Quantum Outpost

Track

Post-Quantum Cryptography

ML-KEM, ML-DSA, hybrid TLS, migration planning, and how to audit a codebase for Y2Q readiness. The track that pays your rent today.

Level
Intermediate
Tutorials
3
Reading time
~69 min
Prerequisites: Algorithms track (specifically Shor's algorithm)

Curriculum

  1. 01

    Post-Quantum Cryptography: The Threat Model

    Shor's algorithm doesn't break all cryptography — it breaks the specific subset built on integer factoring and discrete logarithms, which happens to be nearly every public-key system in production. This tutorial lays out the precise threat model, the 'harvest now, decrypt later' attack, NIST's standardization response, and exactly which of your primitives to replace first.

    intermediate · ~22 min · prereq: Tutorial 12: Shor's Algorithm

  2. 02

    ML-KEM and ML-DSA in Practice

    NIST's FIPS 203 and FIPS 204 are the new cryptographic standards replacing RSA and ECDSA. This tutorial explains the math behind lattice-based key encapsulation and signatures, shows how to use them with real code (Python cryptography library + OpenSSL 3.5), and walks through hybrid TLS 1.3 — the production-grade migration deployment.

    intermediate · ~24 min · prereq: Tutorial 21: Post-Quantum Cryptography Threat Model

  3. 03

    Auditing a Codebase for Y2Q Readiness

    A hands-on tutorial that walks through building a crypto-agility scanner for any codebase — Python, JavaScript, Go, Rust, Java, C/C++. Identifies every place RSA, ECDSA, ECDH, and DH are used, produces a prioritized migration report, and is the exact deliverable that PQC consulting engagements sell.

    intermediate · ~23 min · prereq: Tutorial 22: ML-KEM and ML-DSA in Practice

Weekly dispatch

Quantum, for people who already code.

One serious tutorial per week, plus the industry moves that actually matter. No hype, no hand-waving.

Free. Unsubscribe anytime. We will never sell your email.