Understanding the PiQASO language: The PiQASO glossary

As we move closer to the quantum era, the vocabulary of cybersecurity is changing. To understand the mission of the PiQASO project, and the future of digital security, we first need to understand the forces at play.

1. Quantum Computers Advanced computational devices that leverage the principles of quantum mechanics, such as superposition and entanglement, to perform calculations exponentially faster than classical computers for specific problems.

2. Quantum Algorithms An algorithm is a collection of instructions that allows you to compute a function, for instance the square of a number. A quantum algorithm is exactly the same thing, but the instructions also allow superpositions to be made and entanglement to be created. This allows quantum algorithms to do certain things that cannot be done efficiently with regular algorithms.

3. Quantum Attacks Quantum attacks are cryptographic attacks that leverage the computational power of quantum computers to break traditional encryption schemes. Algorithms like Shor’s algorithm can efficiently factor large integers, thereby rendering classical encryption methods such as RSA, ECC, and Diffie-Hellman insecure. Quantum attacks pose a significant threat to modern cybersecurity infrastructures.

4. Quantum vs. Post-Quantum This is the most common point of confusion.

Quantum Algorithms: These are the programs that run on Quantum Computers . They are the tools that can theoretically break current encryption.

Post-Quantum Cryptography (PQC): These are the defensive algorithms that run on today’s classical computer systems .

Understanding these terms is the first step toward building a quantum-resistant future. At PiQASO, we are dedicated to implementing Post-Quantum Cryptography As-a-Service to secure Europe’s critical transmission systems.

Visit the PiQASO Academy for more!

Connect with us

The project funded under Grant Agreement No. ​101190366​ is supported by the European Cybersecurity Competence CentreFunded by the European Union.
Views and opinions expressed are however those of the author(s) only and do not necessarily reflect those of the European Union or European Cybersecurity Competence Centre.
Neither the European Union nor the granting authority can be held responsible for them.