Hoskinson Breaks Down Hash vs Lattice Cryptography

Charles Hoskinson Highlights Hashing vs Lattice-Based Cryptography as Post-Quantum Standards Take Shape

Cardano founder Charles Hoskinson weighed in on a recurring source of confusion in security and crypto engineering: the difference between hashing and encryption, and how those concepts relate to the industry’s growing focus on post-quantum cryptography.

The discussion framed cryptography in practical terms—when to hash, when to encrypt, and why using the right tool for the job matters. Hash functions are typically used to create a fixed-length “fingerprint” of data for integrity checks and safe password storage, while encryption is designed to keep information confidential and recoverable by authorized parties.

Alongside these basics, Hoskinson pointed to the broader context: the emergence of cryptographic standards intended to withstand future quantum computers. Quantum machines are expected to threaten some widely deployed public-key systems, prompting governments and the private sector to plan for upgrades well before quantum capability becomes practical at scale.

Two lattice-based algorithms, CRYSTALS-Kyber and CRYSTALS-Dilithium, were among the first post-quantum algorithms standardized by the U.S. National Institute of Standards and Technology (NIST). Their selection reflects years of evaluation of security assumptions, performance trade-offs, and implementation considerations.

The conversation also referenced other families of post-quantum approaches, including multivariate cryptography. One example is the Rainbow scheme, based on the difficulty of solving systems of multivariate equations—often described through the “Unbalanced Oil and Vinegar” construction.

Why it matters for crypto is straightforward: blockchains, wallets, and infrastructure rely heavily on public-key cryptography for identity and transaction authorization, and the ecosystem’s long time horizons make migration planning especially relevant. For developers and security teams, the takeaway is both technical and ethical—apply hashing and encryption correctly today, and design systems with a realistic path to post-quantum upgrades tomorrow.

Similar Posts