Preserve circuit-layer confidentiality against a quantum-capable adversary
Many researchers, ourselves included, have been aiming for quite some time to protect Tor traffic against a hypothetical future adversary who has access to a quantum computer capable of breaking ECDH key exchanges which have occurred in the past and been recorded.
This is the parent ticket for organising the work into smaller, byte-sized chunks and tracking overall progress.