identity

Post-Quantum Cryptography

Definition

Cryptographic algorithms designed to resist attacks from both classical and quantum computers. Autheo uses Kyber, Dilithium, and Falcon algorithms.

Last updated: April 2026Reviewed by: Autheo Technical Team

Post-quantum cryptography refers to cryptographic algorithms designed to resist attacks from both classical computers and future quantum computers. Current widely used algorithms (RSA, ECDSA) could be broken by sufficiently powerful quantum computers running Shor algorithm. Autheo uses three NIST-standardized post-quantum algorithms: Kyber (for key encapsulation and secure key exchange), Dilithium (for digital signatures), and Falcon (for compact digital signatures). These algorithms are integrated throughout the Autheo stack via AutheoID for identity, QIES for encryption standards, and QSDAG for consensus verification.

Explore the Autheo Platform

Dive deeper into the technology, developer tools, and ecosystem that power Autheo.