Post Quantum and Non-Post Quantum Key Exchange: ECC and Kyber Working in Harmony
Published in
3 min readFeb 28, 2023
And, so, like it or not, our existing key exchange methods will eventually be deprecated with the rise of quantum computers. In most cases we use elliptic curve methods for key exchange, and which has replaced the Diffie Hellman method. The two main methods are ECDH (using P-256 and secp256k1) and X.25519 (using Curve 25519). After a relatively long…