Post-Quantum Security: Opportunities and Challenges

被引:6
|
作者
Li, Silong [1 ]
Chen, Yuxiang [1 ]
Chen, Lin [1 ]
Liao, Jing [1 ]
Kuang, Chanchan [1 ]
Li, Kuanching [1 ]
Liang, Wei [1 ]
Xiong, Naixue [1 ]
机构
[1] Hunan Univ Sci & Technol, Sch Comp Sci & Engn, Xiangtan 411201, Peoples R China
关键词
cryptography; post-quantum encryption; quantum computing; CRYSTALS-KYBER; quantum security; SCHEME; ALGORITHMS; SIGNATURES; INTERNET; SYSTEM;
D O I
10.3390/s23218744
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
Cryptography is very essential in our daily life, not only for confidentiality of information, but also for information integrity verification, non-repudiation, authentication, and other aspects. In modern society, cryptography is widely used; everything from personal life to national security is inseparable from it. With the emergence of quantum computing, traditional encryption methods are at risk of being cracked. People are beginning to explore methods for defending against quantum computer attacks. Among the methods currently developed, quantum key distribution is a technology that uses the principles of quantum mechanics to distribute keys. Post-quantum encryption algorithms are encryption methods that rely on mathematical challenges that quantum computers cannot solve quickly to ensure security. In this study, an integrated review of post-quantum encryption algorithms is conducted from the perspective of traditional cryptography. First, the concept and development background of post-quantum encryption are introduced. Then, the post-quantum encryption algorithm Kyber is studied. Finally, the achievements, difficulties and outstanding problems in this emerging field are summarized, and some predictions for the future are made.
引用
收藏
页数:26
相关论文
共 50 条
  • [21] Post-quantum security on the Lai-Massey scheme
    Zhang, Zhongya
    Wu, Wenling
    Sui, Han
    Wang, Bolin
    DESIGNS CODES AND CRYPTOGRAPHY, 2023, 91 (08) : 2687 - 2704
  • [22] Post-quantum Techniques in Wireless Network Security: An Overview
    Fakhruldeen, Hassan Falah
    Al-Kaabi, Rana Abbas
    Jabbar, Feryal Ibrahim
    Al-Kharsan, Ibrahim H.
    Shoja, Sarah Jawad
    MALAYSIAN JOURNAL OF FUNDAMENTAL AND APPLIED SCIENCES, 2023, 19 (03): : 337 - 344
  • [23] Post-Quantum Hybrid Security Mechanism for MIMO Systems
    Qassim, Yousef
    Magana, Mario Edgardo
    Yavuz, Attila
    2017 INTERNATIONAL CONFERENCE ON COMPUTING, NETWORKING AND COMMUNICATIONS (ICNC), 2016, : 684 - 689
  • [24] Somewhere Statistical Soundness, Post-Quantum Security, and SNARGs
    Kalai, Yael Tauman
    Vaikuntanathan, Vinod
    Zhang, Rachel Yun
    THEORY OF CRYPTOGRAPHY, TCC 2021, PT I, 2021, 13042 : 330 - 368
  • [25] On the Post-quantum Security of Classical Authenticated Encryption Schemes
    Lang, Nathalie
    Lucks, Stefan
    PROGRESS IN CRYPTOLOGY - AFRICACRYPT 2023, 2023, 14064 : 79 - 104
  • [26] Blocklistable Anonymous Credential for Circuits with Post-quantum Security
    Yu, Zuoxia
    Yang, Rupeng
    Susilo, Willy
    Au, Man Ho
    PROVABLE AND PRACTICAL SECURITY, PROVSEC 2024, PT II, 2025, 14904 : 83 - 105
  • [27] Hybrid Post-quantum Signatures in Hardware Security Keys
    Ghinea, Diana
    Kaczmarczyck, Fabian
    Pullman, Jennifer
    Cretin, Julien
    Kolbl, Stefan
    Misoczki, Rafael
    Picod, Jean-Michel
    Invernizzi, Luca
    Bursztein, Elie
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY WORKSHOPS, ACNS 2023 SATELLITE WORKSHOPS, ADSC 2023, AIBLOCK 2023, AIHWS 2023, AIOTS 2023, CIMSS 2023, CLOUD S&P 2023, SCI 2023, SECMT 2023, SIMLA 2023, 2023, 13907 : 480 - 499
  • [28] : A Crystal for Post-Quantum Security Using Kyber and Dilithium
    Aikata, Aikata
    Mert, Ahmet Can
    Imran, Malik
    Pagliarini, Samuel
    Roy, Sujoy Sinha
    IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS I-REGULAR PAPERS, 2023, 70 (02) : 747 - 758
  • [29] Post-Quantum Security of the Even-Mansour Cipher
    Alagic, Gorjan
    Bai, Chen
    Katz, Jonathan
    Majenz, Christian
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2022, PT III, 2022, 13277 : 458 - 487
  • [30] Post-Quantum Security of IGE Mode Encryption in Telegram
    Lee, Jeeun
    Kim, Sungsook
    Lee, Seunghyun
    Kim, Kwangjo
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2019, E102A (01): : 148 - 151