Post-Quantum Cryptography Explained

Quantum computing poses a growing threat to today’s cryptography. Widely deployed systems such as RSA and elliptic-curve cryptography, used in TLS, VPNs, software updates, and digital signatures, are expected to become vulnerable when and if large-scale quantum computers arrive.

This video series provides a practical, non-mathematical introduction to post-quantum cryptography (PQC) for security engineers, security architects, and technical decision-makers. You’ll learn what quantum computers can actually do, why current cryptographic systems are at risk, and how quantum-safe algorithms address these challenges.

The course focuses on real-world impact and deployment, including NIST’s post-quantum standards, lattice-based cryptography (such as Kyber and Dilithium), hybrid systems, and migration strategies. Because post-quantum cryptography is a fast-moving field, the videos will be continuously updated to reflect new standards, best practices, and practical guidance as the landscape evolves.


YouTube Lectures

Full Playlist

7. PQC migration timelines

8. PQC software

9. PQC deployments

12. ML-DSA (Dilithium) explained [coming soon….]

13. Hash-based signature schemes [coming soon….]

More to come….


Additional Material

Lecture slides
  1. Overview
  2. Quantum computers
  3. The quantum threat: primitives
  4. The quantum threat: protocols
  5. Quantum-safe cryptography
  6. PQC standards
  7. PQC migration timelines
  8. PQC software
  9. PQC deployments