantum Algorithms

Self-Assessment:

  1. What property of qubits allows them to represent more information than classical bits?
  2. Why is the no-cloning theorem critical for quantum cryptography?

MODULE 3: Quantum Cryptography

Lesson Objectives:

  • Understand the principles and mechanisms of quantum cryptography.
  • Learn about QKD protocols and their practical implementations.

Topics:

  • Quantum Key Distribution (QKD)
  • BB84 Protocol
  • E91 Protocol (Entanglement-based QKD)
  • Quantum Random Number Generation
  • Security proofs of QKD
  • Practical implementation challenges (e.g., channel loss, detector attacks)

Self-Assessment:

  1. Describe the BB84 protocol and its reliance on quantum mechanics.
  2. What are some real-world limitations in deploying QKD systems?

MODULE 4: Post-Quantum Cryptography

Lesson Objectives:

  • Explore classical algorithms believed to be resistant to quantum attacks.
  • Understand the NIST PQC Standardization Process.

Topics:

  • Overview of NIST PQC competition
  • Lattice-Based Cryptography
  • Code-Based Cryptography
  • Multivariate Polynomial Cryptography
  • Hash-Based Signatures
  • Isogeny-Based Cryptography
  • Standardization and performance trade-offs

Self-Assessment:

  1. Why are lattice-based algorithms considered secure against quantum attacks?
  2. Name one advantage and one limitation of hash-based signature schemes.

MODULE 5: Lattice-Based Cryptography in Depth

Lesson Objectives:

  • Understand mathematical foundations of lattice problems.
  • Explore leading lattice-based schemes.

Topics:

  • Learning With Errors (LWE)
  • Ring-LWE
  • NTRU Encryption
  • Kyber (NIST finalist)
  • Dilithium (NIST finalist)
  • Security reductions and practical considerations

Self-Assessment:

  1. How does the LWE problem provide hardness assumptions for cryptographic schemes?
  2. Compare Kyber and Dilithium in terms of their roles in post-quantum security.

MODULE 6: Code-Based, Hash-Based, and Isogeny-Based Cryptography

Lesson Objectives:

  • Learn the principles of other PQC families and their use cases.

Topics:

  • McEliece Cryptosystem (Code-Based)
  • SPHINCS+ (Hash-Based)
  • Rainbow (Multivariate, retired)
  • SIDH and SIKE (Isogeny-Based, vulnerabilities)
  • Use cases and efficiency

Self-Assessment:

  1. Why has SIKE been deprecated in recent cryptographic discussions?
  2. What is the significance of statelessness in SPHINCS+?

MODULE 7: Hybrid Cryptography and Migration Strategies

Lesson Objectives:

  • Understand hybrid approaches and migration paths from classical to PQC.

Topics:

  • Hybrid TLS (e.g., X25519+Kyber)
  • PQC readiness assessments
  • Crypto-agility principles
  • Key encapsulation and digital signature hybrids
  • Strategies for enterprise transition

Self-Assessment:

  1. What is crypto-agility and why is it essential in PQC deployment?
  2. What are the risks of not deploying hybrid cryptography during transition?

MODULE 8: Threat Models and Security Proofs

Lesson Objectives:

  • Analyze threat models for quantum and post-quantum systems.
  • Understand formal security proofs and assumptions.

Topics:

  • Adaptive vs. chosen-ciphertext attacks in PQC
  • Side-channel attacks on PQC implementations
  • Formal security reductions
  • Provable security in quantum settings
  • Trust assumptions in QKD

Self-Assessment:

  1. Why is side-channel resistance critical for PQC schemes?
  2. How do formal reductions help validate security claims?

MODULE 9: Standards, Tools, and Implementations

Lesson Objectives:

  • Learn about PQC libraries, APIs, and standardization bodies.

Topics:

  • NIST, ETSI, ISO contributions
  • PQClean and Open Quantum Safe (OQS)
  • liboqs, CRYSTALS-Dilithium, Kyber implementation
  • Hardware support and integration
  • Compliance requirements

Self-Assessment:

  1. What are PQClean and liboqs, and how are they used?
  2. What role does ETSI play in quantum cryptography?

MODULE 10: Case Studies and Applications

Lesson Objectives:

  • Examine real-world implementations and future trends.

Topics:

  • QKD networks (e.g., China’s quantum satellite Micius)
  • PQC in TLS 1.3
  • Banking and government adoption
  • Blockchain and PQC
  • IoT constraints in post-quantum systems
  • Future-proofing critical infrastructure

Self-Assessment:

  1. What are the challenges of deploying PQC in constrained environments like IoT?
  2. How has QKD been tested in international communications?

FINAL EXAMINATION PREPARATION

Preparation Tips:

  • Review NIST Round 3 finalists and their cryptographic structures.
  • Understand both theoretical concepts and real-world implications.
  • Practice interpreting protocol flows (e.g., BB84, Kyber KEM).
  • Study implementation vulnerabilities and countermeasures.

Sample Exam Questions:

  1. Compare and contrast QKD and PQC in terms of security assumptions and deployment challenges.
  2. Explain how the Learning With Errors problem is used to build encryption schemes.
  3. Describe a hybrid encryption approach for a TLS handshake.
  4. What cryptographic principles make the BB84 protocol secure against eavesdropping?

Want to learn more? Tonex offers Certified Quantum Cryptography and Post-Quantum Cryptology Professional (CQPQC-P), a 2-day course where participants learn how quantum computing disrupts classical cryptography as well as learn to analyze threats posed by Shor’s and Grover’s algorithms to current cryptographic systems.

Attendees also design secure systems using quantum key distribution (QKD), compare and implement post-quantum cryptographic algorithms, including lattice-based, code-based, and multivariate systems, develop transition strategies for enterprises moving to quantum-resistant security and evaluate compliance and regulatory requirements related to quantum security.

This course is especially beneficial for:

  • Cybersecurity professionals
  • Cryptographers and security architects
  • IT infrastructure and network engineers
  • Risk managers and compliance officers
  • Government and defense technologists
  • Researchers in cryptology and quantum computing
  • Technical leads responsible for cryptographic systems

Tonex is the leader in AI certifications, offering more than six dozen courses, including in the Certified GenAI and LLM Cybersecurity Professional area, such as:

Certified AI Data Strategy and Management Expert (CAIDS) Certification

Certified AI Compliance Officer (CAICO) certification 

Certified AI Electronic Warfare (EW) Analyst (CAIEWS)

Certified GenAI and LLM Cybersecurity Professional (CGLCP) for Professionals   

Certified GenAI and LLM Cybersecurity Professional for Data Scientists

Certified GenAl and LLM Cybersecurity Professional for Developers Certification

Certified GenAI and LLM Cybersecurity Professional for Security Professionals (CGLCP-SP) Certification

Additionally, Tonex offers even more specialized AI courses through its Neural Learning Lab (NLL.AI). Check out the certification list here.

For more information, questions, comments, contact us.

Quantum Cryptography and Post-Quantum Cryptology Training

Request More Information