Date29th, Nov 2018

Summary:

DUBLIN--(BUSINESS WIRE)--The "Post-Quantum Cryptography: A Ten-Year Market and Technology Forecast" report has been added to ResearchAndMarkets.com's offering. This report identifies the PQC opportunities that will emerge in how the market roadmap for PQC will evolve over the coming decade. The market for post-quantum cryptography (PQC) already generates revenue and will expand as quantum computers capable of breaking common public key encryption schemes with Shor's algorithm become more widely

Full text:

DUBLIN--()--The "Post-Quantum Cryptography: A Ten-Year Market and Technology Forecast" report has been added to ResearchAndMarkets.com's offering.

This report identifies the PQC opportunities that will emerge in how the market roadmap for PQC will evolve over the coming decade.

The market for post-quantum cryptography (PQC) already generates revenue and will expand as quantum computers capable of breaking common public key encryption schemes with Shor's algorithm become more widely deployed. For now, post-quantum cryptography finds its market in critical long-lived data such as plans for aircraft and medical databases that need to survive well into the era of powerful quantum computers.

Some IT managers are already aware of the quantum threat and are applying PQC selectively using interim standards and technologies. Many more individuals with purchasing authority are expected to buy into PQC over the next five years as they come to understand quantum threats and quantum computer era gets closer. The addressable market for PQC is can be measured in the billions of units - encryption is hidden everywhere in both hardware and software - and adoption will also accelerate as PQC algorithms are finalized in the NIST selection process.

Key Topics Covered:

Executive SummaryE.1 Post-quantum cryptography - Future requirements for the entire digital infrastructureE.2 Uses of public key cryptographyE.3 Revenue opportunities for post-quantum cryptographyE.4 Standardization activitiesE.5 Seven firms to watch in the post-quantum cryptography space

Chapter One: IntroductionBackground to this reportQuantum security threats: The bottom lineA PQC adoption timetable1.2 Goals and scope of this report1.3 Methodology of this report1.4 Plan of this report

Chapter Two: Post-Quantum Encryption Technology and Products2.1 Security vulnerabilities for existing public key encryption created by quantum computers2.1.1 Role of Shor's algorithm2.1.2 When will a solution be needed? A timetable for the quantum computer threat2.1.3 Time required to implement a new infrastructure2.1.4 Post-quantum encryption vs. quantum key distribution (QKD)2.1.5 Related vulnerabilities for symmetric cryptographic algorithms and hash functions2.2 Classification of post-quantum algorithms by NIST2.2.1 Lattice based cryptography2.2.2 Code based cryptography2.2.3 Multivariate polynomial based cryptography2.2.4 Hash-based cryptography2.2.5 Other cryptographic schemes2.2.6 Stateful hash-based signature schemes being proposed by the IETF2.2.7 Hybrid classical/quantum algorithms2.3 Post-quantum encryption - Emerging products and services2.3.1 Embedded systems2.3.2 Special purpose post quantum software2.3.3 Incorporated into standard internet browsers2.3.4 Chip level solutions for post quantum encryption2.3.5 IT services2.3.6 Ten year forecast of post quantum encryption revenue by application segment

Chapter Three: Markets for Post-Quantum Encryption3.1 Data types that could be at risk3.1.1 Data value versus data shelf life3.1.2 Data types at risk3 1.3 Will IT managers be proactive about protecting their data against quantum attacks?3.2 General forecasting considerations for post-quantum cryptography3.2.1 Ten-year forecast of overall penetration by post-quantum cryptography3.2.2 Indirect versus direct revenue considerations3.3 Civil government (police, embassies, domestic security)3.3.1 Market potential for post-quantum cryptography3.4 Military, intelligence services and domestic security agencies3.5 Financial institutions3.6 Telecommunications providers3.7 Data storage and disaster recovery3.8 Healthcare and medical records3.9 General business usage3.10 Consumer usage

Chapter Four: Current Post-Quantum Encryption Companies and Other Organizations4.1 Isara4.2 Envieta Systems LLC4.3 Post Quantum (PQ Solutions)4.4 evolutionQ4.5 Cambridge Quantum Computing4.6 Infineon Technologies4.7 Rambus Security Division4.8 IBM Research4.9 Microsoft Research4.10 Google Research4.11 OnBoard Security4.12 Thales Communications and Security4.13 Post-Quantum Advanced Technologies (PQAT)

Chapter Five: Other Organizations5.1 National Institute of Standards and Technology (NIST)5.1.1 Post quantum encryption selection at NIST5.1.2 Classes of algorithm5.2 SafeCrypto5.3 Internet Engineering Task Force (IETF)5.3.1 IETF work related to PQC5.4 National Security Agency (NSA)5.4.1 NSA work related to PQC5.5 Cloud Security Alliance (CSA)5.5.1 Quantum safe security working group5.6 ISO5.6.1 SC27 WG25.7 European Telecommunications Standards Institute (ETSI)5.8 PQCRYPTO5.8.1 Collaboration with NIST5.9 Institute of Electrical and Electronics Engineers (IEEE)5.10 International Telecommunications Union (ITU)5.11 ANSI Accredited Standards Committee X95.12 Open Quantum Safe

For more information about this report visit https://www.researchandmarkets.com/research/hwk76c/postquantum?w=4