LogoLogo
  • Welcome to Blerify's docs
  • Blerify Overview
    • User Centric Identity
      • Introduction
      • ID Wallet
      • Digital Credentials
      • Point of Verification (POV)
        • How Does a POV Work in Blerify?
      • Verification Process
    • Quantum-Resistant Cryptography
  • Developers
    • API Documentation
      • Access Token Generation
      • Issuing Verifiable Credentials with the Blerify API
      • Issuing ISO mDL with the Blerify API
    • Point of Verification
      • POVs Creation
      • POV Result
      • POVs Creation via API
    • Versions & Releases
      • Web Portal
        • Web Portal Release 1.5
        • Web Portal Release 1.6
        • Web Portal Release 1.7
      • Blerify APP
        • APP Versión 3.19.0 (386)
        • APP Versión: 3.27.0
        • APP Versión: 3.36.1
  • PRODUCTS
    • Vouchers
      • Orchestration
      • Issuer
      • Redeemption
    • Digital Credentials
      • Issue
        • Licenses
          • ISO/IEC 18013-5 Standard
          • Blerify and ISO/IEC 18013-5
          • Blerify Architecture
        • Verifiable Credentials W3C-VC
        • Benefits, discounts, promotions
      • Verify
        • Web Log In
        • In-Person Access
        • Check Out Experience
        • From Another App
    • Post Quantum Certificates
      • Request
      • Revocation
      • Verify
    • Wallet SDK
  • Resources In-Depth
    • DID Method
      • DID Method did:lac1
      • DID Controller
    • Decentralized Root of Trust
      • Blerify’s Smart-Contract-Based Root of Trust
Powered by GitBook
LogoLogo

Blerify.com

  • Blerify.com
On this page
Export as PDF
  1. Blerify Overview

Quantum-Resistant Cryptography

PreviousVerification ProcessNextAPI Documentation

Last updated 4 months ago

The rise of quantum computing poses a significant threat to modern cryptographic systems that protect online communications and sensitive data, as they rely on cryptographic algorithms that are not quantum-resistant. Once quantum computers become powerful enough to execute Shor’s algorithm at scale, widely used asymmetric cryptographic algorithms—such as RSA, (EC)DSA, and (EC)DH—will become vulnerable, as quantum computers will be able to break them in a matter of seconds.

Post-Quantum Cryptography (PQC) refers to a new generation of asymmetric cryptographic algorithms designed to resist quantum attacks. Unlike traditional methods, PQC does not depend on quantum mechanics for key exchange but instead leverages complex mathematical problems that cannot be efficiently solved by quantum computers.

To address this global security challenge, NIST initiated a post-quantum cryptography standardization process in 2016, inviting candidates for evaluation. After several selection rounds, in August 2024, NIST finalized three post-quantum digital signature standards: CRYSTALS-Dilithium, FALCON, and SPHINCS+, marking a crucial step toward a quantum-resistant future.

The pioneer work of Blerify’s founding team on quantum-resistant cryptography and blockchain led to the development of the first implementation of a Quantum-Resistant EVM Blockchain, which was published by and featured as a top 100 publication in 2023. At Blerify, we are implementing NIST-compliant PQC algorithms to safeguard digital identity and ensure cryptographic integrity against future quantum threats.

Nature's Scitific Reports Magazine