While widely used cryptographic methods won’t be broken by quantum computers until 2023 due to their lack of processing capacity, cryptographers are creating new algorithms in anticipation of Q-Day, the date on which existing algorithms would be susceptible to attacks from quantum computing. The European Telecommunications Standards Institute (ETSI), the Institute for Quantum Computing, and the PQCrypto conference series, which have been held since 2006, have all drawn attention to their work from academics and industry. Since data collected now might still be sensitive years from now, the early deployment of post-quantum techniques has also been interpreted as motivated by the rumored presence of widespread harvest now, decrypt later programs.
On the other hand, most existing symmetric cryptography algorithms and hash functions are thought to be largely safe from attacks by quantum computers, unlike the threat that quantum computing poses to public-key techniques. Although attacks against symmetric ciphers are accelerated by the quantum Grover’s technique, these attacks can be effectively prevented by doubling the key size. Therefore, there is no need for post-quantum symmetric cryptography to diverge greatly from existing symmetric encryption.