Ateleris Academy
Introduction to Quantum-Safe Communication – Quantum Key Distribution and Post-Quantum Cryptography
Rapid advancements in quantum computing pose significant threats to traditional cryptographic methods, particularly widely used public-key systems such as RSA and Diffie-Hellman key exchange. To protect digital communications from emerging quantum risks and ensure long-term security, two promising approaches have emerged:
- Quantum Key Distribution (QKD), leveraging principles of quantum physics to achieve physical, information-theoretic security.
- Post-Quantum Cryptography (PQC) employs classical cryptographic techniques specifically designed to withstand quantum attacks.
This class provides a practical introduction to both quantum key distribution (QKD) and post-quantum cryptography (PQC), highlighting their strengths, weaknesses, and potential real-world applications.
Prof. Dr. Christoph Wildfeuer will teach this introductory course, providing practical insights into both QKD and PQC, highlighting their strengths, limitations, and real-world applications. Through interactive lectures, comparative analyses, illustrative models, and discussions of concrete use cases, including satellite communication, you will learn how these quantum-safe methods can protect data in a quantum-enabled future.
Goals
Upon completion of this course, participants will:
- Understand the principles and security foundations of Quantum Key Distribution (QKD).
- Clearly distinguish between classical computational security and quantum-based information-theoretic security.
- Recognize why quantum computing threatens current public-key cryptosystems.
- Gain a foundational understanding of post-quantum cryptographic methods, focusing on lattice-based schemes such as ML-KEM (Kyber).
- Be familiar with current developments in PQC standardization processes and their relevance to IT security.
- Be able to evaluate and select appropriate quantum-safe approaches for various practical scenarios and applications.
Contents
- Introduction to Quantum Key Distribution (QKD): BB84 and BBM92 protocols
- Information-theoretic security (QKD) vs. computational security (classical cryptography)
- Vulnerabilities of asymmetric cryptography to quantum attacks (Shor’s algorithm)
- Basics of lattice-based cryptography, illustrated through a simple conceptual model
- Overview of NIST’s PQC standardization process, highlighting ML-KEM (Kyber)
- Practical applications and insights from ESA’s E2EQSS project (Quantum-Safe Satellite Communication)
Target Group
This course is designed for:
- IT security professionals and cryptography specialists
- Network engineers and system architects
- Technical project managers
- Decision-makers responsible for cybersecurity strategies
Requisites
Participants should ideally have:
- Basic understanding of cryptographic principles and IT security concepts
- General familiarity with computer networks and cybersecurity fundamentals
No prior knowledge of quantum physics or quantum computing is required.
Languages
- Course language (spoken instruction): English or German
- Course materials (slides, handouts): English or German
Please verify the course language during sign-up.
Duration
- One half-day
Venue
Please verify the venue during sign-up.
Costs
CHF 480 per person plus 8.1% VAT
Important Information
- Open-enrollment courses will only be held if at least 10 participants register. You will be notified two weeks before the start of the course.
Enrollments and Inquiries
Corporate Training (on-demand)
Course date, venue, and pricing available upon request. Customizations possible.
Open-Enrollment Course (Q1/2026)
We are planning an open-enrollment course for Q1/2026. Come back later or sign up for our newsletter below to stay up-to-date.
Do the course dates not suit you? Do you want to stay up-to-date on future course topics and dates? Do you have comments? Please feel free to send us a message or sign up for our newsletter below.