Post-Quantum Security: Opportunities and Challenges

被引:6
|
作者
Li, Silong [1 ]
Chen, Yuxiang [1 ]
Chen, Lin [1 ]
Liao, Jing [1 ]
Kuang, Chanchan [1 ]
Li, Kuanching [1 ]
Liang, Wei [1 ]
Xiong, Naixue [1 ]
机构
[1] Hunan Univ Sci & Technol, Sch Comp Sci & Engn, Xiangtan 411201, Peoples R China
关键词
cryptography; post-quantum encryption; quantum computing; CRYSTALS-KYBER; quantum security; SCHEME; ALGORITHMS; SIGNATURES; INTERNET; SYSTEM;
D O I
10.3390/s23218744
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
Cryptography is very essential in our daily life, not only for confidentiality of information, but also for information integrity verification, non-repudiation, authentication, and other aspects. In modern society, cryptography is widely used; everything from personal life to national security is inseparable from it. With the emergence of quantum computing, traditional encryption methods are at risk of being cracked. People are beginning to explore methods for defending against quantum computer attacks. Among the methods currently developed, quantum key distribution is a technology that uses the principles of quantum mechanics to distribute keys. Post-quantum encryption algorithms are encryption methods that rely on mathematical challenges that quantum computers cannot solve quickly to ensure security. In this study, an integrated review of post-quantum encryption algorithms is conducted from the perspective of traditional cryptography. First, the concept and development background of post-quantum encryption are introduced. Then, the post-quantum encryption algorithm Kyber is studied. Finally, the achievements, difficulties and outstanding problems in this emerging field are summarized, and some predictions for the future are made.
引用
收藏
页数:26
相关论文
共 50 条
  • [31] Computational Refinements for Post-Quantum Elliptic Curve Security
    Sakk, Eric
    2022 6TH INTERNATIONAL CONFERENCE ON CRYPTOGRAPHY, SECURITY AND PRIVACY, CSP 2022, 2022, : 32 - 35
  • [32] Post-Quantum Crystography: A Combination of Post-Quantum Cryptography and Steganography
    Gabriel, A. J.
    Alese, B. K.
    Adetunmbi, A. O.
    Adewale, O. S.
    2013 8TH INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS (ICITST), 2013, : 449 - +
  • [33] Saturnin: a suite of lightweight symmetric algorithms for post-quantum security
    Canteaut, Anne
    Duval, Sebastien
    Leurent, Gaetan
    Naya-Plasencia, Maria
    Perrin, Leo
    Pornin, Thomas
    Schrottenloher, Andre
    IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2020, 2020 : 160 - 207
  • [34] A survey on post-quantum based approaches for edge computing security
    Karakaya, Aykut
    Ulu, Ahmet
    WILEY INTERDISCIPLINARY REVIEWS-COMPUTATIONAL STATISTICS, 2024, 16 (01)
  • [35] Post-Quantum Security of the Fujisaki-Okamoto and OAEP Transforms
    Targhi, Ehsan Ebrahimi
    Unruh, Dominique
    THEORY OF CRYPTOGRAPHY, TCC 2016-B, PT II, 2016, 9986 : 192 - 216
  • [36] TUTORIAL: Post-Quantum Cryptography and 5G Security
    Clancy, T. Charles
    McGwier, Robert W.
    Chen, Lidong
    PROCEEDINGS OF THE 2019 CONFERENCE ON SECURITY AND PRIVACY IN WIRELESS AND MOBILE NETWORKS (WISEC '19), 2019, : 285 - +
  • [37] Compact Ring Signatures with Post-Quantum Security in Standard Model
    Tuong Ngoc Nguyen
    Susilo, Willy
    Dung Hoang Duong
    Guo, Fuchun
    Fukushima, Kazuhide
    Kiyomoto, Shinsaku
    INFORMATION SECURITY AND CRYPTOLOGY, INSCRYPT 2023, PT I, 2024, 14526 : 65 - 84
  • [38] Lightweight Grouping-Proof for Post-Quantum RFID Security
    Lu, Shouqin
    Li, Xiangxue
    2021 IEEE SMARTWORLD, UBIQUITOUS INTELLIGENCE & COMPUTING, ADVANCED & TRUSTED COMPUTING, SCALABLE COMPUTING & COMMUNICATIONS, INTERNET OF PEOPLE, AND SMART CITY INNOVATIONS (SMARTWORLD/SCALCOM/UIC/ATC/IOP/SCI 2021), 2021, : 49 - 58
  • [39] Traceable ring signatures: general framework and post-quantum security
    Hanwen Feng
    Jianwei Liu
    Dawei Li
    Ya-Nan Li
    Qianhong Wu
    Designs, Codes and Cryptography, 2021, 89 : 1111 - 1145
  • [40] A Logic and an Interactive Prover for the Computational Post-Quantum Security of Protocols
    Cremers, Cas
    Fontaine, Caroline
    Jacomme, Charlie
    43RD IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2022), 2022, : 125 - 141