Post Quantum Cryptography Training in South Africa

  • Learn via: Online Instructor-Led / Classroom Based / Onsite
  • Duration: 3 Days
  • Level: Fundamentals
  • Price: Please contact for booking options
  • Upcoming Date:
  • UK Based Global Training Provider

Post-quantum cryptography is no longer just a futuristic concept, but a necessity in the present day. Anyone who works in the field and ignores its principles and techniques could be left at a severe disadvantage. This course offers a comprehensive overview of post-quantum cryptography.

Day 1 explores quantum-based attacks, lattices, and their applications in schemes and key exchange. Day 2 delves into error-correcting codes, isogenies, and their security implications. Day 3 covers the MQ problem, various schemes, including oil and vinegar, rainbow, and their cryptanalysis.

Other candidates, such as hash-based signatures and MPC-in-the-head signatures, and side-channel attacks, are also discussed. Participants will gain a thorough understanding of post-quantum cryptography and its potential impact on modern cryptography.

High Level Overview of the class topics;

  • Introduction to post-quantum cryptography
  • Attacks on DLOG and factoring
  • Lattices and related algorithms
  • LWE and Regev's encryption scheme
  • NTRU and NTRUPrime
  • Codes and cryptosystems
  • Isogenies and elliptic curves
  • MQ problem and its variants
  • Other candidates for PQC
  • Side-channel attacks and countermeasures
We can organize this training at your preferred date and location. Contact Us!

Prerequisites

General knowledge of cryptography.

What You Will Learn

You will;

  • Be able to evaluate the security of different cryptographic primitives
  • Be able to select suitable cryptographic algorithms for their specific use case and deployment scenario
  • Have practical experience implementing and using post-quantum cryptographic schemes
  • Understand the mathematical foundations of post-quantum cryptography
  • Be familiar with the state-of-the-art in post-quantum cryptography
  • Possess knowledge and skills to defend against side-channel and physical attacks on cryptographic implementations

Training Outline

Day 1

Intro

Attacks Against DLOG and Factoring

  • Shor's Algorithm
  • NIST Competition

Lattices

  • Definitions
  • SVP, CVP, BDD
  • Good and Bad Basis
  • Babai Nearest Plane Algorithm
  • GGH Schemes and Attack Against Digital Signature Scheme
  • LWE
  • Regev's Encryption Scheme
  • Key Exchange from LWE
  • Ring LWE
  • Module LWE and LWR
  • Frodo, Kyber, Saber
  • NTRU and NTRUPrime
  • SIS Problem, Hash Function, and Digital Signature from SIS
  • Falcon
  • Lyubashevskys's ID Scheme
  • Dilithium
  • IBE and FHE

Day 2

Codes

  • Error Correcting Codes in General
  • Goppa Codes, Decoding Algorithm
  • McEliece Cryptosystem, Cryptanalysis History
  • BIKE and HQC
  • Niederreiter Cryptosystem, Syndrome Decoding
  • Trapdoor One-Way Function
  • Digital Signature Scheme Wave
  • Rank Metric Codes and Cryptosystems

Isogenies

  • Crash Course on Isogenies and Elliptic Curves
  • CGL Hash Function and SIDH
  • Security of SIDH, SIKE
  • Group Actions, CSIDH, and Applications
  • SQISign (High-Level Discussion)

Day 3

MQ

  • MQ Problem
  • Discussion about Its Hardness
  • Linearization, Gröbner Basis (High-Level Discussion)
  • Benchmarking Systems
  • Imai-Matsumoto, Hidden Field Equations
  • Variants of HFE
  • Oil and Vinegar Scheme, Kipnis-Shamir Attack, UOV
  • Rainbow and Cryptanalysis Results for Both UOV and Rainbow
  • ID Scheme and GeMSS

Other Candidates

  • Hash-Based Signatures (SPHINCS+)
  • MPC-in-the-Head Signatures (Picnic)

Side-Channel Attacks

  • Basic Attacks
  • Countermeasures Against Physical and Implementation Attacks

Why Choose Us

Experience live, interactive learning from the comfort of your home or office with Bilginç IT Academy's Online Instructor-Led Post Quantum Cryptography Training in South Africa. Engage directly with expert trainers in a virtual environment that mirrors the energy and schedule of a physical classroom.

  • Live Sessions: Join scheduled classes with a live instructor and other delegates in real-time.
  • Interactive Experience: Engage in group activities, hands-on labs, and direct Q&A sessions with your trainer and peers.
  • Global Expert Trainers: Learn from a handpicked global pool of expert trainers with deep industry experience.
  • Proven Expertise: Benefit from over 30 years of quality training experience, equipping you with lasting skills for success.
  • Scalable Delivery: Accessible worldwide, including South Africa, with flexible scheduling to meet your professional needs.

Immerse yourself in our most sought-after learning style for Post Quantum Cryptography Training in South Africa. Our hand-picked classroom venues in South Africa offer an invaluable human touch, providing a focused and interactive environment for professional growth.

  • Highly Experienced Trainers: Boost your skills with trainers boasting 10-20+ years of real-world experience.
  • State-of-the-Art Venues: Learn in high-standard facilities designed to ensure a comfortable and distraction-free experience.
  • Small Class Sizes: Our limited class sizes foster meaningful discussions and a personalized learning journey.
  • Best Value: Achieve your certification with high-quality training and competitive pricing.

Streamline your organization's training requirements with Bilginc IT Academy’s Onsite Post Quantum Cryptography Training in South Africa. Experience expert-led learning at your own business premises, tailored to your corporate goals.

  • Tailored Learning Experience: Customize the training content to fit your unique business projects or specific technical needs.
  • Maximize Training Budget: Eliminate travel and accommodation costs, focusing your entire budget on the training itself.
  • Team Building Opportunity: Enhance team bonding and collaboration through shared learning experiences in your workspace.
  • Progress Monitoring: Track and evaluate your employees' progression and performance with relative ease and direct oversight.


Contact us for more detail about our trainings and for all other enquiries!

Available Training Dates

Join our public courses in our South Africa facilities. Private class trainings will be organized at the location of your preference, according to your schedule.

We can organize this training at your preferred date and location.
20 April 2026 (3 Days)
Cape Town, Johannesburg, Pretoria
10 May 2026 (3 Days)
Cape Town, Johannesburg, Pretoria
21 May 2026 (3 Days)
Cape Town, Johannesburg, Pretoria
22 May 2026 (3 Days)
Cape Town, Johannesburg, Pretoria
04 June 2026 (3 Days)
Cape Town, Johannesburg, Pretoria
21 June 2026 (3 Days)
Cape Town, Johannesburg, Pretoria
04 July 2026 (3 Days)
Cape Town, Johannesburg, Pretoria
20 July 2026 (3 Days)
Cape Town, Johannesburg, Pretoria

Other trainings and courses related to the Post Quantum Cryptography

South Africa is the most advanced technological market on the continent, with Cape Town and Johannesburg acting as world-class centers for fintech, telecommunications, and digital entrepreneurship. Cape Town’s vibrant tech scene, often called 'Silicon Cape,' attracts international venture capital and research talent, while Johannesburg remains the industrial and financial heart of technical innovation. The country's top universities, including the University of Cape Town and Wits, provide a strong academic foundation for research in Artificial Intelligence and Big Data. Our educational frameworks in South Africa focus on equipping the professional workforce with the high-level skills needed to manage complex enterprise infrastructures. We provide elite training in Cybersecurity, Enterprise Architecture, and Data Science to support South Africa's leading role in the global digital economy.

By using this website you agree to let us use cookies. For further information about our use of cookies, check out our Cookie Policy.