Skip to content
Encryptorium

Blog

Articles on post-quantum cryptography, standards, and the transition to quantum-safe systems.

Quantum-safe Bitcoin transactions without a soft fork: what the QSB paper actually says

StarkWare's QSB paper shows a quantum-safe way to spend legacy Bitcoin outputs with no soft fork. Here are the honest numbers and the five things it still cannot fix.

PQC Migration Plans Have a ZK Blind Spot

Major PQC migration documents from NIST, NCSC, and the EU omit zero-knowledge verification infrastructure. That gap leaves deployed ZK stacks unaccounted for.

Google's quantum threat to Bitcoin: what the paper actually says

A new Google Quantum AI paper shows that breaking Bitcoin's elliptic curve signatures could require fewer than 500,000 physical qubits, roughly a 20x reduction from prior estimates. The result is real. The panic is not.

Why organizations need a cryptographic bill of materials for PQC migration

You cannot migrate what you cannot see. CycloneDX's CBOM capability provides the foundation for post-quantum migration planning, starting with an inventory of every algorithm, key, and certificate.

PQ/T hybrid schemes: bridging traditional and post-quantum cryptography

PQ/T hybrid schemes combine traditional and post-quantum algorithms to manage migration risk. When to use them, the overhead, and why they are an interim step.

ML-KEM explained: NIST's new standard for post-quantum key establishment

ML-KEM (FIPS 203) is NIST's standard KEM for post-quantum key establishment. This post covers the MLWE hardness assumption, parameter set tradeoffs, and TLS 1.3 hybrid deployment.

Post-quantum cryptography: what it is and why migration starts now

An introduction to post-quantum cryptography: what it is, why today's public-key cryptography is at risk, and what NIST's new standards mean for secure communication.

Post-quantum ZK is an architecture problem

Post-quantum migration for ZK proof systems is an architecture problem, not a parameter-tuning problem. A four-layer framework for analyzing where quantum-vulnerable assumptions sit in a proving stack, applied to Zcash, ZKsync Era, and Starknet.

Crypto agility: designing systems that survive broken cryptography

Crypto agility is the ability to swap cryptographic primitives without redesigning systems. What it requires in practice, and why the PQC transition demands it.