Post Quantum Cryptography: A Review of Techniques, Challenges and Standardizations

被引:10
|
作者
Bavdekar, Ritik [1 ]
Chopde, Eashan Jayant [1 ]
Agrawal, Ankit [1 ]
Bhatia, Ashutosh [1 ]
Tiwari, Kamlesh [1 ]
机构
[1] Birla Insitute Technol & Sci Pilani, Dept Comp Sci & Informat Syst, Pilani Campus, Pilani, Rajasthan, India
来源
2023 INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING, ICOIN | 2023年
关键词
Post Quantum Cryptography; Quantum Computers; Shor's Algorithm; NIST PQC Standardization; ALGORITHMS;
D O I
10.1109/ICOIN56518.2023.10048976
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The development of large quantum computers will have dire consequences for cryptography. Most of the symmetric and asymmetric cryptographic algorithms are vulnerable to quantum algorithms. Grover's search algorithm gives a square root time boost for the searching of the key in symmetric schemes like AES and 3DES. The security of asymmetric algorithms like RSA, Diffie Hellman, and ECC is based on the mathematical hardness of prime factorization and discrete logarithms. The best classical algorithms available take exponential time. Shor's factoring algorithm can solve the problems in polynomial time. Major breakthroughs in quantum computing will render all the present-day widely used asymmetric cryptosystems insecure. This paper analyzes the vulnerability of the classical cryptosystems in the context of quantum computers, discusses various post-quantum cryptosystem families, discusses the status of the NIST post-quantum cryptography standardization process, provides a performance comparison of post-quantum cryptography (PQC) algorithms on different platforms, and finally provides a couple of future research directions in this field.
引用
收藏
页码:146 / 151
页数:6
相关论文
共 50 条
  • [21] Post-quantum cryptography and the quantum future of cybersecurity
    Liu, Yi-Kai
    Moody, Dustin
    PHYSICAL REVIEW APPLIED, 2024, 21 (04):
  • [22] Future-Proofing Security for UAVs With Post-Quantum Cryptography: A Review
    Khan, Muhammad Asghar
    Javaid, Shumaila
    Mohsan, Syed Agha Hassnain
    Tanveer, Muhammad
    Ullah, Insaf
    IEEE OPEN JOURNAL OF THE COMMUNICATIONS SOCIETY, 2024, 5 : 6849 - 6871
  • [23] Paradigm of Post-quantum Cryptography and Crypto-agility: Strategy Approach of Quantum-safe Techniques
    Grote, Olaf
    Ahrens, Andreas
    Benavente-Peces, Cesar
    PECCS: PROCEEDINGS OF THE 9TH INTERNATIONAL CONFERENCE ON PERVASIVE AND EMBEDDED COMPUTING AND COMMUNICATION SYSTEMS, 2019, : 91 - 98
  • [24] Review On Cryptography and Steganography Techniques in Video
    Aiswarya, S.
    Gomathi, R.
    2018 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMPUTING RESEARCH (IEEE ICCIC 2018), 2018, : 30 - 33
  • [25] Post-Quantum Crystography: A Combination of Post-Quantum Cryptography and Steganography
    Gabriel, A. J.
    Alese, B. K.
    Adetunmbi, A. O.
    Adewale, O. S.
    2013 8TH INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS (ICITST), 2013, : 449 - +
  • [26] Post-Quantum Cryptography in Embedded Systems
    Marzougui, Soundes
    Kraemer, Juliane
    14TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES 2019), 2019,
  • [27] Benchmarking Post-quantum Cryptography in TLS
    Paquin, Christian
    Stebila, Douglas
    Tamvada, Goutam
    POST-QUANTUM CRYPTOGRAPHY, PQCRYPTO 2020, 2020, 12100 : 72 - 91
  • [28] Post-quantum cryptography for automotive systems
    Fritzmann T.
    Vith J.
    Flórez D.
    Sepúlveda J.
    Microprocessors and Microsystems, 2021, 87
  • [29] EasyPQC: Verifying Post-Quantum Cryptography
    Barbosa, Manuel
    Barthe, Gilles
    Fan, Xiong
    Gregoire, Benjamin
    Hung, Shih-Han
    Katz, Jonathan
    Strub, Pierre-Yves
    Wu, Xiaodi
    Zhou, Li
    CCS '21: PROCEEDINGS OF THE 2021 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2021, : 2564 - 2586
  • [30] A Mathematical Perspective on Post-Quantum Cryptography
    Richter, Maximilian
    Bertram, Magdalena
    Seidensticker, Jasper
    Tschache, Alexander
    MATHEMATICS, 2022, 10 (15)