Post-Quantum Cryptography
Our GSMA Post-Quantum cryptography programme provides essential insights into emerging quantum computing technologies, advancing enterprise capabilities and mitigate against quantum threats by adopting post-quantum cryptography.
Preparing the industry for the transition to post-quantum cryptography (PQC)
Preparing for the arrival of quantum computing is a key objective for the mobile industry. Quantum technology can mitigate threats to data security through new cryptographic methods that can resist quantum attacks.
Defending against these threats is crucial to maintaining trust in communications, transactions, and the modern services we rely on daily. As a cornerstone of everyday life, the mobile industry plays a vital role in revising existing cryptographic standards, improving global digital infrastructures, and identifying potential vulnerabilities during this transition.
Get involved
Latest resources on PQC
Post Quantum Cryptography – Guidelines for Telecom Use Cases
PQ.03 V2.0 is released to provide insights for preparing a cryptographic migration and implementation of post-quantum cryptographic capabilities, analysing use cases and architecture, highlighting dependencies on standardisation, solution alignment, performance testing, and related topics such as Zero Trust Architecture.
Post Quantum Telco Network Task Force
Latest activities
PQC migration roadmap
8 – 10 October
MWC Las Vegas 2024
An incredible day of collaboration and learning on PQC
Post-Quantum’s FAQ
What is the post-quantum era?
This refers to when quantum computers are powerful enough to break traditional encryption methods that secure much of today’s digital communication. This era necessitates the development of new cryptographic techniques (post-quantum cryptography ‘PQC’) that can withstand quantum computing threats and designed to be secure against the potential capabilities of quantum computers. These algorithms are being developed to replace or supplement current encryption methods, ensuring long-term data security in a future with quantum computing.
What is the quantum threat?
The evolution of quantum computing capabilities poses a threat as they have the potential to render obsolete the most used cryptographic algorithms, such as public key cryptography, which underpin the cyber security solutions we rely on today to keep information and communications safe.
The timing of the threat is uncertain, however significant progress is being made in the evolution of quantum computing performance, quantum algorithms, and error correction. The evolution of quantum computing capabilities poses a threat as they have the potential to render obsolete the most commonly used cryptographic algorithms, such as public key cryptography, which underpin the cyber security solutions we rely on today to keep information and communications safe.
Why is post-quantum cryptography important to the mobile industry?
As telecommunication network and mobile devices rely heavily on encryption for trusted and secure communication system, the rise of quantum computers could render current security measures obsolete which impact society as a whole. This cryptography is essential for the mobile industry to secure telecommunication network, protect sensitive data, transactions, and user privacy in the face of this emerging threat.
The transition to new post-quantum cybersecurity standards and practices will be a multi-year’s process, and it requires the unite of telecom industry cooperate to understand the threats, impacts and opportunities, and formulate future-looking mitigation plans for the quantum safe.
Explore resources
Watch on-demand
MWC Barcelona 2024
Third Post Quantum Telco Network Seminar
Latest blog
NIST release the post-quantum cryptographic
Latest blog
Readying the mobile industry for a post-quantum future
Subscribe to our GSMA Post-Quantum community
Subscribing to our community is a way to ensure you stay updated with the latest developments as the industry undergoes this journey to quantum-safe era. For enquiries, please send email to [email protected].