Ateleris Academy

Introduction to Quantum-Safe Communication – Quantum Key Distribution and Post-Quantum Cryptography

Rapid advancements in quantum computing pose significant threats to traditional cryptographic methods, particularly widely used public-key systems such as RSA and Diffie-Hellman key exchange. To protect digital communications from emerging quantum risks and ensure long-term security, two promising approaches have emerged:

  • Quantum Key Distribution (QKD), leveraging principles of quantum physics to achieve physical, information-theoretic security.
  • Post-Quantum Cryptography (PQC) employs classical cryptographic techniques specifically designed to withstand quantum attacks.

This class provides a practical introduction to both quantum key distribution (QKD) and post-quantum cryptography (PQC), highlighting their strengths, weaknesses, and potential real-world applications.

Prof. Dr. Christoph Wildfeuer will teach this introductory course, providing practical insights into both QKD and PQC, highlighting their strengths, limitations, and real-world applications. Through interactive lectures, comparative analyses, illustrative models, and discussions of concrete use cases, including satellite communication, you will learn how these quantum-safe methods can protect data in a quantum-enabled future.

Goals

Upon completion of this course, participants will:

  • Understand the principles and security foundations of Quantum Key Distribution (QKD).
  • Clearly distinguish between classical computational security and quantum-based information-theoretic security.
  • Recognize why quantum computing threatens current public-key cryptosystems.
  • Gain a foundational understanding of post-quantum cryptographic methods, focusing on lattice-based schemes such as ML-KEM (Kyber).
  • Be familiar with current developments in PQC standardization processes and their relevance to IT security.
  • Be able to evaluate and select appropriate quantum-safe approaches for various practical scenarios and applications.

Contents

  • Introduction to Quantum Key Distribution (QKD): BB84 and BBM92 protocols
  • Information-theoretic security (QKD) vs. computational security (classical cryptography)
  • Vulnerabilities of asymmetric cryptography to quantum attacks (Shor’s algorithm)
  • Basics of lattice-based cryptography, illustrated through a simple conceptual model
  • Overview of NIST’s PQC standardization process, highlighting ML-KEM (Kyber)
  • Practical applications and insights from ESA’s E2EQSS project (Quantum-Safe Satellite Communication)

Target Group

This course is designed for:

  • IT security professionals and cryptography specialists
  • Network engineers and system architects
  • Technical project managers
  • Decision-makers responsible for cybersecurity strategies

Requisites

Participants should ideally have:

  • Basic understanding of cryptographic principles and IT security concepts
  • General familiarity with computer networks and cybersecurity fundamentals

No prior knowledge of quantum physics or quantum computing is required.

Languages

  • Course language (spoken instruction): English or German
  • Course materials (slides, handouts): English or German

Please verify the course language during sign-up.

Duration

  • One half-day

Venue

Please verify the venue during sign-up.

Costs

CHF 480 per person plus 8.1% VAT

Important Information

  • Open-enrollment courses will only be held if at least 10 participants register. You will be notified two weeks before the start of the course.

Enrollments and Inquiries

Corporate Training (on-demand)

Course date, venue, and pricing available upon request. Customizations possible.

Open-Enrollment Course (Q1/2026)

We are planning an open-enrollment course for Q1/2026. Come back later or sign up for our newsletter below to stay up-to-date.

Do the course dates not suit you? Do you want to stay up-to-date on future course topics and dates? Do you have comments? Please feel free to send us a message or sign up for our newsletter below.

Academy Course Notification
Name
Name
First Name
Last Name
Consent