Post-Quantum Security: Opportunities and Challenges

被引:6
|
作者
Li, Silong [1 ]
Chen, Yuxiang [1 ]
Chen, Lin [1 ]
Liao, Jing [1 ]
Kuang, Chanchan [1 ]
Li, Kuanching [1 ]
Liang, Wei [1 ]
Xiong, Naixue [1 ]
机构
[1] Hunan Univ Sci & Technol, Sch Comp Sci & Engn, Xiangtan 411201, Peoples R China
关键词
cryptography; post-quantum encryption; quantum computing; CRYSTALS-KYBER; quantum security; SCHEME; ALGORITHMS; SIGNATURES; INTERNET; SYSTEM;
D O I
10.3390/s23218744
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
Cryptography is very essential in our daily life, not only for confidentiality of information, but also for information integrity verification, non-repudiation, authentication, and other aspects. In modern society, cryptography is widely used; everything from personal life to national security is inseparable from it. With the emergence of quantum computing, traditional encryption methods are at risk of being cracked. People are beginning to explore methods for defending against quantum computer attacks. Among the methods currently developed, quantum key distribution is a technology that uses the principles of quantum mechanics to distribute keys. Post-quantum encryption algorithms are encryption methods that rely on mathematical challenges that quantum computers cannot solve quickly to ensure security. In this study, an integrated review of post-quantum encryption algorithms is conducted from the perspective of traditional cryptography. First, the concept and development background of post-quantum encryption are introduced. Then, the post-quantum encryption algorithm Kyber is studied. Finally, the achievements, difficulties and outstanding problems in this emerging field are summarized, and some predictions for the future are made.
引用
收藏
页数:26
相关论文
共 50 条
  • [41] Post-quantum Security of Tweakable Even-Mansour, and Applications
    Alagic, Gorjan
    Bai, Chen
    Katz, Jonathan
    Majenz, Christian
    Struck, Patrick
    ADVANCES IN CRYPTOLOGY, PT I, EUROCRYPT 2024, 2024, 14651 : 310 - 338
  • [42] Traceable ring signatures: general framework and post-quantum security
    Feng, Hanwen
    Liu, Jianwei
    Li, Dawei
    Li, Ya-Nan
    Wu, Qianhong
    DESIGNS CODES AND CRYPTOGRAPHY, 2021, 89 (06) : 1111 - 1145
  • [43] Security Comparisons and Performance Analyses of Post-quantum Signature Algorithms
    Raavi, Manohar
    Wuthier, Simeon
    Chandramouli, Pranav
    Balytskyi, Yaroslav
    Zhou, Xiaobo
    Chang, Sang-Yoon
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, ACNS 2021, PT II, 2021, 12727 : 424 - 447
  • [44] Transitioning RingCT Accounts: From Classical to Post-Quantum Security
    Duan, Junke
    Wang, Wei
    Wang, Licheng
    Gu, Lize
    IEEE INTERNET OF THINGS JOURNAL, 2025, 12 (02): : 2090 - 2105
  • [45] Physical-Layer Security, Quantum Key Distribution, and Post-Quantum Cryptography
    Djordjevic, Ivan B.
    ENTROPY, 2022, 24 (07)
  • [46] Enhancing ATM Security Management in the Post-Quantum Era with Quantum Key Distribution
    Ahmad, Fahad
    Kanta, Katerina
    Shiaeles, Stavros
    Naeem, Afia
    Khalid, Zarnab
    Mahboob, Kainaat
    2024 IEEE INTERNATIONAL CONFERENCE ON CYBER SECURITY AND RESILIENCE, CSR, 2024, : 329 - 334
  • [47] Cybersecurity Challenges Associated With the Internet of Things in a Post-Quantum World
    Althobaiti, Ohood Saud
    Dohler, Mischa
    IEEE ACCESS, 2020, 8 : 157356 - 157381
  • [48] Challenges and Rewards of Implementing and Benchmarking Post-Quantum Cryptography in Hardware
    Gaj, Kris
    PROCEEDINGS OF THE 2018 GREAT LAKES SYMPOSIUM ON VLSI (GLSVLSI'18), 2018, : 359 - 364
  • [49] Facing emerging challenges in connected vehicles: a formally proven, legislation compliant, and post-quantum ready security protocol
    Rémi Adelin
    Cyrius Nugier
    Éric Alata
    Vincent Nicomette
    Vincent Migliore
    Mohamed Kaâniche
    Journal of Computer Virology and Hacking Techniques, 2022, 18 : 425 - 452
  • [50] Facing emerging challenges in connected vehicles: a formally proven, legislation compliant, and post-quantum ready security protocol
    Adelin, Remi
    Nugier, Cyrius
    Alata, Eric
    Nicomette, Vincent
    Migliore, Vincent
    Kaaniche, Mohamed
    JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2022, 18 (04) : 425 - 452