Downgrade Attacks

Aims to force a system into using a weaker or older cryptographic protocol
e.g. POODLE attack (targeted SSL v3)

Collision Attacks

Aims to find two inputs that produce the same hash output
e.g. Birthday Attack

Quantum Computing

A computer that uses quantum mechanics to generate and manipulate quantum bits (qubits) in order to access enormous processing power
It is designed to be used in very specific use cases such as complex math calculations

Quantum Communication

A communication network that relies on qubits made of photons (light) to send multiple combinations of ones and zeros simultaneously which results in tamper resistant and extremely fast communications

Qubit

A quantum bit composed of electrons or photons that can represent numerous combinations of ones and zeroes at the same time through superposition

Post-quantum Cryptography

A algorithm that can be implemented using today’s classical computers but is also impervious to attacks from future quantum computers
1st Method: Increase key size
2nd Method: Newer algorithms (lattice-based & super singular isogeny key)

Current recommendation

General Encryption: CRYSTALS-Kyber algorithm
Digital Signature: CRYSTALS-Dilithium, FALCON, SPHINCS+