Securing the Future: A Comprehensive Review of Post -Quantum Cryptography and Emerging Algorithms

被引:0
|
作者
Allgyer, Winfred [1 ]
White, Tyler [1 ]
Youssef, Tarek A. [1 ]
机构
[1] Univ West Florida, Elect & Comp Engn, Pensacola, FL 32514 USA
来源
关键词
post-quantum; cryptography; encryption; qubits; quantum threats;
D O I
10.1109/SOUTHEASTCON52093.2024.10500031
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In the modern world, technological advancements are being made nearly every day. However, some of these advancements also give way to new vulnerabilities in the security systems implemented in the world today. Specifically, the slowly growing realm of quantum computers has triggered many researchers and experts to raise the alarm on the security of current cryptographic methods used to safeguard personal and valuable information from unauthorized entities. Many experts agree that the topic of post-quantum cryptography is a field that needs immediate attention to prevent a severe crisis when quantum computers become stable enough to run reliably. While it has been slow to this point, a breakthrough will likely trigger a wave of innovation that could rapidly overtake the world. In this paper, the current cryptographic systems, the basics of quantum computing, and post-quantum cryptography as well as the new algorithms associated with it will be discussed. This paper will provide a base of information in which readers will be introduced to several viewpoints regarding the matter of post-quantum cryptography.
引用
收藏
页码:1282 / 1287
页数:6
相关论文
共 50 条
  • [1] Securing the future internet of things with post-quantum cryptography
    Kumar, Adarsh
    Ottaviani, Carlo
    Gill, Sukhpal Singh
    Buyya, Rajkumar
    SECURITY AND PRIVACY, 2022, 5 (02)
  • [2] Securing the future: exploring post-quantum cryptography for authentication and user privacy in IoT devices
    Mansoor, Khwaja
    Afzal, Mehreen
    Iqbal, Waseem
    Abbas, Yawar
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2025, 28 (02):
  • [3] Post-quantum cryptography and the quantum future of cybersecurity
    Liu, Yi-Kai
    Moody, Dustin
    PHYSICAL REVIEW APPLIED, 2024, 21 (04):
  • [4] Future-Proofing Security for UAVs With Post-Quantum Cryptography: A Review
    Khan, Muhammad Asghar
    Javaid, Shumaila
    Mohsan, Syed Agha Hassnain
    Tanveer, Muhammad
    Ullah, Insaf
    IEEE OPEN JOURNAL OF THE COMMUNICATIONS SOCIETY, 2024, 5 : 6849 - 6871
  • [5] Current and future panorama of Quantum and Post-Quantum Cryptography
    Claudio, Mendilaharzu
    Fernando, Figueras
    2024 IEEE BIENNIAL CONGRESS OF ARGENTINA, ARGENCON 2024, 2024,
  • [6] Securing Networks using Quantum Cryptography
    Chaudhuri, Kostav
    Singh, Tanya
    2015 4TH INTERNATIONAL CONFERENCE ON RELIABILITY, INFOCOM TECHNOLOGIES AND OPTIMIZATION (ICRITO) (TRENDS AND FUTURE DIRECTIONS), 2015,
  • [7] Quantum algorithms for attacking hardness assumptions in classical and post-quantum cryptography
    Biasse, J-F
    Bonnetain, X.
    Kirshanova, E.
    Schrottenloher, A.
    Song, F.
    IET INFORMATION SECURITY, 2023, 17 (02) : 171 - 209
  • [8] A Review on Cryptography Protocol for Securing Data
    Rahim, Robbi
    1ST INTERNATIONAL CONFERENCE ON ENGINEERING AND APPLIED SCIENCE, 2019, 1381
  • [9] Quantum Cryptography for Future Networks Security: A Systematic Review
    Durr-E-Shahwar
    Imran, Muhammad
    Altamimi, Ahmed B.
    Khan, Wilayat
    Hussain, Shariq
    Alsaffar, Mohammad
    IEEE ACCESS, 2024, 12 : 180048 - 180078
  • [10] Post Quantum Cryptography: A Review of Techniques, Challenges and Standardizations
    Bavdekar, Ritik
    Chopde, Eashan Jayant
    Agrawal, Ankit
    Bhatia, Ashutosh
    Tiwari, Kamlesh
    2023 INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING, ICOIN, 2023, : 146 - 151