top of page

Advancements in Post-Quantum Cryptography and Quantum Computing: Implications for Future Security Solutions

  • Writer: Srihari Maddula
    Srihari Maddula
  • Mar 17
  • 4 min read

Updated: Oct 14

By Srihari M, Director Product Development at EurthTech

Published on March 17, 2025


Introduction


The rapid evolution of quantum computing poses significant challenges to current cryptographic systems, especially those integrated within smart infrastructure solutions, IoT product engineering, and embedded systems development. Recognizing this, the National Institute of Standards and Technology (NIST) has been proactive in standardizing cryptographic algorithms resilient to quantum attacks — a crucial step in ensuring the digital safety of smart city solutions and AI-powered embedded devices.


In parallel, tech giants like Microsoft are making notable strides in quantum computing, bringing both opportunities and challenges to the forefront of digital transformation for infrastructure. This article explores NIST's recent selection of the fifth post-quantum encryption algorithm, Microsoft’s Majorana 1 quantum chip, and the emerging role of hardware firewalls in securing the future of AI and IoT-enabled smart infrastructure.


NIST’s Fifth Post-Quantum Encryption Algorithm: HQC


On March 11, 2025, NIST announced the selection of the Hamming Quasi-Cyclic (HQC) algorithm as the fifth standard for post-quantum encryption. This decision underscores NIST’s commitment to fortifying data security for embedded AI systems, industrial IoT networks, and geospatial engineering services that power today’s smart city solutions.

HQC is designed to withstand attacks from both classical and quantum systems, offering a robust alternative for secure communications in the quantum era — an essential step in protecting AI for smart cities, AI-powered embedded systems, and IoT-based smart lighting systems. ​community.isc2.org nist.gov news.ycombinator.com


ree

Overview of NIST's Standardized Post-Quantum Algorithms

NIST’s selection process has culminated in five primary algorithms, creating a comprehensive foundation for AI-driven smart infrastructure and embedded security frameworks:(Sources: en.wikipedia.org, community.isc2.org)


  • ML-KEM (CRYSTALS-Kyber): Primary standard for general encryption, valued for its efficiency and small key sizes — a key enabler for IoT and embedded systems in smart cities.

  • ML-DSA (CRYSTALS-Dilithium): Main digital signature standard ensuring authenticity in AI and IoT solutions for municipalities.

  • SLH-DSA (SPHINCS+): A stateless, hash-based algorithm offering cryptographic diversity, enhancing AI in GIS and geospatial analytics.

  • FN-DSA (FALCON): Another digital signature scheme used across AI-enabled geospatial analytics and urban infrastructure digitalization.

  • HQC: The latest addition, designed to enhance quantum resilience in IoT and embedded product designs.(Sources: nist.gov, community.isc2.org, news.ycombinator.com)


Microsoft’s Quantum Computing Breakthrough: Majorana 1


In February 2025, Microsoft unveiled a major advancement in quantum computing with its Majorana 1 chip — a breakthrough that redefines the limits of AI engineering solutions and edge AI in embedded devices.


This processor leverages a novel state of matter, enabling the creation of topological qubits that are more stable and less prone to errors than traditional qubits.By achieving this stability, Microsoft has accelerated the race toward utility-scale quantum systems, which will directly impact AI-powered smart infrastructure, smart pole IoT integration, and predictive maintenance AI IoT frameworks.(Sources: geekwire.com, businessinsider.com, news.microsoft.com, ft.com, nypost.com)Overview of NIST's Standardized Post-Quantum Algorithms


NIST’s selection process has culminated in five primary algorithms, creating a comprehensive foundation for AI-driven smart infrastructure and embedded security frameworks:(Sources: en.wikipedia.org, community.isc2.org)


  • ML-KEM (CRYSTALS-Kyber): Primary standard for general encryption, valued for its efficiency and small key sizes — a key enabler for IoT and embedded systems in smart cities.

  • ML-DSA (CRYSTALS-Dilithium): Main digital signature standard ensuring authenticity in AI and IoT solutions for municipalities.

  • SLH-DSA (SPHINCS+): A stateless, hash-based algorithm offering cryptographic diversity, enhancing AI in GIS and geospatial analytics.

  • FN-DSA (FALCON): Another digital signature scheme used across AI-enabled geospatial analytics and urban infrastructure digitalization.

  • HQC: The latest addition, designed to enhance quantum resilience in IoT and embedded product designs.(Sources: nist.gov, community.isc2.org, news.ycombinator.com)


Microsoft’s Quantum Computing Breakthrough: Majorana 1


In February 2025, Microsoft unveiled a major advancement in quantum computing with its Majorana 1 chip — a breakthrough that redefines the limits of AI engineering solutions and edge AI in embedded devices.


This processor leverages a novel state of matter, enabling the creation of topological qubits that are more stable and less prone to errors than traditional qubits.By achieving this stability, Microsoft has accelerated the race toward utility-scale quantum systems, which will directly impact AI-powered smart infrastructure, smart pole IoT integration, and predictive maintenance AI IoT frameworks.(Sources: geekwire.com, businessinsider.com, news.microsoft.com, ft.com, nypost.com)



ree

The Role of Hardware Firewalls in a Post-Quantum World


As quantum computing matures, traditional software-only security measures may not suffice. The integration of hardware firewalls with post-quantum cryptographic algorithms represents a major leap for smart city technology partners, IoT product developers, and AI-driven infrastructure solutions.


Embedded Security


Integrating quantum-resistant encryption into hardware ensures that data from IoT and embedded devices — such as smart poles, AI-powered street lighting, and industrial IoT gateways — is encrypted securely, reducing vulnerabilities common in software-only systems.


Performance Optimization

Hardware-level encryption offers optimized performance and reduced latency, crucial for real-time AI and IoT applications in urban infrastructure digitalization and geospatial analytics.


Tamper Resistance

With physical tamper-resistant features, next-generation hardware firewalls protect against side-channel attacks and other threats — ensuring security for AI for utilities and infrastructure management across cities.


ree

Conclusion

The landscape of cybersecurity and smart infrastructure is undergoing a transformative shift.NIST’s post-quantum cryptographic standards, combined with Microsoft’s quantum computing breakthroughs, represent a pivotal milestone in protecting the future of AI-powered smart cities, industrial IoT, and embedded AI devices.


Organizations and engineering services for smart cities must stay informed, upgrade their IoT ecosystems, and adopt hardware-level security to remain resilient in the quantum age.


At EurthTech, we’re driving innovation at the intersection of AI, embedded systems, and smart infrastructure, helping our partners design the next generation of secure IoT and geospatial intelligence solutions.


For more insights on cybersecurity, smart infrastructure solutions, and AI-enabled embedded systems, visit our EurthTech Resources page.

 
 
 

Comments


EurthTech delivers AI-powered embedded systems, IoT product engineering, and smart infrastructure solutions to transform cities, enterprises, and industries with innovation and precision.

Factory:

Plot No: 41,
ALEAP Industrial Estate, Suramapalli,
Vijayawada,

India - 521212.

  • Linkedin
  • Twitter
  • Youtube
  • Facebook
  • Instagram

 

© 2025 by Eurth Techtronics Pvt Ltd.

 

Development Center:

3rd Floor, Plot No. 82,

Silpa Pioneer Layout, 

Gachibowli, Hyderabad 

Telangana, INDIA - 500032

Menu

|

Accesibility Statement

bottom of page