Post-Quantum Cryptography
Quantum computers will break today's encryption. Post-quantum cryptography is the defense — and CasperVPN is already using it.
In this guide
The Quantum Threat
Quantum computers use qubits that can exist in superposition, enabling them to solve certain mathematical problems exponentially faster than classical computers. Shor's algorithm could break RSA and ECC encryption that protects most internet traffic today.
Harvest Now, Decrypt Later
Nation-state actors are already recording encrypted traffic with the plan to decrypt it once quantum computers are powerful enough. This is called the "harvest now, decrypt later" strategy. VPN traffic captured today could be decrypted in the future.
NIST Post-Quantum Standards
In 2024, NIST standardized several post-quantum algorithms including ML-KEM (Kyber) for key encapsulation and ML-DSA (Dilithium) for digital signatures. These algorithms are resistant to both classical and quantum attacks.
How CasperCloak Uses Kyber1024
CasperCloak integrates Kyber1024 (the highest security level of ML-KEM) into its key exchange process. This means even if quantum computers break the classical Diffie-Hellman key exchange, the session keys remain secure.
Frequently Asked Questions
When will quantum computers be able to break encryption?
Estimates range from 5 to 30 years for cryptographically relevant quantum computers. However, the harvest-now-decrypt-later threat makes quantum-resistant encryption important today.