This document discusses post-quantum cryptography and the potential threats quantum computers pose to current encryption standards. It covers the history of computing technology from vacuum tubes to transistors reaching their limits, and introduces quantum computing as the next potential breakthrough. It then summarizes several post-quantum encryption techniques like quantum-to-quantum encryption, hash-based signatures, and lattice-based cryptography. It also discusses current encryption standards and Google's experiments with post-quantum cryptography using ring-learning-with-errors based on lattices.