# Post-Quantum Encryption Explained

Post-quantum encryption (PQE) is a class of cryptographic systems built to remain secure against quantum computers. DragBin uses ML-KEM (lattice-based key encapsulation) and AES-256 to protect data today and decades into the future.

## What is post-quantum encryption?

Classical cryptography (RSA, ECC) relies on mathematical problems like integer factorization and discrete logarithms — hard for classical computers but solvable by quantum algorithms such as Shor's algorithm. Post-quantum schemes are built on different hard problems (lattices, hashes, codes, multivariate polynomials) that resist both classical and quantum attacks.

## How DragBin implements it

- **ML-KEM (Kyber)** — NIST-standardized lattice-based key encapsulation for establishing encryption keys.
- **AES-256** — large symmetric key sizes resist Grover's algorithm brute-force speedups.
- **Hybrid cryptography** — combines classical and post-quantum primitives so neither single failure breaks the system.

## Why it matters now

- **Harvest now, decrypt later** — attackers can capture encrypted traffic today and decrypt it once quantum hardware matures. Post-quantum encryption neutralizes this threat.
- **Long-lived data** — medical records, intellectual property, legal documents, and government files need confidentiality for decades.
- **Standards momentum** — NIST has standardized post-quantum algorithms; Google projects real-world quantum impact by 2029.

## Who needs PQE

- Creators and video editors protecting unreleased work.
- Legal teams and finance professionals handling sensitive records.
- Healthcare providers under long-term retention requirements.
- Military, defense, and government data custodians.
- Enterprises with multi-decade confidentiality obligations.

## Related

- [Zero-knowledge encryption](/zero-knowledge-encryption)
- [Security architecture](/security)
- [Pricing](/pricing)
- [Whitepaper](/whitepaper.pdf)
