Post-Quantum Security: Opportunities and Challenges

被引:6
|
作者
Li, Silong [1 ]
Chen, Yuxiang [1 ]
Chen, Lin [1 ]
Liao, Jing [1 ]
Kuang, Chanchan [1 ]
Li, Kuanching [1 ]
Liang, Wei [1 ]
Xiong, Naixue [1 ]
机构
[1] Hunan Univ Sci & Technol, Sch Comp Sci & Engn, Xiangtan 411201, Peoples R China
关键词
cryptography; post-quantum encryption; quantum computing; CRYSTALS-KYBER; quantum security; SCHEME; ALGORITHMS; SIGNATURES; INTERNET; SYSTEM;
D O I
10.3390/s23218744
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
Cryptography is very essential in our daily life, not only for confidentiality of information, but also for information integrity verification, non-repudiation, authentication, and other aspects. In modern society, cryptography is widely used; everything from personal life to national security is inseparable from it. With the emergence of quantum computing, traditional encryption methods are at risk of being cracked. People are beginning to explore methods for defending against quantum computer attacks. Among the methods currently developed, quantum key distribution is a technology that uses the principles of quantum mechanics to distribute keys. Post-quantum encryption algorithms are encryption methods that rely on mathematical challenges that quantum computers cannot solve quickly to ensure security. In this study, an integrated review of post-quantum encryption algorithms is conducted from the perspective of traditional cryptography. First, the concept and development background of post-quantum encryption are introduced. Then, the post-quantum encryption algorithm Kyber is studied. Finally, the achievements, difficulties and outstanding problems in this emerging field are summarized, and some predictions for the future are made.
引用
收藏
页数:26
相关论文
共 50 条
  • [1] Post-Quantum Cryptography: Challenges and Opportunities for Robust and Secure HW Design
    Bellizia, Davide
    El Mrabet, Nadia
    Fournaris, Apostolos P.
    Pontie, Simon
    Regazzoni, Francesco
    Standaert, Francois-Xavier
    Tasso, Elise
    Valea, Emanuele
    34TH IEEE INTERNATIONAL SYMPOSIUM ON DEFECT AND FAULT TOLERANCE IN VLSI AND NANOTECHNOLOGY SYSTEMS (DFT 2021), 2021,
  • [2] A note on quantum security for post-quantum cryptography
    Song, Fang
    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2014, 8772 : 246 - 265
  • [3] A Note on Quantum Security for Post-Quantum Cryptography
    Song, Fang
    POST-QUANTUM CRYPTOGRAPHY, PQCRYPTO 2014, 2014, 8772 : 246 - 265
  • [4] Quantum and Post-Quantum Security in Future Networks
    Sanon, Sogo Pierre
    Alzalam, Ihab
    Schotten, Hans D.
    2023 IEEE FUTURE NETWORKS WORLD FORUM, FNWF, 2024,
  • [5] Post-quantum Security of the Sponge Construction
    Czajkowski, Jan
    Bruinderink, Leon Groot
    Hulsing, Andreas
    Schaffner, Christian
    Unruh, Dominique
    POST-QUANTUM CRYPTOGRAPHY, PQCRYPTO 2018, 2018, 10786 : 185 - 204
  • [6] Post-Quantum Primitives in Information Security
    Aleksandrova, E. B.
    Shtyrkina, A. A.
    Iarmak, A. V.
    NONLINEAR PHENOMENA IN COMPLEX SYSTEMS, 2019, 22 (03): : 269 - 276
  • [7] Post-Quantum Security of Communication and Messaging Protocols: Achievements, Challenges and New Perspectives
    Bobrysheva, Julia
    Zapechnikov, Sergey
    PROCEEDINGS OF THE 2019 IEEE CONFERENCE OF RUSSIAN YOUNG RESEARCHERS IN ELECTRICAL AND ELECTRONIC ENGINEERING (EICONRUS), 2019, : 1803 - 1806
  • [8] Security Analysis of Classical and Post-Quantum Blockchains
    Dahhak, Hajar
    Afifi, Nadia
    Hilal, Imane
    JOURNAL OF COMPUTER INFORMATION SYSTEMS, 2024,
  • [9] Ensuring Security & Trust in a Post-Quantum Environment
    Manfred Paeschke
    Walter Fumy
    Andreas Wilke
    Datenschutz und Datensicherheit - DuD, 2019, 43 (7) : 440 - 443
  • [10] Post-Quantum Security Models for Authenticated Encryption
    Soukharev, Vladimir
    Jao, David
    Seshadri, Srinath
    POST-QUANTUM CRYPTOGRAPHY, PQCRYPTO 2016, 2016, 9606 : 64 - 78