The Ministry of Science and ICT applied quantum‑resistant cryptography to energy, healthcare and administrative systems and completed the transition. The ministry and the Korea Internet and Security Agency held an event at the SETEC Convention Hall in Seoul on Dec. 3 and presented the results of the 2025 pilot transition project.
Korea Electric Power Corp’s KDN unit, Raonsecure and LG Uplus presented pilot transition cases. Quantum‑resistant cryptography uses complex mathematical structures and is designed to resist decryption even by quantum computers.
Current public‑key algorithms are based on factorisation and discrete logarithms, while quantum‑resistant cryptography uses lattice and hash‑based methods. The technology blocks HNDL attacks, in which hackers collect encrypted data in advance and decrypt it once quantum computers are commercialised.
In the energy sector, it was applied to Korea Electric Power Corp’s advanced metering infrastructure, which processes electricity‑use data for about 22,500,000 households. In healthcare, it was applied to digital healthcare platforms linked to hospital information systems and electronic medical records at eight advanced general hospitals. In administration, the ministry said the national technical qualification examination system used annually by 1,000,000 people underwent a transition to quantum‑resistant cryptography.
The event shared results from the three project areas pursued this year. Project operators used seven types of quantum‑resistant algorithms. Four domestic algorithms were NTRU+, SMAUG‑T, AIMer and HAETAE. Three foreign algorithms were ML‑KEM, ML‑DSA and SLH‑DSA.
They developed cryptographic modules suited to each institution’s system environment. They applied them to security functions such as section encryption, database encryption and electronic signatures. They tested compatibility with existing systems and measured key exchange time and signature verification time.
They secured 16 cryptographic modules and 19 transition cases. They confirmed the technical feasibility of quantum‑resistant cryptography. The technology has larger key and signature sizes than conventional public‑key cryptography, creating difficulties for low‑spec devices. The project developed optimised algorithms that operate stably in lightweight environments and resolved the issue.
They also resolved constraints from protocol changes in commercial cloud‑based systems used by companies. Companies replaced these with self‑developed quantum‑resistant systems. Project operators gained experience identifying and fixing issues that may arise during real transitions in each industry.
The ministry plans next year to expand support to telecoms, defence and finance and to foster specialised talent and companies in quantum‑resistant cryptography.
Choi Minhee, chair of the National Assembly’s Science, ICT, Broadcasting and Communications Committee, said in a video message that the pilot transition project would accelerate the shift in cryptographic systems across industry and reduce unnecessary trial and error. She said the committee would carry out legislative work and improve related regulations.
Choi Woo‑hyuk, director general for network policy at the ministry, said the project was significant because it laid the groundwork for major services to move to safer security systems against advanced hacking attempts in the quantum‑computing era.
He asked the private sector to join efforts to adopt and spread quantum‑resistant cryptography based on a shared understanding of its necessity and urgency.