All docs
Security & ArchitectureSecurity reviewers, IT

Post-quantum cryptography

1 min readUpdated May 6, 2026

InviziPoll implements post-quantum cryptographic protections to defend against the "harvest now, decrypt later" threat — where adversaries archive today's encrypted traffic for future decryption by quantum computers.

Algorithms

  • Key encapsulation: X-Wing hybrid construction pairing X25519 with ML-KEM-768 (FIPS 203, Security Category 3).
  • Digital signatures: ML-DSA-65 (FIPS 204, Security Category 3) replaces standalone Ed25519 for new material.

Implementation approach

  • Post-quantum operations run in the browser using audited, standard cryptographic libraries.
  • Key material is held in the browser's secure storage so sensitive operations stay on the client.

Storage and versioning

  • Stored ciphertext is treated as opaque binary.
  • A version field distinguishes legacy classical material from post-quantum hybrid ciphertext and signatures.

Upgrading existing workspaces

Workspaces that started on classical cryptography may upgrade key material to post-quantum protections during normal use (for example, when you sign in). The process is designed to complete in a consistent state; if it does not finish in one session, it retries later—your vault should never be left in an inconsistent split state.

Post-quantum protections cover admin and workspace key material. Respondent anonymity guarantees are independent of the algorithm choice.