This document discusses post-quantum cryptography and code-based cryptography as a potential solution. It provides an overview of cryptography, both symmetric and asymmetric, and explains how quantum computers could break many current systems by solving mathematical problems efficiently. Code-based cryptography is introduced as an alternative that does not rely on these vulnerable problems. The McEliece cryptosystem and Staircase code-based schemes are described. The document then outlines a project to implement a random split of Staircase codes to thwart information set decoding attacks, including researching the topic, developing implementations, validating the approach works as intended, and verifying the results against benchmarks. It emphasizes that development should begin now to have solutions ready when needed.