{"id":15961,"date":"2023-10-05T09:55:30","date_gmt":"2023-10-05T07:55:30","guid":{"rendered":"https:\/\/www.thegreenbow.com\/?post_type=resource&#038;p=15961"},"modified":"2023-10-09T16:48:26","modified_gmt":"2023-10-09T14:48:26","slug":"whats-the-difference-between-quantum-cryptography-and-quantum-resistant-cryptography","status":"publish","type":"resource","link":"https:\/\/www.thegreenbow.com\/en\/ressource\/blog-en\/whats-the-difference-between-quantum-cryptography-and-quantum-resistant-cryptography\/","title":{"rendered":"What\u2019s the difference between quantum cryptography and quantum-resistant cryptography?"},"content":{"rendered":"\n<div class=\"wp-block-ch-resource-content alignfull\">\n<p><strong>Author: Arnaud DUFOURNET<\/strong>, Chief Marketing Officer<\/p>\n\n\n\n<p>In July 2023, Gartner published its most recent \u201c<a href=\"https:\/\/www.gartner.com\/doc\/reprints?id=1-2ELCN9T4&amp;ct=230731&amp;st=sb&amp;__hstc=263988819.1f032c66de8b9cb134f2d5b1cdea086b.1693382619821.1693382619821.1693382619821.1&amp;__hssc=263988819.3.1693382619821&amp;__hsfp=1187055526&amp;hsCtaTracking=417c1705-55cb-4040-bfd4-a82447a200ab%7Cef1745c5-22c7-4db3-83d4-4f015d56ae42#cppdip.791821\">Hype Cycle<\/a>\u201d for data security, the key feature of which is a graph showing the maturity and take-up of technologies and applications in the field of data security. Highly promising technologies in the mid- to long-term, meaning the next two to five years, include post-quantum cryptography and quantum cryptography (also called quantum key distribution). Post-quantum cryptography (PQC) and quantum cryptography (a.k.a. quantum key distribution, QKD)&nbsp; are two concepts that are often confused. Gartner\u2019s article is an opportunity to reiterate the main differences between these two technologies and the uses to which they can be put.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong><strong>Quantum cryptography or QKD<\/strong><\/strong><\/h2>\n\n\n\n<p>Let\u2019s start with the oldest technology of the pair. Invented by American Charles Bennett and Canadian Gilles Brassard in 1984, quantum cryptography is based on the principle of QKD, which involves exchanging encryption keys, these being generally symmetrical, by optical means (terrestrial, free space, or satellite link). This means of communication is essentially tamper-proof, because it exploits a basic principle of quantum mechanics, namely particle entanglement (typically photons). Any attempt to interfere with the transmission chain generates a disturbance which is immediately detected by the communication protocol, bringing the communication to an instant halt. This aspect is obviously the main benefit of this technology.<\/p>\n\n\n\n<div class=\"wp-block-media-text alignwide is-stacked-on-mobile\" style=\"grid-template-columns:43% auto\"><figure class=\"wp-block-media-text__media\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"574\" src=\"https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2023\/09\/Telecommunication-network_lite-1024x574.jpg\" alt=\"\" class=\"wp-image-15967 size-full\" srcset=\"https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2023\/09\/Telecommunication-network_lite-1024x574.jpg 1024w, https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2023\/09\/Telecommunication-network_lite-300x168.jpg 300w, https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2023\/09\/Telecommunication-network_lite-768x430.jpg 768w, https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2023\/09\/Telecommunication-network_lite-1536x861.jpg 1536w, https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2023\/09\/Telecommunication-network_lite-2048x1148.jpg 2048w, https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2023\/09\/Telecommunication-network_lite-100x56.jpg 100w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure><div class=\"wp-block-media-text__content\">\n<p>While it will be a vital component in any future quantum internet, it nevertheless has several major drawbacks. The first limitation is that it requires a new physical network, one dedicated to this means of communication alone. Furthermore, it is difficult to extend quantum networks over large distances.<\/p>\n<\/div><\/div>\n\n\n\n<p><\/p>\n\n\n\n<p>While it will be a vital component in any future quantum internet, it nevertheless has several major drawbacks. The first limitation is that it requires a new physical network, one dedicated to this means of communication alone. Furthermore, it is difficult to extend quantum networks over large distances.<\/p>\n\n\n\n<p>Although much progress has been made since it first emerged (the first fiber-optic transmission in 1989 had a range of just 30&nbsp;cm), the new record set by a Swiss company, <a href=\"https:\/\/www.businesswire.com\/news\/home\/20230615710544\/en\/Terra-Quantum-Breaks-Records-in-Quantum-Key-Distribution-Paving-Way-to-Offering-Unprecedented-Security-Over-Existing-Fiber-optic-Networks-Globally\">Terra Quantum<\/a>, is just over 1,000 kilometers.&nbsp; \u201cAchieving QKD over long distances requires trusted quantum repeaters to be set up between two terminal points, which increases the infrastructure to be managed,\u201d as G\u00e9r\u00f4me Billois told us when we were writing <a href=\"https:\/\/www.thegreenbow.com\/en\/ressource\/ebook\/cryptography-at-the-core-of-the-quantum-revolution\/\">TheGreenBow white paper<\/a> entitled \u201cCryptography at the core of the quantum revolution.\u201d A final significant drawback is that quantum key distribution does not enable the sending source to be authenticated, therefore requiring the addition of post-quantum cryptography mechanisms.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong><strong>Post-quantum cryptography or PQC<\/strong><\/strong><\/h2>\n\n\n\n<p>The aim of post-quantum cryptography, or quantum-resistant cryptography, is encryption that can resist attacks by quantum computers capable of running the Shor and Grover algorithms (see our article \u201c<a href=\"https:\/\/www.thegreenbow.com\/en\/ressource\/blog-en\/post-quantum-cryptography-why-should-we-be-concerned-now\/\">Post-quantum cryptography: why should we be concerned now?<\/a>\u201d). Some see this technology as competing with quantum cryptography, while others see the pair as dovetailing together. Quantum-resistant cryptography consists of algorithms based on new mathematical problems (Euclidean lattices, error-correcting codes [ECC], multivariate polynomial inversion, etc.) and it is intended to replace existing asymmetrical key algorithms such as Diffie-Hellman, RSA, and elliptic-curve cryptography (ECC), reckoned to be vulnerable to quantum attacks.<\/p>\n\n\n\n<div class=\"wp-block-media-text alignwide has-media-on-the-right is-stacked-on-mobile\" style=\"grid-template-columns:auto 38%\"><div class=\"wp-block-media-text__content\">\n<p>This spurred the National Institute of Standards and Technology (NIST) to initiate a competition in 2016 calling on the international cryptography community to submit candidate algorithms. In July 2022, the third round of evaluation and analysis resulted in the selection of four algorithms (one for encryption and three for electronic signatures) whose implementation standards will be published in April 2024.<\/p>\n<\/div><figure class=\"wp-block-media-text__media\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"683\" src=\"https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2023\/09\/Cryptographie-Quantique_lite-2-1024x683.jpg\" alt=\"\" class=\"wp-image-16019 size-full\" srcset=\"https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2023\/09\/Cryptographie-Quantique_lite-2-1024x683.jpg 1024w, https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2023\/09\/Cryptographie-Quantique_lite-2-300x200.jpg 300w, https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2023\/09\/Cryptographie-Quantique_lite-2-768x512.jpg 768w, https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2023\/09\/Cryptographie-Quantique_lite-2-1536x1024.jpg 1536w, https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2023\/09\/Cryptographie-Quantique_lite-2-2048x1365.jpg 2048w, https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2023\/09\/Cryptographie-Quantique_lite-2-100x67.jpg 100w, https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2023\/09\/Cryptographie-Quantique_lite-2-301x201.jpg 301w, https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2023\/09\/Cryptographie-Quantique_lite-2-343x229.jpg 343w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure><\/div>\n\n\n\n<p>The big difference compared with QKD is that PQC can be deployed over existing security infrastructure, and so can provide a response now to a threat that exists now, namely Harvest Now Decrypt Later attacks, which entail grabbing sensitive data with a long lifespan in the present, with a view to decryption in a few years\u2019 time using a quantum computer. As a consequence, major security agencies around the world (CISA [USA], ENISA [EU], ANSSI [France], NCSC [UK], BSI [Germany], and others) strongly recommend that businesses and governments migrate to this new cryptography as soon as possible.<\/p>\n\n\n\n<p>Doing so is a long job (see our blog post \u201c<a href=\"https:\/\/www.thegreenbow.com\/en\/ressource\/blog-en\/migrating-to-quantum-resistant-cryptography-why-you-should-start-now\/\" target=\"_blank\" rel=\"noreferrer noopener\">Migrating to quantum-resistant cryptography: why you should start now<\/a>\u201d) considering the omnipresence of RSA and Diffie-Hellman keys in our daily data interchange. Past experience has shown that it often takes a good decade to migrate systems (software, equipment, and associated services). In the financial sector for instance, as readers might recall, the migration away from MD5 (Message Digest&nbsp;5), a cryptographic hash function, took more than ten years to complete after this algorithm was deemed vulnerable in 2008. Hence the need to plan and begin the migration to quantum-resistant cryptography as quickly as possible.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>PQC vs QKD: what security agencies recommend<\/strong><\/h2>\n\n\n\n<p>Being tamper-proof, QKD is proving promising for protecting highly sensitive communications, such as military communications. However, QKD does not yet constitute an alternative to current cryptography, particularly that based on RSA keys. It requires new infrastructure that will be costly to maintain, and it operates over distances that are still too short to meet practical needs, all of which significantly restricts its use cases. The USA\u2019s National Security Agency (NSA) has pointed out as much, adding a further drawback to QKD by explaining that it increases the risk of denial of service attacks. The NSA describes how, given that confidentiality is based on the principle that if a communication is eavesdropped upon, then the interference caused instantly brings the communication to a halt, cyber attackers can consequently prevent communications merely by causing repeated disruption in this way. The NSA also sees quantum-resistant cryptography as a cheaper solution that is easier to maintain. For all these reasons, the NSA asks that PQC be the option implemented first so as to protect communications. Similarly, neither France\u2019s cybersecurity agency ANSSI (read its position paper \u201c<a href=\"https:\/\/www.ssi.gouv.fr\/publication\/should-quantum-key-distribution-be-used-for-secure-communications\/\">Should Quantum Key Distribution be used for secure connections?<\/a>\u201d) nor its British counterpart, the NCSC (see the white paper on \u201c<a href=\"https:\/\/www.ncsc.gov.uk\/whitepaper\/quantum-security-technologies\">Quantum security technologies<\/a>\u201d) recommend using quantum cryptography to keep access to information systems secure.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n\n\n  <section  class=\"wp-block-acf-linked-pages  section-content linked-pages-section\"  itemprop=\"hasPart\" itemscope itemtype=\"https:\/\/schema.org\/WebPageElement\">\n    <div class=\"grid-container\">\n     <div class=\"grid-x grid-padding-x align-center mobile-slider\">\n                <div class=\"cell medium-4 article\">\n            <div class=\"wrapper\">\n              \n                              <a  href=\"https:\/\/www.thegreenbow.com\/en\/ressource\/migration-to-quantum-resistant-cryptography\/\" >\n\n                                          <figure>\n                        <img decoding=\"async\"  data-fade-in loading=\"lazy\" src=\"data:image\/png;base64,R0lGODlhAQABAAD\/ACwAAAAAAQABAAACADs=\" data-lazy-interchange=\"[https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2023\/08\/post-Cybernews-727x486.jpg, small], [https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2023\/08\/post-Cybernews-301x201.jpg, medium], [https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2023\/08\/post-Cybernews-343x229.jpg, large], [https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2023\/08\/post-Cybernews-1454x972.jpg, retina], [https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2023\/08\/post-Cybernews-602x402.jpg, medium_retina], [https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2023\/08\/post-Cybernews-686x458.jpg, large_retina]\" data-interchange-sizes=\"{&quot;small&quot;:{&quot;w&quot;:727,&quot;h&quot;:486},&quot;medium&quot;:{&quot;w&quot;:301,&quot;h&quot;:201},&quot;large&quot;:{&quot;w&quot;:343,&quot;h&quot;:229},&quot;retina&quot;:{&quot;w&quot;:1454,&quot;h&quot;:972},&quot;medium_retina&quot;:{&quot;w&quot;:602,&quot;h&quot;:402},&quot;large_retina&quot;:{&quot;w&quot;:686,&quot;h&quot;:458}}\"  alt=\"What\u2019s the difference between quantum cryptography and quantum-resistant cryptography?\" itemprop=\"image\" data-fade-in \/>\n                      <\/figure>\n                    \n                                      <h4 class=\"block-title\">Migration to quantum-resistant cryptography<\/h4>\n                  \n                  \n                <\/a>\n              \n            <\/div>\n          <\/div>\n\n                  <div class=\"cell medium-4 article\">\n            <div class=\"wrapper\">\n              \n                              <a  href=\"https:\/\/www.thegreenbow.com\/en\/ressource\/ebook\/cryptography-at-the-core-of-the-quantum-revolution\/\" >\n\n                                          <figure>\n                        <img decoding=\"async\"  data-fade-in loading=\"lazy\" src=\"data:image\/png;base64,R0lGODlhAQABAAD\/ACwAAAAAAQABAAACADs=\" data-lazy-interchange=\"[https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2023\/09\/ebook-Quantum-resistant-Cryptography-EN-.jpg-595x398.png, small], [https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2023\/09\/ebook-Quantum-resistant-Cryptography-EN-.jpg-301x201.png, medium], [https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2023\/09\/ebook-Quantum-resistant-Cryptography-EN-.jpg-343x229.png, large], [https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2023\/09\/ebook-Quantum-resistant-Cryptography-EN-.jpg-595x398.png, retina], [https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2023\/09\/ebook-Quantum-resistant-Cryptography-EN-.jpg-595x397.png, medium_retina]\" data-interchange-sizes=\"{&quot;small&quot;:{&quot;w&quot;:595,&quot;h&quot;:398},&quot;medium&quot;:{&quot;w&quot;:301,&quot;h&quot;:201},&quot;large&quot;:{&quot;w&quot;:343,&quot;h&quot;:229},&quot;retina&quot;:{&quot;w&quot;:595,&quot;h&quot;:398},&quot;medium_retina&quot;:{&quot;w&quot;:595,&quot;h&quot;:397},&quot;large_retina&quot;:{&quot;w&quot;:595,&quot;h&quot;:397}}\"  alt=\"What\u2019s the difference between quantum cryptography and quantum-resistant cryptography?\" itemprop=\"image\" data-fade-in \/>\n                      <\/figure>\n                    \n                                      <h4 class=\"block-title\">Cryptography at the core of the Quantum revolution<\/h4>\n                  \n                  \n                <\/a>\n              \n            <\/div>\n          <\/div>\n\n                  <div class=\"cell medium-4 article\">\n            <div class=\"wrapper\">\n              \n                              <a  href=\"https:\/\/www.thegreenbow.com\/en\/ressource\/blog-en\/migrating-to-quantum-resistant-cryptography-why-you-should-start-now\/\" >\n\n                                          <figure>\n                        <img decoding=\"async\"  data-fade-in loading=\"lazy\" src=\"data:image\/png;base64,R0lGODlhAQABAAD\/ACwAAAAAAQABAAACADs=\" data-lazy-interchange=\"[https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2023\/07\/Start_lite-scaled-727x486.jpg, small], [https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2023\/07\/Start_lite-301x201.jpg, medium], [https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2023\/07\/Start_lite-343x229.jpg, large], [https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2023\/07\/Start_lite-scaled-1454x972.jpg, retina], [https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2023\/07\/Start_lite-scaled-602x402.jpg, medium_retina], [https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2023\/07\/Start_lite-scaled-686x458.jpg, large_retina]\" data-interchange-sizes=\"{&quot;small&quot;:{&quot;w&quot;:727,&quot;h&quot;:486},&quot;medium&quot;:{&quot;w&quot;:301,&quot;h&quot;:201},&quot;large&quot;:{&quot;w&quot;:343,&quot;h&quot;:229},&quot;retina&quot;:{&quot;w&quot;:1454,&quot;h&quot;:972},&quot;medium_retina&quot;:{&quot;w&quot;:602,&quot;h&quot;:402},&quot;large_retina&quot;:{&quot;w&quot;:686,&quot;h&quot;:458}}\"  alt=\"What\u2019s the difference between quantum cryptography and quantum-resistant cryptography?\" itemprop=\"image\" data-fade-in \/>\n                      <\/figure>\n                    \n                                      <h4 class=\"block-title\">Migrating to PQC: why you should start now<\/h4>\n                  \n                  \n                <\/a>\n              \n            <\/div>\n          <\/div>\n\n        \n\t\t<\/div>\n    <\/div>\n  <\/section>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n<\/div>\n","protected":false},"featured_media":15963,"template":"","meta":{"_acf_changed":false,"resource_type":"internal"},"resource_category":[342],"class_list":["post-15961","resource","type-resource","status-publish","has-post-thumbnail","hentry","resource_category-blog-en"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>What\u2019s the difference between quantum cryptography and quantum-resistant cryptography? - TheGreenBow<\/title>\n<meta name=\"description\" content=\"PQC and QKD are two concepts that are often confused. Discover in this article, the main diff\u00e9rences between these two groundbreaking technologies.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.thegreenbow.com\/en\/ressource\/blog-en\/whats-the-difference-between-quantum-cryptography-and-quantum-resistant-cryptography\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What\u2019s the difference between quantum cryptography and quantum-resistant cryptography? - TheGreenBow\" \/>\n<meta property=\"og:description\" content=\"PQC and QKD are two concepts that are often confused. Discover in this article, the main diff\u00e9rences between these two groundbreaking technologies.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.thegreenbow.com\/en\/ressource\/blog-en\/whats-the-difference-between-quantum-cryptography-and-quantum-resistant-cryptography\/\" \/>\n<meta property=\"og:site_name\" content=\"TheGreenBow\" \/>\n<meta property=\"article:modified_time\" content=\"2023-10-09T14:48:26+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2023\/09\/Cryptographie-Quantique_lite-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1707\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@thegreenbow\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.thegreenbow.com\\\/en\\\/ressource\\\/blog-en\\\/whats-the-difference-between-quantum-cryptography-and-quantum-resistant-cryptography\\\/\",\"url\":\"https:\\\/\\\/www.thegreenbow.com\\\/en\\\/ressource\\\/blog-en\\\/whats-the-difference-between-quantum-cryptography-and-quantum-resistant-cryptography\\\/\",\"name\":\"What\u2019s the difference between quantum cryptography and quantum-resistant cryptography? - TheGreenBow\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.thegreenbow.com\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.thegreenbow.com\\\/en\\\/ressource\\\/blog-en\\\/whats-the-difference-between-quantum-cryptography-and-quantum-resistant-cryptography\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.thegreenbow.com\\\/en\\\/ressource\\\/blog-en\\\/whats-the-difference-between-quantum-cryptography-and-quantum-resistant-cryptography\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.thegreenbow.com\\\/wp-content\\\/uploads\\\/2023\\\/09\\\/Cryptographie-Quantique_lite-scaled.jpg\",\"datePublished\":\"2023-10-05T07:55:30+00:00\",\"dateModified\":\"2023-10-09T14:48:26+00:00\",\"description\":\"PQC and QKD are two concepts that are often confused. Discover in this article, the main diff\u00e9rences between these two groundbreaking technologies.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.thegreenbow.com\\\/en\\\/ressource\\\/blog-en\\\/whats-the-difference-between-quantum-cryptography-and-quantum-resistant-cryptography\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.thegreenbow.com\\\/en\\\/ressource\\\/blog-en\\\/whats-the-difference-between-quantum-cryptography-and-quantum-resistant-cryptography\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.thegreenbow.com\\\/en\\\/ressource\\\/blog-en\\\/whats-the-difference-between-quantum-cryptography-and-quantum-resistant-cryptography\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.thegreenbow.com\\\/wp-content\\\/uploads\\\/2023\\\/09\\\/Cryptographie-Quantique_lite-scaled.jpg\",\"contentUrl\":\"https:\\\/\\\/www.thegreenbow.com\\\/wp-content\\\/uploads\\\/2023\\\/09\\\/Cryptographie-Quantique_lite-scaled.jpg\",\"width\":2560,\"height\":1707},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.thegreenbow.com\\\/en\\\/ressource\\\/blog-en\\\/whats-the-difference-between-quantum-cryptography-and-quantum-resistant-cryptography\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.thegreenbow.com\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Blog\",\"item\":\"https:\\\/\\\/www.thegreenbow.com\\\/en\\\/resources\\\/blog-en\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"What\u2019s the difference between quantum cryptography and quantum-resistant cryptography?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.thegreenbow.com\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.thegreenbow.com\\\/en\\\/\",\"name\":\"TheGreenBow\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.thegreenbow.com\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.thegreenbow.com\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.thegreenbow.com\\\/en\\\/#organization\",\"name\":\"TheGreenBow\",\"url\":\"https:\\\/\\\/www.thegreenbow.com\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.thegreenbow.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.thegreenbow.com\\\/wp-content\\\/uploads\\\/2021\\\/04\\\/Logotype@2x-min.png\",\"contentUrl\":\"https:\\\/\\\/www.thegreenbow.com\\\/wp-content\\\/uploads\\\/2021\\\/04\\\/Logotype@2x-min.png\",\"width\":422,\"height\":84,\"caption\":\"TheGreenBow\"},\"image\":{\"@id\":\"https:\\\/\\\/www.thegreenbow.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/thegreenbow\",\"https:\\\/\\\/fr.linkedin.com\\\/company\\\/thegreenbow\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCZKtI7_fmgFcmovgGSy8AnQ\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What\u2019s the difference between quantum cryptography and quantum-resistant cryptography? - TheGreenBow","description":"PQC and QKD are two concepts that are often confused. Discover in this article, the main diff\u00e9rences between these two groundbreaking technologies.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.thegreenbow.com\/en\/ressource\/blog-en\/whats-the-difference-between-quantum-cryptography-and-quantum-resistant-cryptography\/","og_locale":"en_US","og_type":"article","og_title":"What\u2019s the difference between quantum cryptography and quantum-resistant cryptography? - TheGreenBow","og_description":"PQC and QKD are two concepts that are often confused. Discover in this article, the main diff\u00e9rences between these two groundbreaking technologies.","og_url":"https:\/\/www.thegreenbow.com\/en\/ressource\/blog-en\/whats-the-difference-between-quantum-cryptography-and-quantum-resistant-cryptography\/","og_site_name":"TheGreenBow","article_modified_time":"2023-10-09T14:48:26+00:00","og_image":[{"width":2560,"height":1707,"url":"https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2023\/09\/Cryptographie-Quantique_lite-scaled.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_site":"@thegreenbow","twitter_misc":{"Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.thegreenbow.com\/en\/ressource\/blog-en\/whats-the-difference-between-quantum-cryptography-and-quantum-resistant-cryptography\/","url":"https:\/\/www.thegreenbow.com\/en\/ressource\/blog-en\/whats-the-difference-between-quantum-cryptography-and-quantum-resistant-cryptography\/","name":"What\u2019s the difference between quantum cryptography and quantum-resistant cryptography? - TheGreenBow","isPartOf":{"@id":"https:\/\/www.thegreenbow.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.thegreenbow.com\/en\/ressource\/blog-en\/whats-the-difference-between-quantum-cryptography-and-quantum-resistant-cryptography\/#primaryimage"},"image":{"@id":"https:\/\/www.thegreenbow.com\/en\/ressource\/blog-en\/whats-the-difference-between-quantum-cryptography-and-quantum-resistant-cryptography\/#primaryimage"},"thumbnailUrl":"https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2023\/09\/Cryptographie-Quantique_lite-scaled.jpg","datePublished":"2023-10-05T07:55:30+00:00","dateModified":"2023-10-09T14:48:26+00:00","description":"PQC and QKD are two concepts that are often confused. Discover in this article, the main diff\u00e9rences between these two groundbreaking technologies.","breadcrumb":{"@id":"https:\/\/www.thegreenbow.com\/en\/ressource\/blog-en\/whats-the-difference-between-quantum-cryptography-and-quantum-resistant-cryptography\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.thegreenbow.com\/en\/ressource\/blog-en\/whats-the-difference-between-quantum-cryptography-and-quantum-resistant-cryptography\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.thegreenbow.com\/en\/ressource\/blog-en\/whats-the-difference-between-quantum-cryptography-and-quantum-resistant-cryptography\/#primaryimage","url":"https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2023\/09\/Cryptographie-Quantique_lite-scaled.jpg","contentUrl":"https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2023\/09\/Cryptographie-Quantique_lite-scaled.jpg","width":2560,"height":1707},{"@type":"BreadcrumbList","@id":"https:\/\/www.thegreenbow.com\/en\/ressource\/blog-en\/whats-the-difference-between-quantum-cryptography-and-quantum-resistant-cryptography\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.thegreenbow.com\/en\/"},{"@type":"ListItem","position":2,"name":"Blog","item":"https:\/\/www.thegreenbow.com\/en\/resources\/blog-en\/"},{"@type":"ListItem","position":3,"name":"What\u2019s the difference between quantum cryptography and quantum-resistant cryptography?"}]},{"@type":"WebSite","@id":"https:\/\/www.thegreenbow.com\/en\/#website","url":"https:\/\/www.thegreenbow.com\/en\/","name":"TheGreenBow","description":"","publisher":{"@id":"https:\/\/www.thegreenbow.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.thegreenbow.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.thegreenbow.com\/en\/#organization","name":"TheGreenBow","url":"https:\/\/www.thegreenbow.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.thegreenbow.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2021\/04\/Logotype@2x-min.png","contentUrl":"https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2021\/04\/Logotype@2x-min.png","width":422,"height":84,"caption":"TheGreenBow"},"image":{"@id":"https:\/\/www.thegreenbow.com\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/thegreenbow","https:\/\/fr.linkedin.com\/company\/thegreenbow","https:\/\/www.youtube.com\/channel\/UCZKtI7_fmgFcmovgGSy8AnQ"]}]}},"_links":{"self":[{"href":"https:\/\/www.thegreenbow.com\/en\/wp-json\/wp\/v2\/resource\/15961","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.thegreenbow.com\/en\/wp-json\/wp\/v2\/resource"}],"about":[{"href":"https:\/\/www.thegreenbow.com\/en\/wp-json\/wp\/v2\/types\/resource"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.thegreenbow.com\/en\/wp-json\/wp\/v2\/media\/15963"}],"wp:attachment":[{"href":"https:\/\/www.thegreenbow.com\/en\/wp-json\/wp\/v2\/media?parent=15961"}],"wp:term":[{"taxonomy":"resource_category","embeddable":true,"href":"https:\/\/www.thegreenbow.com\/en\/wp-json\/wp\/v2\/resource_category?post=15961"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}