Post-Quantum Cryptography Playground

Explore the three NIST-standardized post-quantum cryptography algorithms interactively. See how they work step by step, from key generation to encryption and signing.

Algorithm Comparison

Compare key sizes, security assumptions, and tradeoffs across all three standards side-by-side.

Why Post-Quantum?

Full timeline

Quantum computers threaten current public-key cryptography. See when RSA, ECC, and AES become vulnerable — and why migrating to post-quantum standards matters now.

RSA-2048Shor's Algorithm
20302035Vulnerable
ECC-256Shor's Algorithm
20302035Vulnerable
AES-128Grover's Algorithm
20402050Weakened
AES-256Grover's Algorithm
20502070Quantum-Safe
PQC StandardsNo known quantum attack
20602080Quantum-Safe