Post Quantum Cryptography: A Review of Techniques, Challenges and Standardizations

被引:10
|
作者
Bavdekar, Ritik [1 ]
Chopde, Eashan Jayant [1 ]
Agrawal, Ankit [1 ]
Bhatia, Ashutosh [1 ]
Tiwari, Kamlesh [1 ]
机构
[1] Birla Insitute Technol & Sci Pilani, Dept Comp Sci & Informat Syst, Pilani Campus, Pilani, Rajasthan, India
关键词
Post Quantum Cryptography; Quantum Computers; Shor's Algorithm; NIST PQC Standardization; ALGORITHMS;
D O I
10.1109/ICOIN56518.2023.10048976
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The development of large quantum computers will have dire consequences for cryptography. Most of the symmetric and asymmetric cryptographic algorithms are vulnerable to quantum algorithms. Grover's search algorithm gives a square root time boost for the searching of the key in symmetric schemes like AES and 3DES. The security of asymmetric algorithms like RSA, Diffie Hellman, and ECC is based on the mathematical hardness of prime factorization and discrete logarithms. The best classical algorithms available take exponential time. Shor's factoring algorithm can solve the problems in polynomial time. Major breakthroughs in quantum computing will render all the present-day widely used asymmetric cryptosystems insecure. This paper analyzes the vulnerability of the classical cryptosystems in the context of quantum computers, discusses various post-quantum cryptosystem families, discusses the status of the NIST post-quantum cryptography standardization process, provides a performance comparison of post-quantum cryptography (PQC) algorithms on different platforms, and finally provides a couple of future research directions in this field.
引用
收藏
页码:146 / 151
页数:6
相关论文
共 50 条
  • [1] Formal Verification Techniques for Post-quantum Cryptography: A Systematic Review
    Xu, Yuexi
    Li, Zhenyuan
    Dong, Naipeng
    Kuchta, Veronika
    Hou, Zhe
    Liu, Dongxi
    ENGINEERING OF COMPLEX COMPUTER SYSTEMS, ICECCS 2024, 2025, 14784 : 346 - 366
  • [2] Challenges and Rewards of Implementing and Benchmarking Post-Quantum Cryptography in Hardware
    Gaj, Kris
    PROCEEDINGS OF THE 2018 GREAT LAKES SYMPOSIUM ON VLSI (GLSVLSI'18), 2018, : 359 - 364
  • [3] Identifying research challenges in post quantum cryptography migration and cryptographic agility
    Ott, David
    Peikert, Christopher
    arXiv, 2019,
  • [4] Quantum Cryptography : The Concept and Challenges
    Sharma, Anand
    Goar, Vishal
    Belwal, Ramesh Chandra
    Ojha, Vibha
    2010 2ND INTERNATIONAL CONFERENCE ON COMPUTER AND AUTOMATION ENGINEERING (ICCAE 2010), VOL 1, 2010, : 710 - 713
  • [5] Post-Quantum Cryptography
    Monroe, Don
    COMMUNICATIONS OF THE ACM, 2023, 66 (02) : 15 - 17
  • [6] Post-quantum cryptography
    Bernstein, Daniel J.
    Lange, Tanja
    NATURE, 2017, 549 (7671) : 188 - 194
  • [7] Post-quantum cryptography
    Daniel J. Bernstein
    Tanja Lange
    Nature, 2017, 549 : 188 - 194
  • [8] Post-Quantum Cryptography: Challenges and Opportunities for Robust and Secure HW Design
    Bellizia, Davide
    El Mrabet, Nadia
    Fournaris, Apostolos P.
    Pontie, Simon
    Regazzoni, Francesco
    Standaert, Francois-Xavier
    Tasso, Elise
    Valea, Emanuele
    34TH IEEE INTERNATIONAL SYMPOSIUM ON DEFECT AND FAULT TOLERANCE IN VLSI AND NANOTECHNOLOGY SYSTEMS (DFT 2021), 2021,
  • [9] Post-quantum cryptography based on codes: state of the art and open challenges
    Baldi, Marco
    Santini, Paolo
    Cancellieri, Giovanni
    2017 AEIT INTERNATIONAL ANNUAL CONFERENCE, 2017,
  • [10] Exploring Post-Quantum Cryptography: Review and Directions for the Transition Process
    Dekkaki, Kanza Cherkaoui
    Tasic, Igor
    Cano, Maria-Dolores
    TECHNOLOGIES, 2024, 12 (12)