Post Quantum Cryptography: A Review of Techniques, Challenges and Standardizations

被引:10
|
作者
Bavdekar, Ritik [1 ]
Chopde, Eashan Jayant [1 ]
Agrawal, Ankit [1 ]
Bhatia, Ashutosh [1 ]
Tiwari, Kamlesh [1 ]
机构
[1] Birla Insitute Technol & Sci Pilani, Dept Comp Sci & Informat Syst, Pilani Campus, Pilani, Rajasthan, India
来源
2023 INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING, ICOIN | 2023年
关键词
Post Quantum Cryptography; Quantum Computers; Shor's Algorithm; NIST PQC Standardization; ALGORITHMS;
D O I
10.1109/ICOIN56518.2023.10048976
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The development of large quantum computers will have dire consequences for cryptography. Most of the symmetric and asymmetric cryptographic algorithms are vulnerable to quantum algorithms. Grover's search algorithm gives a square root time boost for the searching of the key in symmetric schemes like AES and 3DES. The security of asymmetric algorithms like RSA, Diffie Hellman, and ECC is based on the mathematical hardness of prime factorization and discrete logarithms. The best classical algorithms available take exponential time. Shor's factoring algorithm can solve the problems in polynomial time. Major breakthroughs in quantum computing will render all the present-day widely used asymmetric cryptosystems insecure. This paper analyzes the vulnerability of the classical cryptosystems in the context of quantum computers, discusses various post-quantum cryptosystem families, discusses the status of the NIST post-quantum cryptography standardization process, provides a performance comparison of post-quantum cryptography (PQC) algorithms on different platforms, and finally provides a couple of future research directions in this field.
引用
收藏
页码:146 / 151
页数:6
相关论文
共 50 条
  • [31] Review of Security Methods Based on Classical Cryptography and Quantum Cryptography
    Subramani, Shalini
    Selvi, M.
    Kannan, A.
    Svn, Santhosh Kumar
    CYBERNETICS AND SYSTEMS, 2025, 56 (03) : 302 - 320
  • [32] Implementing Post-quantum Cryptography for Developers
    Hekkala J.
    Muurman M.
    Halunen K.
    Vallivaara V.
    SN Computer Science, 4 (4)
  • [33] Post-Quantum Cryptography in MPSoC Environments
    Sepulveda, Johanna
    Winkler, Dominik
    Sepulveda, Daniel
    Cupelli, Mario
    Olexa, Radek
    PROCEEDINGS OF THE 2021 IFIP/IEEE INTERNATIONAL CONFERENCE ON VERY LARGE SCALE INTEGRATION (VLSI-SOC), 2021, : 224 - 229
  • [34] Post-quantum cryptography: lattice signatures
    Buchmann, Johannes
    Lindner, Richard
    Rueckert, Markus
    Schneider, Michael
    COMPUTING, 2009, 85 (1-2) : 105 - 125
  • [35] Post-Quantum Cryptography in WireGuard VPN
    Kniep, Quentin M.
    Mueller, Wolf
    Redlich, Jens-Peter
    SECURITY AND PRIVACY IN COMMUNICATION NETWORKS (SECURECOMM 2020), PT II, 2020, 336 : 261 - 267
  • [36] FPGA Accelerated Post-Quantum Cryptography
    Li, He
    Tang, Yongming
    Que, Zhiqiang
    Zhang, Jiliang
    IEEE TRANSACTIONS ON NANOTECHNOLOGY, 2022, 21 : 685 - 691
  • [37] Implementing Post-quantum Cryptography for Developers
    Hekkala, Julius
    Halunen, Kimmo
    Vallivaara, Visa
    PROCEEDINGS OF THE 8TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY (ICISSP), 2021, : 73 - 83
  • [38] A Quantum of QUIC: Dissecting Cryptography with Post-Quantum Insights
    Kempf, Marcel
    Gauder, Nikolas
    Jaeger, Benedikt
    Zirngibl, Johannes
    Carle, Georg
    2024 23RD IFIP NETWORKING CONFERENCE, IFIP NETWORKING 2024, 2024, : 186 - 194
  • [39] A roadmap from classical cryptography to post-quantum resistant cryptography for 5G-enabled IoT: Challenges, opportunities and solutions
    Chawla, Diksha
    Mehra, Pawan Singh
    INTERNET OF THINGS, 2023, 24
  • [40] Research Trends in Post-quantum Cryptography
    Xagawa, Keita
    NTT Tech. Rev., 2019, 3 (22-26): : 22 - 26