In recent years, there has been a substantial amount of research on quantum computers – machines that exploit quantum mechanical phenomena to solve mathematical problems that are difficult or intractable for conventional computers.
Post-quantum cryptography refers to cryptographic algorithms that are thought to be secure against an attack by a quantum computer. As of 2018, this is not true for the most popular public-key algorithms, which can be efficiently broken by a sufficiently strong hypothetical quantum computer. If large-scale quantum computers are ever built, they will be able to break many of the public-key cryptosystems currently in use.
Post-quantum cryptography refers to cryptographic algorithms that are thought to be secure against an attack by a quantum computer. As of 2018, this is not true for the most popular public-key algorithms, which can be efficiently broken by a sufficiently strong hypothetical quantum computer. If large-scale quantum computers are ever built, they will be able to break many of the public-key cryptosystems currently in use.
The problem with currently popular algorithms is that their security relies on one of three hard mathematical problems: the integer factorization problem, the discrete logarithm problem or the elliptic-curve discrete logarithm problem. This would seriously compromise the confidentiality and integrity of digital communications on the Internet and elsewhere.
The goal of post-quantum cryptography is to develop cryptographic systems that are secure against both quantum and classical computers, and can interoperate with existing communications protocols and networks. This Internal Report shares the National Institute of Standards and Technology (NIST)’s current understanding about the status of quantum computing and post-quantum cryptography, and outlines NIST’s initial plan to move forward in this space. The report also recognizes the challenge of moving to new cryptographic infrastructures and therefore emphasizes the need for agencies to focus on crypto agility.
https://nvlpubs.nist.gov/nistpubs/ir/2016/NIST.IR.8105.pdf
1. Could you propose other approach than symmetrical keys?
2. How companies should shift from classical security approach to post quantum?
3. If you know any interesting links, resources related to this topic please share with us.
4. What other acpects of modern IT could be affected by quantum computing?
Two weeks ago there was a presentation at WDSIT in Kazimierz Dolny about exactly that - post-quantum cryptography.
ReplyDeleteThere are basically two approaches to PQC:
a) quantum cryptography - using entanglement or some such to exchange a key safely
b) classical post-quantum cryptography, using even more elaborate methods, which won't yield to quantum computing.
The presentation was extremely rich in higher mathematics, so I can't explain what the actual approach was,
but there was something about elliptic curves, so it's probably a flavor of ECC. But nowhere was the term 'discrete
logarithm' [of ECC] used - as in the report OP mentioned.
I always thought, ECC was not 'broken' by quantum computing. The reason it hasn't really even taken off was
that for now, large semi-prime factorization based PKI is sound.
1. Could you propose other approach than symmetrical keys?
I think you meant 'asymmetrical keys'. The symmetrical keys are still fine. The best one being one-time pad:
https://en.wikipedia.org/wiki/One-time_pad
2. How companies should shift from classical security approach to post quantum?
I think we should follow the develompent of QC and start switching 2-5 years before we see an immediate threat.
That is, if we don't care about government surveillance, because government agencies can affort the newest
gadgets, and a petty criminal, trying to infect random people with ransomware, cannot. Other than that,
I think the Certification Authorities will start selling quantum-proof technologies soon enough.
3. If you know any interesting links, resources related to this topic please share with us.
4. What other acpects of modern IT could be affected by quantum computing?
Let me combine these two questions and point you to a reddit entry, which may help you get a feel for
what QC will and won't be able to do:
https://www.reddit.com/r/QuantumComputing/comments/1ljaqj/how_many_np_problems_can_be_made_efficient_with/
Hello Tomasz thank you for sharing info about WDSIT and link to the discussion.
DeleteIn first question I was asking rather if there are some other quantum proof cryptography methods than symmetric keys
I generally agree that governments cannot afford newest technologies but many companies are also affected, especially financial institutions. These enterprises as well need to be prepared and forecast possible threats to cybersecurity.
1. Could you propose other approach than symmetrical keys?
ReplyDeleteI do not have any other ideas.
2. How companies should shift from classical security approach to post quantum?
Gradually, such a change will certainly be associated with high financial costs and expertise.
3. If you know any interesting links, resources related to this topic please share with us.
1 year ago I have found interesting video about quantum computer. Video was made by Linus from Linus Tech Tip Youtube channel. In this video he describes how the quantum computer works and he is showing the infrastructure needed to run quantum processor. Finally, you also will be able to see real working quantum processor. It was quite interesting for me especially when he said that the quantum processor is consuming insignificant amount of electricity, but the whole infrastructure needed to run processor consumes huge amount of energy. Energy especially is needed in cooling infrastructure, because processor can only be run in temperature as close as possibly to absolute 0. Below you can find link to the video.
https://www.youtube.com/watch?v=60OkanvToFI
4. What other acpects of modern IT could be affected by quantum computing?
The information processing that it critical to improve machine learning is ideally suited to quantum computing. Quantum computers can analyze large quantities of data to provide artificial intelligence machines the feedback required to improve performance. Quantum computers are able to analyze the data to provide feedback much more efficiently than traditional computers and therefore the learning curve for artificial intelligence machines is shortened. Just like humans, artificial intelligence machines powered by the insights from quantum computers can learn from experience and self-correct. Quantum computers will help artificial intelligence expand to more industries and help technology become much more intuitive very quickly.
Hello Cezary thank you for your thoughts.
Delete1 year is pretty long time in IT world and it seems we are much closer to achieving production ready quantum processor than Linus was assuming year ago. IBM-Q research team is moving in interesting direction with theirs work.
Your thoughts about applications of quantum computing in machine or deep learning are really interesting could you share any paper that is trying to develop solution in this field
This comment has been removed by the author.
ReplyDelete1. Could you propose other approach than symmetrical keys?
ReplyDeleteBasically I use cryptography but with ready solutions, so
symmetric and asymmetric keys are enough for everything.
2. How companies should shift from classical security
approach to post quantum?
As with everything. They will hire professionals or
subcontractors who will migrate. Of course, it will last
just like any new one, but it will work.
3. If you know any interesting links, resources related
to this topic please share with us.
I'm sorry but no, thank you for the movie about the
quantum computer.
4. What other acpects of modern IT could be affected by
quantum computing?
Data decryption. Fast, error-free decryption.
This problem of the modern world can significantly affect
quantum computation. May be able to do it!
Hello Cezary
DeleteYes of course I agree industry will be using some of the shelf solution even in PQC times but could we think about something beyond symmetric key cryptography?
In case of hiring contractors or consults it seems to be pretty obvious but how we should plan their work and prepare for this scenation?
Data decryption is really interesting topic, could you share any source materials in this field
1. Could you propose other approach than symmetrical keys?
ReplyDeleteIt is hard to come up with something as effective.
2. How companies should shift from classical security approach to post quantum?
It will certainly be very difficult and expensive. In Short-term ensure enterprise infrastructure is sufficient to maintain cryptographic services using traditional cryptographic methods of either sufficient key size and
migrate current cryptography to quantum-resistant algorithms. In Longer-term as quantum computing hardware becomes commoditized into solutions, implement quantum cryptographic methods to reduce risk to business processes.
3. If you know any interesting links, resources related to this topic please share with us.
https://www.accenture.com/t20181004T080642Z__w__/us-en/_acnmedia/PDF-87/Accenture-809668-Quantum-Cryptography-Whitepaper-v04.pdf
4. What other acpects of modern IT could be affected by quantum computing?
It is difficult to predict what the quantum computer can be used for. We know that it can solve problems that cannot be solved for current computers. But the real results will turn out when the possibility of using such technology will go to a larger group of scientists.
Hello Przemysław, Thank you for sharing whitepaper it seems to be really interesting. I agree with your opinion about shifting process that companies need to face in some future. It for sure will be pretty interesting and challenging situation for cyber security departments.
Delete1. Could you propose other approach than symmetrical keys?
ReplyDeleteIn Kazimierz Dolny twoo weeks ago I refer presentation about „New algorithms of AI in quantum computing”. I think we have many Times, because now „the machine” is not a quantum computer. Problem is the dekoherance. But many firms for example DVawe try to run this machine.
2. How companies should shift from classical security approach to post quantum?
Now we don’t have a convert with deterministic system to probabilistic system, because there is impossible.
This comment has been removed by the author.
DeleteHello Artur thank you for sharing WDSIT topic.
DeleteCould you elaborate more deeply such shift is impossible?
One of the steps will be start using AES cryptography and in case when QC will gain some momentum this will be one of the possible options
3. If you know any interesting links, resources related to this topic please share with us.
ReplyDeletePlease contact with me, I have some articles about this.
4. What other acpects of modern IT could be affected by
ReplyDeletequantum computing?
Quantum computing we can use only for specified problems and probabilistic system, because there is not deterministic system. We can use for: to predict weather conditions - computing millions data; find prime factors - Shor's algorithm; space research, medicine - to find new proteins and other.
Thank you Artur.
DeleteIt is great and pragmatic approach
1. The best and unbreakable system is the single-use cipher system. In this case, the data for encryption can only be used once. Of course, the set of encryption data must be completely random and long.
ReplyDelete2. If the encryption key is random and long, it is not even possible for the quantum computer to decrypt the data.
3. Quantum computers will be useful where it is more important to get a complicated result quickly. The result of calculations made by a quantum computer is true only with a certain probability.
Hello Andrzej
DeleteThank you for your thoughts. In case of question about how industry should shift after PCQ the solution itself seems to be feasible but how to implement it and plant all replated work so this implementation will be possible is much longer and complecx problem
1. Could you propose other approach than symmetrical keys?
ReplyDeleteFor the time being, nothing comes to my mind.
2. How companies should shift from classical security approach to post quantum?
Well, bearing in mind that companies always focus on costs and their optimisation I would expect them to implement such changes gradually, as they will cost a lot of money and companies' investors won't be happy about receiving limited or no return on their investments.
3. If you know any interesting links, resources related to this topic please share with us.
Unfortunately, nothing comes to my mind.
4. What other acpects of modern IT could be affected by quantum computing?
I agree with the previous speakers that quantum computers may turn out to be useful in the field of artificial intelligence development, as they're more efficient than the traditional ones. They can provide quicker and more exhaustive feedback.
Hello,
DeleteThank you for for your thoughts. Does you think companies around the world will be forced to make a shift and it will not be depending on possible profits but actually what can be possible losses
1. Could you propose other approach than symmetrical keys?
ReplyDeleteYes, asynchronous keys. In the article are called public keys eg RSA algorithm. According to the author of the article RSA is not safe.
2. How companies should shift from classical security approach to post quantum?
Companies should primarily use algorithms that have not yet been broken or the chance of breaking the key is negligible. In the next step they need to use the encryption keys with the recommended length. Implement algorithms based on lattices, codes, and multivariate polynomials.
3. If you know any interesting links, resources related to this topic please share with us
I dont’t know any additionall resources.
4. What other acpects of modern IT could be affected by quantum computing?
It can be used to eg model complicated chemical reactions or simulate a hydrogen molecule. I found this information in this article:
https://www.wired.co.uk/article/quantum-computing-explained
Hello Piotr,
DeleteSure RSA will not be safe after PQC but could you propose some other approach?
Implementing such algorithms that are not affected by QC is one thing but how to plan and prepare for whole process of implementation
simulation of particles reaction is great example, thank you sharing this with us.
1. Could you propose other approach than symmetrical keys?
ReplyDeleteBecause of this article, I had to study this topic a little. But unfortunately, I am too lamer to answer this question.
2. How companies should shift from classical security approach to post quantum?
Large companies find it difficult to establish even small adjustments in their activities. I don't think this will be a quick process. But I think that this process is already running.
3. If you know any interesting links, resources related to this topic please share with us.
Unfortunately, I was not fond of this topic. The only thing I heard about quantum computer is the answer of Justin Trudeau (Prime Minister of Canada) about what a quantum computer is.
4. What other acpects of modern IT could be affected by quantum computing?
I think that this is data processing. The use of quantum computers will help speed up manipulations with them, as well as increase their volume, which will greatly affect our lives. I think it will be a huge step for artificial intelligence.
Hello Sebastian,
DeleteThank you for sharing
In general large corporations have large insertion and any activities need time, but we as the next generation who is shaping moder it industry should be prepared for this shift.
Could you share any papers that are trying to solve problems related to artificial intelligence and quantum computing?
1. Could you propose another approach than symmetrical keys?
ReplyDeleteAccording to the report, another approach for the symmetrical keys (AES) is N/A (SHA-2, SHA-3), or public key's typology (RSA, ECDSA, ECDH, DSA). The report suggests other one called 'Post-Quantum Cryptography.' The new post-quantum approach will use properties of quantum mechanics to create a secure communication channel (it's reporting assumption).
It is an interesting report.
2. How companies should shift from classical security approach to post-quantum?
I think, sooner or later, the quantum computers bring the risk for all cryptography. We know that the power of cryptography is a limitation of computing power. The less limitation of computing power there is the easiest to bypass the security of a computer system, which uses the traditional cryptography keys. Companies should invest more money in science around the cryptography aspects and new solutions that focus on new quantum computer's era.
3. If you know any interesting links, resources related to this topic, please share with us.
In google scholar, we can find many interesting articles on the subject. The most cited articles promote for themselves. I suggest to read two of them (unfortunately payable):
1. https://www.nature.com/articles/414883a - Interesting article, which describes a Shor's quantum factoring algorithm using nuclear magnetic resonance.
2. https://www.nature.com/articles/35005001 - the article focuses on classical worldview provides an incomplete approximation to an underlying quantum reality
4. What other aspects of modern IT could be affected by quantum computing?
Quantum computing is a bypass of computing power's limitation. In my opinion, it brings more interesting researches about results beyond sight and sound. It will new era for Artificial Intelligence machines. The AI won't be needed such big data as we suppose now. Homo sapiens created big data. We are a source of them. I think quantum computing will open the door for a new vision of big data where AI systems create the new big data.
Hello Agata.
DeleteYes PCQ cryptography is exciting and interesting topic but also bringing new challenges and threats. Both article seems to be really interesting and promising, thank you for sharing.
Thank you Ewelina ;) It's my pleasure to read your post and comment the one.
Delete1. Maybe asynchronous keys?
ReplyDelete2. Changing any systems in companies is associated with huge costs, so the question remains whether companies want and see the need to change the security approach. However, if they have already decided on a quantum approach, they should find and use algorithms that would guarantee that nobody will break them for a very long period of time.
3. I'm sorry, but I'm not familiar with the topic of cryptography. I only know the basics of quantum computers.
4. I think that quantum computations are ideal for processing large amounts of information. They can be successfully used in big data and machine learning. Quantum computers do not have the limitations of ordinary computers, so the computation speed is incomparably greater. Thanks to quantum computers, high complexity and multi-dimensional problems could be solved.
Hello Monika for sharing
DeleteBut asynchronous keys are not immune for QC, Could you propose something that will be not affected by QC.
Hello,
ReplyDeleteThank you for an interesting subject, I think that quantum computers and algorithms are exciting fields of science.
1. Could you propose other approaches than symmetrical keys?
Symmetric key algorithms use a single secret key, which must be shared and kept private by both the sender (for encryption) and the receiver (for decryption). A nice alternative could be asymmetric (public key) cryptography, which is any cryptographic system that uses pairs of keys: public keys which may be broadcasted widely, and private keys which are known only to the owner. Another approach could be a quantum key distribution which has the ability of the two communicating users to detect the presence of any third party trying to gain knowledge of the key. This results from a fundamental aspect of quantum mechanics: the process of measuring a quantum system - disturbs the system.
2. How should companies shift from classical security approach to post-quantum?
In my opinion, that would be done like every other process in the company- better or worse. However, when this situation occurs, the post-quantum approach would be as widely distributed and well-known as SSL, and not using it in the company would be passé.
3. If you know any interesting links, resources related to this topic, please share with us.
https://www.research.ibm.com/ibm-q/
4. What other aspects of modern could IT be affected by quantum computing?
For example database searching task (Grover's algorithm). However, I think that actual applications would be revealed when quantum computers would be available for the general market.
Hello Artur.
DeleteThank you for sharing idea about quantum key distribution is tis truly interesting topic. Are you familiar with any papers that are related to this field.
IBM-Q seems to be most advanced research team in this field, are you familiar with any other publications in this field?
1. Could you propose other approach than symmetrical keys?
ReplyDeleteI think the topic is interesting especially from a point of view where a lot of math can be used in a practical thing. Unfortunately I cannot give any other example because I am not very famiiar with cryptography.
2. How companies should shift from classical security approach to post quantum?
I think that first they should think what benefits it would bring to them. How sensitive data they have and was is he probability that their data may be stolen. If the change is profitebale then they should do that in a way that do not disturb the normal proccesses at the company. Otherwise they should stick to the solutions that they have so far.
3. If you know any interesting links, resources related to this topic please share with us.
Unfortnatelu I don't know more about this topic.
4. What other acpects of modern IT could be affected by quantum computing
I know that there is quantum machine learning. It is something that is between quantum phisics and machine learning It may be sed to accelerate the computetion or find some hidden states.
Hello Katarzyna,
DeleteThank you for sharing your thoughts. Are you familiar with any scientific publications in field of quantum machine learning and share this papes with us?
1. Could you propose other approach than symmetrical keys?
ReplyDeleteAs it was mentioned in the presented article: asymmetric key (f.e. RSA, DSA), hash functions (SHA) or quantum cryptography.
2. How companies should shift from classical security approach to post quantum?
I think it will be done automatically – manufacturers will add such method of security as a new option in their firmware. So companies should just update their software or firmware and change their choice to the newest one.
3. If you know any interesting links, resources related to this topic please share with us.
I don’t have such links but I have heard about Ising Spin Systems. You can read about them on the Internet.
4. What other aspects of modern IT could be affected by quantum computing?
Besides hardware and cryptography I suppose that the software can benefit from quantum computing. I agree with Andrzej that where there is a need of quick result – there such solutions have a possibility of usage.
Hello Damian,
DeleteI do not agree we can call process of shinth for PCQ cryptography 'automatic' so called providers as well need to do there homework and implement new algorithm and propose new approaches.
Yes, you're right. But you are talking about manufacturer side. From company side it looks very simple - as I wrote.
Delete1. I know only symmetrical and asymmetric key encryption. They are widely applied in most cryptography systems. It seems that the mentioned encryption approach is sufficient nowadays.
ReplyDelete2. The post quantum approach may be very expensive. For now, I doubt that even big companies can afford it. I notice two main problem: migration of the traditional cryptography algorithms into post quantum cryptography and hardware. If we do not have enough sources of hardware, we are not able to use the quantum computing. The world is fast-growing so I think that in the future, companies will start switching into the post quantum approach. There are some challenges for the post quantum approach like: quantum algorithms are mainly probabilistic, qubits are susceptible to errors, difficulty of coherence.
3. https://arxiv.org/pdf/1804.00200.pdf
4. I think that the quantum computing can be applied in machine learning. Nowadays, machine learning is becoming more and more popular and useful but it is based on analyzing huge amount of data so we need very powerful computers. They can search through gigantic datasets concerning medical research, consumer behavior and financial markets. I suppose that the quantum computers can be used in optimization for example to choose the shortest or longest way between points based on permutations and combinations . Below, there is link there you can read about application of the quantum computer.:
https://devops.com/4-amazing-quantum-computing-applications/
Hello Monika,
DeleteI agree with approach proposed by you for new challenges that are having beginning in PQC. Also articles shared by you seems to be really interesting and promising.
According to wikipedia there already are some solutions that should be immune to the quantum computer attacks: https://en.wikipedia.org/wiki/Post-quantum_cryptography
ReplyDeleteSo I guess that companies should just implement those solutions. But if quantum computers become a security treat then probably new cryptographic methods will become a standard and maybe for most companies simple software update will be enough to start using them.
Beside cryptography related things quantum computers could be used for demanding simulations.
Hello Adam,
DeleteThank you for your thoughts. It seems to be obvious that companies need to implement new algorithms and tackle new challenges. But the real question how to do this, how to prepare workforce for this process?
1. Hm, asymetric keys I guess.
ReplyDelete2. I think using cryptographic algorithms that aren’t broken with really large keys is enough for now.
3. I don’t know much about quantum cryptography, but I find interesting example in google scholar:
http://iopscience.iop.org/article/10.1088/1367-2630/8/5/075/meta
4. I think that artificial intelligence is an ideal candidate for quantum computing, where probabilistic elements are the basis for the operation of quantum computer algorithms.
Hello Łukasz,
DeleteThank you for sharing thoughts. could you propose papers that are tackling field of quantum machine learning?
1. Could you propose other approach than symmetrical keys?
ReplyDeleteNot all traditional crypto is vulnerable to quantum cryptanalysis. Most symmetric key crypto and other older types of multi-party computing are resistant to quantum hacking, and newer fields such as Multivariate cryptography provide alternatives to quantum-vulnerable PKI like RSA that can be hacked by Shor’s algorithm.
2. How companies should shift from classical security approach to post quantum?
Companies should nonetheless take the NSA’s advice to heart and use post-quantum algorithms as an antidote against the new super hackers. To ensure that today’s data traffic cannot be decrypted in the quantum age, companies urgently need to prepare in the here and now. Companies should identify critical assets and include the requirement of long-term security in their risk analysis to protect information with a five to fifteen-year privacy.
3. If you know any interesting links, resources related to this topic please share with us.
I found this article very interesting: https://www.t-systems.com/dk/en/newsroom/perspectives/security/ict/post-quantum-cryptography-790488
4. What other aspects of modern IT could be affected by quantum computing?
Quantum computing will definitely change our world, for example through
Cyber security: Quantum Computers can check all the criminal activities happening online. Prime factorization of very very big number can help us decrypt encrypted messages to prevent criminal activities like data leakage.
Artificial Intelligence: This is the field where Quantum Computers will aid the most . They are going to make it even more efficient and reliable than ever before due to its accuracy and precision.
Computational parallelism: QC can sort, Filter, search through, and process big data much more quickly than today’s best computers.
There are many other fields where QC would help : Aerodynamic research,Oil and Gas exploration,Computing the structure and properties of Chemical Compounds and Space exploration.
Hello Klara.
DeleteThank you for sharing idea about Multivariate cryptography. Could you share any scientific papers about this topic.
I agree article that you have share with us seems to be really interesting and promising.
Topics such as artificial intelligence and parallelism are interesting are you able to share papers that are studying this fields.
1. Could you propose other approach than symmetrical keys?
ReplyDeleteNothing more that given above. I can add that many of nowadays cryptography algoritm have to been change when the quantum computers will become everyday life.
On the other hand I didn't find other information about successful attempt breaking the private key so I'm skeptic that the quantum machines could break them.
2. How companies should shift from classical security approach to post quantum?
As I said above I'm skeptin in this case so I think that nowadays firm don't have to change anything.
3. If you know any interesting links, resources related to this topic please share with us.
It's not my subject matter so I don't keep articles about this subject. As others said Artur Arciszewski show presentation in Kazimierz about quantum machines-I'm sure he could send you many really interesting articles in this subject.
4. What other acpects of modern IT could be affected by quantum computing?
I similar to Piotr S heard that great hopes related to quantum computers concern on simulate molecule behaviours (on present computers it is impossible).
Good evening
DeleteThank you for your thoughts and engagement, I understand this poric is pretty complex but in the same time really interesting
1. Could you propose other approach than symmetrical keys?
ReplyDeleteMe myself - no, I don't know of any other method than mentioned in report. I remember Big Dragon and Little Dragon (because of cool names!) - multivariate cryptosystems.
2. How companies should shift from classical security approach to post quantum?
Just like till now - by following recommendations of standard bodies (NIST, PCI/DSS...). We are phasing out SSL and early TLS, and when the time will come - we'll phase out current cryptosystems.
3. If you know any interesting links, resources related to this topic please share with us.
Numberphile YT channel is interesting for crypto layman like me.
4. What other aspects of modern IT could be affected by quantum computing?
I don't know, modelling of complex systems maybe? Like weather simulations accounting for its chaotic properties maybe.
Hello Przemek,
DeleteThank you for sharing info about little tragon and big dragon cryptosystems. Could you share with us white papers or any other related sources?
This youtube channel you have proces is really good starter.
Post-quantum cryptography – class of cryptographic schemes based on the classical computing paradigm, designed to provide security in the aera of powerful quantum computers. This is an incredibly exciting area of research that has seen an immense amount of growth over the last decade. There are several classes of new cryptographic algorithms, which are currently believed to resist quantum computer attacks. Current secure HTTPS communications rely on an exchange of keys generated by asymmetric cryptography to ensure that the parties are who they say they are. Once these keys are exchanged, the data is then encrypted with symmetric cryptography, such as AES, and signed with asymmetric cryptography, like RSA.
ReplyDeleteSymmetric encryption uses a single key that needs to be shared among the people who need to receive the message while asymmetrical encryption uses a pair of public key and a private key to encrypt and decrypt messages when communicating. Symmetric encryption uses a single key that needs to be shared among the people who need to receive the message while asymmetrical encryption uses a pair of public key and a private key to encrypt and decrypt messages when communicating.
It is very difficult to answer how to shift from classical security approach to post-quantum, because now, each use case is unique. If we want to engage post-quantum cryptography, we need to get in touch with our friendly neighborhood cryptographer. Otherwise we ought to wait until NIST has finished its standardization process.
I am not particularly interested in this issue, so I am not able to indicate links unknown for those, who know more in this respect.
As far as I managed to examine the subject, it can affect almost all modern IT aspects. While many types of cryptosystems described have received lots of academic attention, none have been approved by NIST and as a result are not recommended for general use yet. Many of the schemes are not performant in their original form, and have been subject to various optimizations that may or may not affect security. Indeed, several attempts to use more space-efficient codes have been shown to be insecure. As it stands, getting the best security from post-quantum cryptosystems requires a sacrifice of some amount of either space or time. This is a huge research field for total modern and future IT science.