Track
Post-Quantum Cryptography
ML-KEM, ML-DSA, hybrid TLS, migration planning, and how to audit a codebase for Y2Q readiness. The track that pays your rent today.
- Level
- Intermediate
- Tutorials
- 3
- Reading time
- ~69 min
Curriculum
- 01
Post-Quantum Cryptography: The Threat Model
Shor's algorithm doesn't break all cryptography — it breaks the specific subset built on integer factoring and discrete logarithms, which happens to be nearly every public-key system in production. This tutorial lays out the precise threat model, the 'harvest now, decrypt later' attack, NIST's standardization response, and exactly which of your primitives to replace first.
intermediate · ~22 min · prereq: Tutorial 12: Shor's Algorithm
- 02
ML-KEM and ML-DSA in Practice
NIST's FIPS 203 and FIPS 204 are the new cryptographic standards replacing RSA and ECDSA. This tutorial explains the math behind lattice-based key encapsulation and signatures, shows how to use them with real code (Python cryptography library + OpenSSL 3.5), and walks through hybrid TLS 1.3 — the production-grade migration deployment.
intermediate · ~24 min · prereq: Tutorial 21: Post-Quantum Cryptography Threat Model
- 03
Auditing a Codebase for Y2Q Readiness
A hands-on tutorial that walks through building a crypto-agility scanner for any codebase — Python, JavaScript, Go, Rust, Java, C/C++. Identifies every place RSA, ECDSA, ECDH, and DH are used, produces a prioritized migration report, and is the exact deliverable that PQC consulting engagements sell.
intermediate · ~23 min · prereq: Tutorial 22: ML-KEM and ML-DSA in Practice