MANET (Mobile ad hoc networks) are famous in research due to their ad hoc nature and effectiveness during calamities across continents when no framework support is free. Wireless network interfaces have a limited transmission range; nodes may require multiple network hops to trade information across the organization. Each versatile node functions like a switch in such an organization, sending details to the other portable connected nodes. The nodes should not interrupt communication and associate themselves with the correct information transfer. Another significant issue was the development of expandable route discoveries capable of assessing rapid topography variations and numerous network detachments caused by high vehicle quality. This research article describes extensive technological changes, including the components and flaws of current progressive routing algorithms. Routing protocols designed for wired networks, such as the distance vector or connection state conventions, are inadequate for this application because they assume fixed geography and high overheads. This research article includes the MANET-supported routing protocols and their performance analysis across various performance parameters such as packet delivery ratio, average throughput, residual energy, and delay.
Objective: Quantum algorithms are stronger and more secure than classical computers because they run on faster, harder ones and require fewer steps. With Quantum computers, the attackers have high computing power, and with a quantum, the algorithm can easily break the cryptographic system. Lattice is a regularly spaced grid of points stretching to infinity. Quantum safe security algorithms are resistant to both attacks caused by quantum computers and attacks caused by classical computers. Lattice-based cryptography is the postquantum cryptographic standards resistant to the attacks from quantum computers, hence having the advantage of strong security and high efficiency. The paper's main objective is to study Lattice, lattice properties, Latticebased cryptographic algorithm to design new Latticebased cryptographic algorithms that are quantum resistant in the future. Methods: In this paper, lattice-based cryptography is discussed right from its seminal work to its efficient cryptographic schemes. Paper discusses Lattice, lattice properties, lattice problem, the algorithmic solution to lattice problem, and lattice-based cryptography. Findings: After studying post-quantum cryptographic algorithms using Lattice, lattice-based post-quantum cryptographic algorithms are resistant to quantum computer attacks. Novelty: The paper discusses Lattice, properties of Lattice in a simple way. Widely used cryptographic algorithms like RSA, Diffie-Hellman Key exchange, Elliptic Curve Cryptography are not resistant to quantum computer attacks. Paper discusses the importance of a post-quantum algorithm using Lattice that is resistant to quantum computer attacks.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.