temp

Comparison of cryptographic schemes

Cryptographic Algorithm Type Purpose Quantum Safe? Available Now?
RSA, ECDSA Asymmetric Key Establishment, Signatures No Yes
AES-GCM Symmetric Encryption Larger Key Sizes Needed Yes
SHA-3 - Hash Function Larger Output Needed Yes
Post Quantum Cryptography Public Encryption, Key Establishment, Signatures Yes No
Quantum Key Distribution Symmetric Key Generation Yes Yes

References:
Quantum Computing: Progress and Prospects Sect 4.1.1, 4.1.4, National Academies of Sciences, Engineering, and Medicine 2019

The Impact of Quantum Computing on Present Cryptography, Vasileios Mavroeidis et. al. IJACSA, 9(3), 405-414, 2018