Developer Quantum Impact
Understand how the quantum threat impacts your code, libraries, and protocols — and what to do about it.
For the Developer / Engineer
“The code you write today may be vulnerable before its end of life. Understanding PQC is now a core engineering skill.”
Why This Matters for You
Every line of cryptographic code you ship today uses algorithms that quantum computers will break. Library migrations are already underway (OpenSSL 3.5, BoringSSL, Go 1.24), and larger PQC keys/signatures break assumptions baked into protocols, databases, and network stacks. Developers who understand PQC now will lead their teams through the most significant cryptographic transition in internet history.
Key Threat Impacts
Crypto Library Transitions
OpenSSL, BoringSSL, Go crypto, and AWS-LC are adding PQC support. Your code may need API changes.
2024-2027
Larger Keys & Signatures Break Assumptions
ML-KEM public keys are 800-1568 bytes (vs 32-133 for ECC). ML-DSA signatures are 2420-4627 bytes (vs 64-72 for ECDSA).
Immediate design impact
TLS Handshake Size Increase
PQC key exchange adds ~1KB to the TLS handshake. Some networks and middleboxes may not handle this.
2025-2028
Code Signing & Verification
Software supply chain signatures (npm, Docker, Git) will transition to PQC algorithms.
2026-2030
Knowledge Domains
Protocol Migration
Learn how TLS, SSH, JWT, and web protocols integrate PQC.
Architecture Patterns
Design crypto-agile systems with hybrid and composite approaches.
Workshop: 3-Step Action Plan
Assess your personal exposure with an interactive self-assessment. See how each quantum threat impacts your specific responsibilities.
Identify skill gaps with a guided self-rating tool. Get a personalized learning path with direct links to relevant modules.
Build a phased action plan with immediate quick wins, 30-day milestones, and long-term KPIs tailored to your role.
Quick Wins to Start Today
Run a crypto grep on your codebase
Search for RSA, ECDSA, ECDH, AES-128 to map your crypto footprint in minutes.
Check your OpenSSL version
Run `openssl version` — 3.5+ has ML-KEM/ML-DSA support built in.
Test ML-KEM TLS in your browser
Chrome 131+ uses ML-KEM by default for TLS 1.3. Check your site’s support.
Learning module content can be inaccurate. Please double-check its information. Report inaccuracies in PQC Today GitHub Discussions.