Post Quantum Cryptography: A Review of Techniques, Challenges and Standardizations

被引:10
|
作者
Bavdekar, Ritik [1 ]
Chopde, Eashan Jayant [1 ]
Agrawal, Ankit [1 ]
Bhatia, Ashutosh [1 ]
Tiwari, Kamlesh [1 ]
机构
[1] Birla Insitute Technol & Sci Pilani, Dept Comp Sci & Informat Syst, Pilani Campus, Pilani, Rajasthan, India
来源
2023 INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING, ICOIN | 2023年
关键词
Post Quantum Cryptography; Quantum Computers; Shor's Algorithm; NIST PQC Standardization; ALGORITHMS;
D O I
10.1109/ICOIN56518.2023.10048976
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The development of large quantum computers will have dire consequences for cryptography. Most of the symmetric and asymmetric cryptographic algorithms are vulnerable to quantum algorithms. Grover's search algorithm gives a square root time boost for the searching of the key in symmetric schemes like AES and 3DES. The security of asymmetric algorithms like RSA, Diffie Hellman, and ECC is based on the mathematical hardness of prime factorization and discrete logarithms. The best classical algorithms available take exponential time. Shor's factoring algorithm can solve the problems in polynomial time. Major breakthroughs in quantum computing will render all the present-day widely used asymmetric cryptosystems insecure. This paper analyzes the vulnerability of the classical cryptosystems in the context of quantum computers, discusses various post-quantum cryptosystem families, discusses the status of the NIST post-quantum cryptography standardization process, provides a performance comparison of post-quantum cryptography (PQC) algorithms on different platforms, and finally provides a couple of future research directions in this field.
引用
收藏
页码:146 / 151
页数:6
相关论文
共 50 条
  • [41] Post-quantum cryptography: lattice signatures
    Johannes Buchmann
    Richard Lindner
    Markus Rückert
    Michael Schneider
    Computing, 2009, 85 : 105 - 125
  • [42] Post-Quantum Cryptography for Embedded Systems
    Koziel, Brian
    Kermani, Mehran Mozaffari
    Azarderakhsh, Reza
    2022 IEEE MEXICAN INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE (ENC), 2022,
  • [43] Transitioning organizations to post-quantum cryptography
    David Joseph
    Rafael Misoczki
    Marc Manzano
    Joe Tricot
    Fernando Dominguez Pinuaga
    Olivier Lacombe
    Stefan Leichenauer
    Jack Hidary
    Phil Venables
    Royal Hansen
    Nature, 2022, 605 : 237 - 243
  • [44] Recent Developments in Post-Quantum Cryptography
    Takagi, Tsuyoshi
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2018, E101A (01) : 3 - 11
  • [45] Transitioning organizations to post-quantum cryptography
    Joseph, David
    Misoczki, Rafael
    Manzano, Marc
    Tricot, Joe
    Pinuaga, Fernando Dominguez
    Lacombe, Olivier
    Leichenauer, Stefan
    Hidary, Jack
    Venables, Phil
    Hansen, Royal
    NATURE, 2022, 605 (7909) : 237 - 243
  • [46] Current and future panorama of Quantum and Post-Quantum Cryptography
    Claudio, Mendilaharzu
    Fernando, Figueras
    2024 IEEE BIENNIAL CONGRESS OF ARGENTINA, ARGENCON 2024, 2024,
  • [47] Quantum Cryptography: Overview, Security Issues and Future Challenges
    Mitra, Saptarshi
    Jana, Bappaditya
    Bhattacharya, Supratim
    Pal, Prashnatita
    Poray, Jayanta
    2017 4TH INTERNATIONAL CONFERENCE ON OPTO-ELECTRONICS AND APPLIED OPTICS (OPTRONIX), 2017,
  • [48] The Main Idea of Quantum Cryptography and Overview of Quantum Key Distribution Techniques
    Tratnik, Jurij
    Batagelj, Bostjan
    ELEKTROTEHNISKI VESTNIK-ELECTROCHEMICAL REVIEW, 2008, 75 (05): : 257 - 263
  • [49] Information security in the post quantum era for 5G and beyond networks: Threats to existing cryptography, and post-quantum cryptography
    Chamola, Vinay
    Jolfaei, Alireza
    Chanana, Vaibhav
    Parashari, Prakhar
    Hassija, Vikas
    COMPUTER COMMUNICATIONS, 2021, 176 : 99 - 118
  • [50] Review on lightweight cryptography techniques and steganography techniques for IoT environment
    Supriya, K. Sangeetha
    Lovesum, S. P. Jeno
    INTERNATIONAL JOURNAL OF SYSTEM ASSURANCE ENGINEERING AND MANAGEMENT, 2024, 15 (09) : 4210 - 4228