Funding or Finance Opportunity

European-Commission-logo-9-1024×710-47-1

Post-quantum cryptography transition

Expected Outcome:

Projects’ results are expected to contribute to some or all of the following outcomes:

  • Increasing the maturity of current post-quantum cryptographic algorithms and contribution to further standardisation;
  • Easy-to-use tools for the large-scale implementation of post-quantum cryptographic algorithms, based on state-of-the-art standards;
  • Secure and efficient transition from pre- to post-quantum encryption through tools implementing a hybrid approach combining recognised pre-quantum public key algorithms and additional post-quantum algorithms;
  • Phase-in of post-quantum algorithms or protocols to new or existing applications;
  • Demonstrators and good-practice implementations of post-quantum cryptographic algorithms on varied hardware and software platforms;
  • Application-oriented recommendations for the widespread implementation of post-quantum cryptography across the EU.

Scope:

The advent of large-scale quantum computers will compromise much of modern cryptography, which is instrumental in ensuring cybersecurity and privacy of the digital transition. Any cryptographic primitive based on the integer factorization and/or the discrete logarithm problems will be vulnerable to large-scale quantum-powered attacks. The digital data/products/systems that derive their security ultimately from the abovementioned primitives will be compromised and must be upgraded - including their replacement when needed- to quantum-resistant cryptography. The massive scale of this foreseen upgrade shows that preparations are needed today in order to widely implement the relevant mitigations in the future. Many companies and governments cannot afford to have their protected communications/data decrypted in the future, even if that future still seems distant. There is a need to advance swiftly in the transition to quantum-resistant cryptography.

Post-quantum resistant cryptographic algorithms should be deployable in a dynamic manner in order to quickly react to new quantum computer developments. Recommendations for post-quantum cryptography have already been published, but have to be maintained up-to-date, Proposals received under this topic should contribute to developing coordinated European recommendations for the transition to post-quantum cryptography across the EU.

The identification and analysis of potential regulatory aspects and barriers for the developed technologies/solutions is encouraged, where relevant.

General Information

Call Type
EU Horizon Europe
Eligible Country/ies
EU + Horizon Europe associated countries
Call Identifier (if any)
HORIZON-CL3-2024-CS-01-02
Expected Outcome or Impact
Expected Outcome:
Projects’ results are expected to contribute to some or all of the following outcomes:

- Increasing the maturity of current post-quantum cryptographic algorithms and contribution to further standardisation;
- Easy-to-use tools for the large-scale implementation of post-quantum cryptographic algorithms, based on state-of-the-art standards;
- Secure and efficient transition from pre- to post-quantum encryption through tools implementing a hybrid approach combining recognised pre-quantum public key algorithms and additional post-quantum algorithms;
- Phase-in of post-quantum algorithms or protocols to new or existing applications;
- Demonstrators and good-practice implementations of post-quantum cryptographic algorithms on varied hardware and software platforms;
- Application-oriented recommendations for the widespread implementation of post-quantum cryptography across the EU.
Target Groups
Research Institutes, Academia, Small- and Medium Enterprises, Industry, Non-government organisations, Start-Ups
Submission Deadlines
Single fixed deadline
(Next) Submission Deadline
20 November 2024
Type of Funding Instrument
Collaborative Projects / Consortia
Max. funding amount per project [EURO]
6.000.000€
Overall budget for all projects [EURO]
23.400.000€
Horizon Europe project type
Research and Innovation Action (100% funding)

Author Info

Avatar

Patric Gerö

Member since 2 years ago
    View Profile

    Ask a question or request support

    Post-quantum cryptography transition 0 reviews

    Login to Write Your Review

    There are no reviews yet.

    Write Your Review

    Your email address will not be published. Required fields are marked *