2022 Seventh International Conference on Mobile and Secure Services (MobiSecServ) 2022
DOI: 10.1109/mobisecserv50855.2022.9727214
|View full text |Cite
|
Sign up to set email alerts
|

Recent Advances in Post-Quantum Cryptography for Networks: A Survey

Abstract: The development of quantum computers poses a new security threat to network infrastructures and services, as they will be powerful enough to break the most common forms of digital encryption. Existing encryption services based on Rivest-Shamir-Adleman (RSA), Diffie-Hellman (DH), Elliptic Curve Cryptography (ECC) and so on are vulnerable to attacks by quantum computers. Although the gap between today's quantum computers and the threats they pose to current public-key cryptography is large, the telecommunication… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
10
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
2
1

Relationship

1
5

Authors

Journals

citations
Cited by 29 publications
(10 citation statements)
references
References 33 publications
0
10
0
Order By: Relevance
“…Modern stream ciphers do not have these types of vulnerabilities. In addition, post-quantum cryptography 44 can increase immunity to these attacks.…”
Section: Discussionmentioning
confidence: 99%
See 3 more Smart Citations
“…Modern stream ciphers do not have these types of vulnerabilities. In addition, post-quantum cryptography 44 can increase immunity to these attacks.…”
Section: Discussionmentioning
confidence: 99%
“…However, their existence in the network domain are still under investigation and there are many challenges to overcome. 44,45 Finally, Table 3 summarizes the comparisons in terms of limitations, benefits and characteristics of each of the key change strategies discussed above, namely Key Refreshing, Hash Functions, Key Hierarchy and the proposed Entropy Service methods discussed in this paper.…”
Section: Discussionmentioning
confidence: 99%
See 2 more Smart Citations
“…Quantum computers are capable of solving problems such as the discrete logarithm, which makes cryptographic algorithms such as Diffie-Hellman key exchange, the Digital Signature Algorithm (DSA), and Elliptic Curve Cryptography (ECC) insecure. Shor's algorithm already provides significant improvements in factorization of large numbers, opening vulnerabilities for quantum computing, while Grover's algorithm can speed up the generation of hashes, making the linking of blocks by hashing less secure [8], [9].…”
Section: B Quantum Computers and Attacks To Blockchainmentioning
confidence: 99%