الحوسبة
Lattice-Based Cryptography: The Post-Quantum Pivot
تلتزم Securities.io بمعايير تحريرية صارمة، وقد تتلقى تعويضات عن الروابط المُراجعة. لسنا مستشارين استثماريين مُسجلين، وهذه ليست نصيحة استثمارية. يُرجى الاطلاع على كشف التابعة لها.

Advanced cryptography is the hidden security system supporting most of the modern digital world.
It is how digital financial transactions are made secure, how the military can keep communications flowing with complex multi-domain operations and no enemy interference, and how companies’ and consumers’ data are stored safely. And of course, it is also the basis of cryptocurrencies, as their name indicates.
في الصميم، cryptography is the mathematical science of encoding in an unbreakable manner precious data, so that only the intended recipients can read or process it. As this is, at its core, a mathematics and computation problem, it stands that a more powerful computer can break levels of encryption previously considered safe.
This is a serious problem with the emergence of quantum computers, assumed to be thousands of millions of times more efficient than normal computers for certain tasks, including breaking encryption. As quantum computers are becoming increasingly more powerful at a very fast pace, there is a growing need for “post-quantum” encryption, encryption methods that are resistant to quantum computers.
This is not just a theoretical concern anymore, as in 2026, new laws are forcing US banks to switch to a new type of math (Lattice-Based Cryptography – LBC) that even a super-fast Quantum computer can’t solve.
The Mechanics of Quantum Decryption: Beyond Classical Limits
Shor’s Algorithm and the End of RSA/ECC Security
Quantum computers are able to use “خوارزمية شور” to break the integer factorization and discrete logarithm problems that underpin modern internet security.
If quantum computers start operating with enough functional qubits, a number that is rising quickly yearly, it would mean that no data is secure from hackers, nor any digital account of any sort.
This is especially problematic as future quantum computers could break the encryption of data that are today collected, even if still unbreakable, but could be decoded later, a method called “Harvest Now, Decrypt Later” (HNDL).
So even if quantum computers are not able to break encryption today, today’s data already needs to be quantum-proofed so that HNDL methods cannot reveal passwords, proprietary data, medical records, government secrets, or other crucial information a few years down the road.
This would also instantly destroy every cryptocurrency and the financial system as a whole, as the secured transactions could now be faked, and any assets present in a digital ledger are at risk, both in blockchain and traditional finance.
What Is Lattice-Based Cryptography (LBC)? Math for a Post-Quantum World
Lattice-based cryptography leverages a mathematical object called a lattice. Lattices are regular, repeating grids of points in a space like a sheet of graph paper that goes on forever, but it’s not just 2D as it exists in hundreds or thousands of dimensions. A lattice is a
To encrypt, you start at a given grid point, move slightly away from it (adding random “noise”), and share that new location. The noise makes it nearly impossible for an attacker to determine which original grid point was used (the “right”: decrypted data), but authorized users with the “secret key” can remove the noise.
The decryption with the right key is not especially computationally intensive, so it is an efficient method. But this encryption method is a form of mathematics where quantum computers have no special advantages.
Traditional cryptographic methods like RSA and ECC are built on periodic structures in groups that Shor’s algorithm can solve efficiently by finding their “period”. In contrast, lattice-based cryptography does not rely on such structures.
(Further information about this technology can be found in “Lattice-Based Cryptography for Beginners“, published by the International Association for Cryptologic Research – IACR)
Quantum-Proofing US Finance: The Shift to Post-Quantum Standards
2026 PQC Mandates: FIPS 203, 204, and NSM-10 Compliance
In 2024, the National Institute of Standards and Technology (NIST) finalized three different post-quantum cryptography (PQC) standards :
- FIPS 203 – ML-KEM – A key-encapsulation mechanism (KEM) based on lattice cryptography, intended as the main building block for quantum-safe key establishment (e.g., in TLS or VPNs).
- FIPS 204 – ML-DSA – A primary digital signature scheme, also lattice-based, aimed at use cases like software signing, certificates, and authentication.
- FIPS 205 – SLH-DSA- A stateless hash-based signature scheme, deliberately built on different assumptions as a “backup” in case future research reveals weaknesses in lattice-based systems.

المصدر نيست
So from that time, lattice-based cryptography became the official standard toward which future cryptographic methods need to be based.
استخدم National Security Memorandum 10 (NSM-10), issued in 2022, directs U.S. federal agencies to transition to quantum-resistant cryptography by 2035. While in theory this set the target for 2035, 2026 already launched new rules about implementing lattice-based cryptography into the US financial system.
“Continued progress in quantum computing research by academia, industry, and some governments suggests that the vision of quantum computing will ultimately be realized. Hence, now is the time to plan, prepare, and budget for an effective transition to quantum-resistant (QR) algorithms, to assure continued protection of National Security Systems (NSS) and related assets.”
NSA – Commercial National Security Algorithm Suite 2.0
و2025 قانون التأهب للأمن السيبراني للحوسبة الكمية و مبادئ السلوك الأمر التنفيذي 14306 prioritized the acquisition of PQC-enabled products by January 2026. And the Commercial National Security Algorithm Suite 2.0 (CNSA 2.0) mandate requires all new U.S. national security systems to be quantum-safe by January 2027
This means that high-risk financial systems are being pressured by regulators, like the OCC and Federal Reserve, to achieve crypto-agility by the end of 2026.
So, while before the focus of regulator pressure was preparedness, they switched to requiring measurable execution.
This is also not just a US requirement, but a global push, as the G7 Cyber Expert Group confirmed that 2026 is the mandatory start for risk assessment and planning across the global financial sector، و European Commission has also set the end of 2026 as the milestone for all member states to launch national PQC transition plans.
PQC Implementation: Inventory, Roadmaps, and Crypto-Agility for Banks
This mounting pressure translates into demanding requirements from the US leading financial institutions.
This includes “demonstrable readiness by late 2026” when US banks are expected to have completed two essential steps:
- A full inventory of every place encryption is used, giving a clear view of what needs to be updated.
- الخطط الانتقالية: Formal, board-approved roadmaps for migrating high-risk systems to quantum-proof cryptography, especially the NIST’s approved lattice-based cryptography standards.
- إمكانية التحديث: Banks are being forced to adopt “crypto-agility”—the ability to swap out an encryption algorithm overnight if it is suddenly “broken” by a quantum breakthrough.
Once these steps are implemented, deploying cryptography able to handle quantum computers’ abilities should be quick, ideally before the end of 2027 for the most critical systems. This also requires the deployment of Hardware Security Modules (HSMs).
And the clock is indeed ticking, with companies most ahead in quantum computing like Google (GOOGL ) now expecting a dangerous decryption capacity from quantum computers to be reached as soon as 2029.
الاستثمار في التشفير القائم على الشبكة
أكامي تكنولوجيز
(AKAM )
Akamai is a cybersecurity company founded in 1998 and has quickly grown into being known as the “backbone of the internet” for its content delivery network (CDN) services.
Over time, it has evolved into a leader in distributed cloud and edge security, as well as adding in 2026 AI-driven infrastructure powered by NVIDIA’s (NVDA ) Blackwell GPUs, with cybersecurity now more than half of the company’s revenues.

المصدر أكامي
Today, it is a company employing 11,300+ employees that generated $4.21B of revenues in 2025, up 5% year-over-year.
Akamai is trusted by most of the IT industry globally, notably including among its customer base:
- All top 10 video streaming services
- All top 10 video game companies
- All top 10 brokerages
- All top 10 banking companies
- All 6 U.S. military branches
- 14 of 15 U.S. federal civilian cabinet agencies
This makes Akamai a key provider of cybersecurity and encryption, with Akamai already a well-established, trusted “middleman” for both content delivery and cybersecurity.
Banks and other institutions rarely build new security themselves; they instead hire companies like Akamai to do it for them. So it makes sense for banks to hand over to Akamai safe data handling and safe banking when the age of quantum-driven threats has arrived a lot sooner than expected.
If the evolution toward quantum-proof encryption were slower, other alternatives from new companies or internal development could be more likely.
But as the end of 2026 and 2027 deadlines are coming fast, large organizations like banks or the US government agencies will prefer to stay with trusted partners that are already familiar with these institutions’ IT infrastructure.
This should turn Akamai into a prime beneficiary of the shift toward lattice-based cryptography, the company being able to deliver solid results more quickly and more safely for what is now an urgent legal requirement for all major financial institutions.









