2022
DOI: 10.48550/arxiv.2202.02826
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

Post Quantum Cryptography: Techniques, Challenges, Standardization, and Directions for Future Research

Abstract: The development of large quantum computers will have dire consequences for cryptography. Most of the symmetric and asymmetric cryptographic algorithms are vulnerable to quantum algorithms. Grover's search algorithm gives a square root time boost for the searching of the key in symmetric schemes like AES and 3DES. The security of asymmetric algorithms like RSA, Diffie Hellman, and ECC is based on the mathematical hardness of prime factorization and discrete logarithm. The best classical algorithms available tak… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(4 citation statements)
references
References 24 publications
0
4
0
Order By: Relevance
“…Comparably, the Raspberry Pi 4 has similar specifications and therefore more closely represents the IoT devices of today. Previous studies have either used non-constrained devices [40,42] due to the availability of technology or devices of very limited capability compared to current IoT device standards [58][59][60]. Furthermore, some finalist PQAs, such as BIKE and Classic McEliece, have been modified for performance optimization between the second and third rounds of the NIST competition, and it is therefore prudent to test the most recent iterations of these PQAs [24,25].…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…Comparably, the Raspberry Pi 4 has similar specifications and therefore more closely represents the IoT devices of today. Previous studies have either used non-constrained devices [40,42] due to the availability of technology or devices of very limited capability compared to current IoT device standards [58][59][60]. Furthermore, some finalist PQAs, such as BIKE and Classic McEliece, have been modified for performance optimization between the second and third rounds of the NIST competition, and it is therefore prudent to test the most recent iterations of these PQAs [24,25].…”
Section: Discussionmentioning
confidence: 99%
“…Given the increase in the number of IoT devices transmitting encrypted data, the work developed in ref. [40] discusses the need for 'lightweight' PQAs that are quantumsafe but with minimal overheads. Ref.…”
Section: Post-quantum Cryptography and Iot Devicesmentioning
confidence: 99%
“…These include optimisation problems, cryptography, and simulation of quantum systems. For example, quantum computers have the potential to break classical cryptographic protocols, such as RSA encryption, by factoring large numbers exponentially faster than classical algorithms (Bavdekar, Chopde, Bhatia, Tiwari, & Daniel, 2022;Petrenko & Petrenko, 2022). Furthermore, quantum computing offers the promise of more efficient algorithms for a wide range of applications, from drug discovery and materials science to financial modeling and machine learning.…”
Section: Advantages Of Quantum Computingmentioning
confidence: 99%
“…Data flowing through encrypted networks has become harder to exploit using existing means. Reference [13] proposes a cryptography technique that is impenetrable even by brute force with a quantum computer. However, with the advent of machine learning and deep learning algorithms, researchers have started taking a different approach for deciphering network data.…”
Section: Related Workmentioning
confidence: 99%