DSpace Repository

Post Quantum Cryptography: A Review of Techniques, Challenges and Standardizations

Show simple item record

dc.contributor.author Bhatia, Ashutosh
dc.contributor.author Tiwari, Kamlesh
dc.date.accessioned 2024-10-14T10:02:58Z
dc.date.available 2024-10-14T10:02:58Z
dc.date.issued 2023
dc.identifier.uri https://ieeexplore.ieee.org/document/10048976/keywords#keywords
dc.identifier.uri http://dspace.bits-pilani.ac.in:8080/jspui/handle/123456789/16078
dc.description.abstract The development of large quantum computers will have dire consequences for cryptography. Most of the symmetric and asymmetric cryptographic algorithms are vulnerable to quantum algorithms. Grover’s search algorithm gives a square root time boost for the searching of the key in symmetric schemes like AES and 3DES. The security of asymmetric algorithms like RSA, Diffie Hellman, and ECC is based on the mathematical hardness of prime factorization and discrete logarithms. The best classical algorithms available take exponential time. Shor’s factoring algorithm can solve the problems in polynomial time. Major breakthroughs in quantum computing will render all the present-day widely used asymmetric cryptosystems insecure. This paper analyzes the vulnerability of the classical cryptosystems in the context of quantum computers, discusses various post-quantum cryptosystem families, discusses the status of the NIST post-quantum cryptography standardization process, provides a performance comparison of post-quantum cryptography (PQC) algorithms on different platforms, and finally provides a couple of future research directions in this field en_US
dc.language.iso en en_US
dc.publisher IEEE en_US
dc.subject Computer Science en_US
dc.subject Post Quantum Cryptography en_US
dc.subject Quantum Computers en_US
dc.subject NIST PQC Standardization en_US
dc.title Post Quantum Cryptography: A Review of Techniques, Challenges and Standardizations en_US
dc.type Article en_US


Files in this item

Files Size Format View

There are no files associated with this item.

This item appears in the following Collection(s)

Show simple item record

Search DSpace


Advanced Search

Browse

My Account