Post-Quantum Cryptography
Cryptographic algorithms designed to resist attacks from both classical and quantum computers. Autheo uses Kyber, Dilithium, and Falcon algorithms.
Post-quantum cryptography refers to cryptographic algorithms designed to resist attacks from both classical computers and future quantum computers. Current widely used algorithms (RSA, ECDSA) could be broken by sufficiently powerful quantum computers running Shor algorithm. Autheo uses three NIST-standardized post-quantum algorithms: Kyber (for key encapsulation and secure key exchange), Dilithium (for digital signatures), and Falcon (for compact digital signatures). These algorithms are integrated throughout the Autheo stack via AutheoID for identity, QIES for encryption standards, and QSDAG for consensus verification.
Explore the Autheo Platform
Dive deeper into the technology, developer tools, and ecosystem that power Autheo.