1. Introduction of the threat posed by quantum computing to current encryption standards; 2. Discussion on the vulnerability of DSA, RSA, and elliptic curve-based encryption; 3. Overview of the need for post-quantum cryptography algorithms.