DSpace logo

Please use this identifier to cite or link to this item: http://dspace.bits-pilani.ac.in:8080/jspui/handle/123456789/16078
Full metadata record
DC FieldValueLanguage
dc.contributor.authorBhatia, Ashutosh-
dc.contributor.authorTiwari, Kamlesh-
dc.date.accessioned2024-10-14T10:02:58Z-
dc.date.available2024-10-14T10:02:58Z-
dc.date.issued2023-
dc.identifier.urihttps://ieeexplore.ieee.org/document/10048976/keywords#keywords-
dc.identifier.urihttp://dspace.bits-pilani.ac.in:8080/jspui/handle/123456789/16078-
dc.description.abstractThe development of large quantum computers will have dire consequences for cryptography. Most of the symmetric and asymmetric cryptographic algorithms are vulnerable to quantum algorithms. Grover’s search algorithm gives a square root time boost for the searching of the key in symmetric schemes like AES and 3DES. The security of asymmetric algorithms like RSA, Diffie Hellman, and ECC is based on the mathematical hardness of prime factorization and discrete logarithms. The best classical algorithms available take exponential time. Shor’s factoring algorithm can solve the problems in polynomial time. Major breakthroughs in quantum computing will render all the present-day widely used asymmetric cryptosystems insecure. This paper analyzes the vulnerability of the classical cryptosystems in the context of quantum computers, discusses various post-quantum cryptosystem families, discusses the status of the NIST post-quantum cryptography standardization process, provides a performance comparison of post-quantum cryptography (PQC) algorithms on different platforms, and finally provides a couple of future research directions in this fielden_US
dc.language.isoenen_US
dc.publisherIEEEen_US
dc.subjectComputer Scienceen_US
dc.subjectPost Quantum Cryptographyen_US
dc.subjectQuantum Computersen_US
dc.subjectNIST PQC Standardizationen_US
dc.titlePost Quantum Cryptography: A Review of Techniques, Challenges and Standardizationsen_US
dc.typeArticleen_US
Appears in Collections:Department of Computer Science and Information Systems

Files in This Item:
There are no files associated with this item.


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.