<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Post-Quantum on Devops Monk</title><link>https://devops-monk.com/tags/post-quantum/</link><description>Recent content in Post-Quantum on Devops Monk</description><generator>Hugo</generator><language>en-us</language><lastBuildDate>Mon, 04 May 2026 00:00:00 +0000</lastBuildDate><atom:link href="https://devops-monk.com/tags/post-quantum/index.xml" rel="self" type="application/rss+xml"/><item><title>Key Encapsulation Mechanism API (JEP 452): Post-Quantum Cryptography in Java</title><link>https://devops-monk.com/tutorials/java21/kem-api/</link><pubDate>Mon, 04 May 2026 00:00:00 +0000</pubDate><guid>https://devops-monk.com/tutorials/java21/kem-api/</guid><description>Why Post-Quantum Cryptography Now? Classical public-key cryptography (RSA, ECDH) relies on mathematical problems that are hard for classical computers — factoring large integers or solving the discrete logarithm problem. A sufficiently powerful quantum computer running Shor&amp;rsquo;s algorithm could solve these problems efficiently, breaking all existing RSA and ECC-based security.
Quantum computers capable of breaking 2048-bit RSA don&amp;rsquo;t exist yet. But &amp;ldquo;harvest now, decrypt later&amp;rdquo; attacks are real: adversaries intercept and store encrypted traffic today, planning to decrypt it once quantum computers mature.</description></item></channel></rss>