Privacy guide · Pillar · 2026 · 05 · 16

What Is Post-Quantum Cryptography? A 2026 Guide for Anyone Who Cares About Privacy

The plain-English guide to one of the most important — and most misunderstood — shifts happening in internet security right now. What post-quantum cryptography actually is, why it matters this decade rather than next, and what to look for in a future-ready VPN.

By the StandVPN team · ~ 16 min read · Updated May 16, 2026
TL;DR — The Short Answer

Post-quantum cryptography (PQC) is a new family of encryption algorithms designed to remain secure even when powerful quantum computers eventually exist. Today's encryption protects most of the internet, but it's based on math problems that a sufficiently advanced quantum computer could one day solve. The threat that matters today is called "harvest now, decrypt later" — adversaries capturing encrypted traffic right now to decrypt years from now. In response, the U.S. National Institute of Standards and Technology finalized three post-quantum standards in 2024, and companies like Apple, Signal, Google, Cloudflare, and Mullvad have already deployed PQC in production. StandVPN is built PQC-ready on every connection, including the lifetime free plan.

Jump to a section
  1. Why this matters now
  2. A simple analogy — the padlock
  3. What post-quantum cryptography actually is
  4. "Harvest now, decrypt later"
  5. When quantum computers might arrive
  6. The new NIST standards
  7. The four math families of PQC
  8. Hybrid mode — belt and suspenders
  9. Who has already deployed PQC
  10. What PQC means for a VPN specifically
  11. Government and standards bodies
  12. Five myths about post-quantum cryptography
  13. How to evaluate a PQC-ready VPN
  14. How StandVPN handles PQC
  15. Frequently asked questions

If you've come across the phrase "post-quantum cryptography" in a news article, a software update note, or a VPN comparison and wondered what exactly it means and whether it matters to you — this is the guide for you. Written in plain English, with real examples, by people who care about getting it right.

We won't pretend this is a topic with no nuance. It isn't. But the central ideas are accessible to anyone, and understanding them will change how you think about the encryption that runs almost every interaction you have online.

Why this matters now (not in ten years)

QUICK ANSWER The internet is in the middle of a quiet but historic upgrade — the first major change to how online encryption works in over twenty years. The reason is the rise of quantum computing, which will eventually be able to break much of the encryption protecting the internet today. The work to replace it is happening now because it takes years to roll out a new standard safely.

Here is a fact that surprises most people the first time they hear it: almost all sensitive traffic on the internet today is protected by a small number of cryptographic algorithms designed in the 1970s. RSA. Diffie-Hellman. Elliptic-curve variants of those. They have been adjusted, hardened, and re-implemented many times, but the underlying mathematics is from another era of computing.

Those algorithms have aged remarkably well. For half a century, they have resisted every serious attack that classical computers have thrown at them. The encryption that protects your bank login, your medical records, your encrypted messages, and your VPN tunnel rests on a small set of math problems that classical computers simply cannot solve in any reasonable amount of time.

The thing that changes the picture is quantum computing. A quantum computer is not just a faster classical computer; it is a fundamentally different kind of machine that can solve certain problems exponentially faster than any classical computer ever could. And as it turns out, several of those problems are exactly the ones that today's most common encryption algorithms rely on for their security.

That is why this matters now. The encryption that protects the internet was designed without quantum computers in mind. Replacing it is a generational engineering project, and it is well underway.

A simple analogy — the padlock

Forget the math for a moment. Imagine you are sending a small box across a long, unsafe journey. Anyone on the route can pick the box up, but they cannot open it without the key.

Today's internet uses a kind of digital padlock that requires solving a hard puzzle to open without the key. The puzzle is so hard that, with the best classical computers humanity has ever built, breaking the padlock would take longer than the age of the universe. So your box arrives safely.

A quantum computer is a new kind of puzzle-solver that, in theory, could open this particular padlock in hours instead of trillions of years. Quantum computers powerful enough to actually do this don't exist yet — but researchers are building them.

Post-quantum cryptography is a new family of padlocks, designed to resist this new kind of puzzle-solver. The puzzles are based on different math — math that researchers believe both classical and quantum computers will still find very hard to solve.

That is the whole story, in one paragraph. The rest is detail.

What post-quantum cryptography actually is

QUICK ANSWER Post-quantum cryptography (PQC) is a set of encryption and digital-signature algorithms built on mathematical problems that are believed to be hard for both classical and quantum computers. Unlike "quantum cryptography" (which uses quantum physics directly), PQC runs on the regular computers we already have.

Two terms get confused in casual reading. Let's keep them straight.

Post-quantum cryptography is, in other words, the kind of fix the internet can actually deploy at scale. No new hardware. No specialized hardware. Just better math.

"Harvest now, decrypt later" — the threat that matters today

QUICK ANSWER Harvest now, decrypt later (HNDL) is the practice of capturing encrypted internet traffic today and storing it for future decryption once quantum computers become powerful enough. It is treated as a real, ongoing threat by major governments and security companies — not a theoretical one. It is the central reason post-quantum cryptography matters this decade, not next.

The most common misunderstanding about post-quantum cryptography is the idea that it only matters once quantum computers exist. That is wrong, and the reason is a deceptively simple pattern called "harvest now, decrypt later", sometimes abbreviated HNDL or "store now, decrypt later".

Here is the pattern in one sentence: capture the encrypted data today, store it, decrypt it when quantum computers are ready, even if that's ten or fifteen years from now.

This isn't a theoretical concern. The U.S. government, the European Union, and major intelligence services in friendly and unfriendly nations alike are widely understood to be doing exactly this — vacuuming up encrypted traffic for archival. The Federal Reserve has published research on HNDL risk. The U.S. National Security Agency has explicitly warned about it. Major cybersecurity vendors treat it as a routine part of their threat modeling.

The data that matters most under this threat model isn't the trivial. It's anything that will still be sensitive in ten or twenty years: medical records, financial histories, government cables, journalist-source communications, business strategy, intellectual property, personal photos and messages, identity documents. The encrypted version sits in some archive somewhere right now. The decrypted version, eventually, will be readable.

This is why the rollout of post-quantum cryptography is happening today, ahead of the threat. The encryption you use this year is protecting traffic against attackers who will have quantum computers years from now. The earlier the upgrade, the more of your past traffic remains permanently safe.

When quantum computers might actually arrive

QUICK ANSWER Today's quantum computers have hundreds to a few thousand physical qubits. Breaking the most common public-key encryption would require millions of error-corrected qubits. Mainstream expert estimates put the arrival of cryptographically relevant quantum computers between the early 2030s and the mid-2040s — but the work to replace today's encryption needs to happen years ahead of that.

Let's be honest about the timeline, because exaggerating it serves nobody.

Quantum computers exist today, in real labs, doing real work. IBM has built quantum processors with more than a thousand physical qubits. Companies including Google, IonQ, Quantinuum, and Atom Computing all run real machines. They are remarkable engineering achievements.

They are also, as of today, nowhere close to breaking RSA-2048 or the elliptic-curve cryptography that protects most of the internet. The reason is error correction. Quantum bits are extremely fragile, and one logical qubit — the kind you can actually do cryptographic work with — requires hundreds or thousands of physical qubits. Breaking modern encryption is estimated to need millions of error-corrected logical qubits, which means tens or hundreds of millions of physical qubits.

Mainstream expert estimates for when a cryptographically relevant quantum computer (CRQC) will exist:

Reasonable people disagree about the exact year. But almost everyone in the field agrees on two things: it will eventually happen, and the upgrade to post-quantum cryptography needs to happen well before it does, because rolling out new cryptography across the entire internet takes years.

The new NIST standards — the 2024 milestone

QUICK ANSWER In August 2024, the U.S. National Institute of Standards and Technology (NIST) finalized the first three post-quantum standards: FIPS 203 (ML-KEM, for key exchange), FIPS 204 (ML-DSA, for digital signatures), and FIPS 205 (SLH-DSA, a backup signature scheme). These standards define what "post-quantum-ready" means in practice.

If post-quantum cryptography has felt fuzzy until now — a vague future thing — the reason it suddenly became concrete in 2024 is the finalization of formal standards. Standards are how the internet moves as a whole, not in pieces.

The body that did the work is the U.S. National Institute of Standards and Technology (NIST), which has run public competitions to standardize cryptography since the 1970s. AES — the symmetric encryption that protects most of the data on the internet today — came out of a NIST competition. SHA-2 and SHA-3 came out of NIST processes. NIST's PQC competition was started in 2016 and ran for eight years.

In August 2024, NIST finalized three post-quantum standards:

A fourth algorithm, FN-DSA (formerly Falcon), is expected to be finalized soon. NIST is also running a fourth round to standardize HQC (a code-based algorithm) as an additional backup for key encapsulation.

What you should remember: the standards exist, the competition has finished, the math has been vetted by years of public cryptanalysis, and major implementations are now rolling out.

The four math families of post-quantum cryptography

The candidates in the NIST competition came from four broad mathematical families. You don't need to know the math, but knowing the names lets you read tech-news articles without feeling lost.

FamilyBased onNIST-standardized examples
Lattice-based Hard problems on geometric lattices in many dimensions ML-KEM, ML-DSA, FN-DSA
Hash-based The security of cryptographic hash functions (very well understood) SLH-DSA
Code-based Error-correcting codes; the basis of Classic McEliece (which Mullvad uses) HQC (in fourth round)
Multivariate Systems of multivariate polynomial equations None (broken during competition)

Lattice-based schemes have emerged as the practical default — they're fast, the keys aren't huge, and decades of mathematical study back them. Hash-based schemes are slower with larger signatures, but they are based on the most well-understood mathematical primitive in cryptography, so they're kept as conservative backups.

Hybrid mode — the belt-and-suspenders approach

QUICK ANSWER Most early post-quantum deployments use a hybrid mode that combines a classical algorithm and a post-quantum algorithm in the same handshake. The connection stays secure as long as either algorithm holds up. This protects against quantum attacks AND against the small chance that a flaw is later discovered in the new post-quantum math.

One of the smartest moves the industry made early in the post-quantum rollout was the decision to use hybrid modes: combine a well-tested classical algorithm with a new post-quantum algorithm in the same handshake. The connection stays secure as long as either one remains unbroken.

The logic is simple. Post-quantum algorithms are new, and new algorithms occasionally turn out to have flaws that aren't visible until years of public scrutiny. We don't want to bet the entire internet on math that hasn't yet had decades of attempts to break it. So during the transition years — roughly 2023 through the early 2030s — most deployments combine the old and the new.

You'll see hybrids written like X25519Kyber768 (a classical X25519 key exchange combined with the post-quantum Kyber-768). Google Chrome uses exactly this hybrid in TLS. Cloudflare supports it. Signal's PQXDH does the same conceptual thing for messaging. Mullvad's quantum-resistant WireGuard tunnels combine Classic McEliece with the classical WireGuard handshake.

The cost of hybrids is small: a few extra kilobytes of data on the initial handshake and a few extra milliseconds of computation. The benefit is large: belt-and-suspenders protection during a period when nobody wants to commit fully to either side alone.

Who has already deployed post-quantum cryptography

This isn't theoretical. Here is what has actually shipped, in production, to billions of users.

Aug 2016
NIST opens the Post-Quantum Cryptography competition. Eight years of public cryptanalysis follow.
Oct 2022
Cloudflare begins supporting hybrid post-quantum key exchange across its edge network.
May 2022
The White House issues National Security Memorandum 10 (NSM-10), directing federal agencies to migrate to quantum-resistant cryptography.
Sep 2022
The NSA publishes CNSA 2.0, the next-generation cryptography suite for U.S. national-security systems, requiring PQC migration by 2033.
2023
Mullvad ships post-quantum-safe WireGuard tunnels using a Classic McEliece + Kyber hybrid — among the first commercial VPNs to do so.
Aug 2023
Google Chrome rolls out the X25519Kyber768 hybrid in TLS 1.3, defaulted to on for most users in 2024.
Sep 2023
Signal launches PQXDH, upgrading its X3DH key-agreement protocol to a post-quantum hybrid.
2023
Mullvad makes quantum-resistant tunnels the default on desktop — every new connection by default now uses post-quantum protection.
Feb 2024
Apple iMessage launches PQ3, a post-quantum upgrade to its end-to-end encrypted messaging protocol.
Aug 2024
NIST finalizes FIPS 203, 204, and 205 — the first three post-quantum standards. The era of "experimental PQC" formally ends.
2025 onward
Broad industry rollout begins across browsers, messaging apps, cloud providers, and — increasingly — VPN services. StandVPN ships PQC-ready from day one.

If you've been wondering "is this real yet?" — the answer is unambiguously yes. The internet's encryption layer has begun the largest single upgrade since SSL/TLS itself.

What post-quantum cryptography means for a VPN specifically

QUICK ANSWER A VPN's job is to encrypt all your traffic before it leaves your device. If that encryption is vulnerable to "harvest now, decrypt later," your VPN-protected sessions today could be readable in fifteen years. A post-quantum-ready VPN closes that window — the same encryption that protects you today is built to remain protective into the quantum era.

Here is where post-quantum cryptography intersects directly with VPN choice.

A VPN's whole purpose is to encrypt your network traffic — to put it inside a tunnel that no one along the route between you and the VPN server can read. That tunnel is built on the same family of cryptographic algorithms that protects everything else on the internet. If the algorithms are vulnerable to quantum attack, the tunnel is too. If they're future-proofed against quantum attack, the tunnel is too.

Specifically, a modern VPN tunnel uses cryptography in two places:

The handshake is the thing that needs upgrading. Post-quantum-ready VPNs replace or supplement the handshake with PQC algorithms, while keeping the strong symmetric encryption already in place. The result is a tunnel that is genuinely future-ready end-to-end.

Government, standards bodies, and the regulatory picture

If you only ever read VPN marketing material, you might be forgiven for thinking post-quantum cryptography is a small-tech-company concern. It is not. Government bodies have been driving this transition aggressively for years.

This level of coordinated public-sector activity is what drives industry adoption. When the U.S. government tells contractors they have until 2033 to migrate, the migration happens — and it happens early, because nobody wants to be the last vendor without PQC support.

Five myths about post-quantum cryptography

Myth 1: "Quantum computers don't exist yet, so PQC is premature."

This misses the harvest-now-decrypt-later threat. Adversaries don't need quantum computers today — they only need patience. Storing encrypted data is cheap; future decryption is the bet. The earlier we upgrade, the more past traffic stays safe.

Myth 2: "Post-quantum encryption is much slower than regular encryption."

This was somewhat true for early experimental schemes. With the NIST-standardized algorithms, the performance cost is small — a few extra kilobytes on a handshake and a few milliseconds of computation. For VPNs, browsers, and messaging apps, it's imperceptible in everyday use.

Myth 3: "If quantum computers can break encryption, they can break everything."

Not really. Quantum computers are particularly effective against certain kinds of math problems (factoring, discrete logarithms). They have a smaller speedup against many other kinds of problems — including the ones that PQC algorithms rely on. PQC works because we deliberately chose math problems where quantum computers don't have a dramatic advantage.

Myth 4: "Symmetric encryption like AES needs to be replaced too."

AES is not broken by quantum attacks in the same way public-key encryption is. The relevant quantum algorithm (Grover's algorithm) provides a modest speedup, effectively halving the security margin of symmetric encryption. AES-256 is already strong enough that the post-quantum equivalent is — AES-256. The handshake is what needs upgrading, not the bulk encryption.

Myth 5: "PQC means switching to quantum hardware."

It does not. Post-quantum cryptography runs on ordinary computers. Your phone can do it. Your laptop can do it. A VPN server can do it. No new hardware is required — it's a pure software upgrade.

How to evaluate a PQC-ready VPN

QUICK ANSWER Look for: an explicit PQC capability described on the VPN's site, a hybrid mode that combines classical and post-quantum algorithms, no requirement that you manually enable it, no additional charge for it, and continued availability of standard features like the kill switch.

Not every "post-quantum" claim is the same. Here's what actually matters when evaluating one.

The PQC-ready VPN checklist

If a VPN claims post-quantum support but the details are missing, vague, or paywalled, treat the claim with friendly skepticism.

How StandVPN handles post-quantum cryptography

We built StandVPN to answer one question: what should a modern, privacy-first VPN do automatically in 2026? When it comes to post-quantum cryptography, the answer is straightforward.

StandVPN — PQC-ready out of the box:

Lifetime free
$0 · 10 Mbps
Post-quantum protection included. Every country we serve. No time limits. No data caps. No ads.
Paid plan
$2 / month · 10 Gbps
Same post-quantum protection, faster connection. Five devices on one account.

You can try the free plan right now — no email, no card, no upsell. The post-quantum protection is on from your first connection.


Frequently asked questions

What is post-quantum cryptography in simple terms?

Post-quantum cryptography (PQC) is a new family of encryption algorithms designed to remain secure even against future quantum computers. Today's most common encryption relies on math problems that classical computers can't solve quickly, but that a sufficiently powerful quantum computer eventually could. PQC algorithms are based on different math problems that researchers believe both classical and quantum computers will still struggle with.

What is "harvest now, decrypt later"?

Harvest now, decrypt later (HNDL) is the practice of capturing encrypted internet traffic today, storing it, and decrypting it years later once quantum computers are powerful enough. The U.S. government and major security companies treat HNDL as a real, ongoing risk. It's the central reason post-quantum cryptography matters now, not in ten years.

Do quantum computers exist that can break encryption today?

Not yet. Today's quantum computers have hundreds to a few thousand physical qubits, but breaking widely used encryption like RSA-2048 would require millions of error-corrected qubits. Mainstream estimates put the arrival of cryptographically relevant quantum computers somewhere between 2030 and 2045, though the precise date is uncertain.

What are the NIST post-quantum standards?

In August 2024, NIST finalized three post-quantum standards. FIPS 203 (ML-KEM, based on Kyber) is for key establishment. FIPS 204 (ML-DSA, based on Dilithium) and FIPS 205 (SLH-DSA, based on SPHINCS+) are for digital signatures. These standards now define what "post-quantum-ready" means in practice.

Which products already use post-quantum encryption?

Apple iMessage uses PQ3 (since February 2024). Signal launched PQXDH in September 2023. Google Chrome rolled out the X25519Kyber768 hybrid as default in 2024. Cloudflare has supported post-quantum TLS since 2022. Mullvad made post-quantum WireGuard tunnels the default on desktop in 2023.

Does my VPN need post-quantum cryptography?

If your threat model includes a well-resourced adversary who might be capturing your encrypted traffic today, the answer is yes. For most everyday users, post-quantum protection is a sensible long-term hedge rather than an immediate emergency. The good news is that adopting a PQC-ready VPN costs you nothing extra in speed or convenience.

What is a hybrid post-quantum encryption mode?

A hybrid mode combines a traditional encryption algorithm (like X25519) with a post-quantum algorithm (like ML-KEM) in the same handshake. The connection stays secure as long as either one remains unbroken. This belt-and-suspenders approach is what most major deployments use today.

When will quantum computers actually break current encryption?

Mainstream expert estimates range from the early 2030s to the mid-2040s. What is not uncertain is the timeline for migrating to post-quantum cryptography — that work needs to happen years ahead of the threat, which is why standardization happened in 2024 and major rollouts are happening now.

Will post-quantum cryptography slow down my VPN?

Not noticeably. Post-quantum key exchange adds a small amount of data to the initial connection handshake and a few extra milliseconds of computation. For everyday use, the difference is imperceptible. Once the handshake is complete, traffic flows at full VPN speed.

Is StandVPN post-quantum ready?

Yes. StandVPN is built post-quantum-ready from day one, available on every connection — free and paid alike — without any configuration. The same future-readiness is available to lifetime free users at no cost. You can try it without an email or card.

Pillar guide written and reviewed by the StandVPN team. Sources include NIST FIPS 203/204/205 (2024), the U.S. National Security Memorandum on Quantum Computing (NSM-10, May 2022), NSA CNSA 2.0, public announcements from Apple, Signal, Cloudflare, Google, and Mullvad. We update this guide whenever the underlying landscape changes meaningfully.

PQC-ready · lifetime free · no card

Try StandVPN free for life.