Paper 2024/1940
A Comprehensive Review of Post-Quantum Cryptography: Challenges and Advances
Abstract
One of the most crucial measures to maintain data security is the use of cryptography schemes and digital signatures built upon cryptographic algorithms. The resistance of cryptographic algorithms against conventional attacks is guaranteed by the computational difficulties and the immense amount of computation required to them. In the last decade, with the advances in quantum computing technology and the realization of quantum computers, which have higher computational power compared to conventional computers and can execute special kinds of algorithms (i.e., quantum algorithms), the security of many existing cryptographic algorithms has been questioned. The reason is that by using quantum computers and executing specific quantum algorithms through them, the computational difficulties of conventional cryptographic algorithms can be reduced, which makes it possible to overcome and break them in a relatively short period of time. Therefore, researchers began efforts to find new quantum-resistant cryptographic algorithms that would be impossible to break, even using quantum computers, in a short time. Such algorithms are called post-quantum cryptographic algorithms. In this article, we provide a comprehensive review of the challenges and vulnerabilities of different kinds of conventional cryptographic algorithms against quantum computers. Afterward, we review the latest cryptographic algorithms and standards that have been proposed to confront the threats posed by quantum computers. We present the classification of post-quantum cryptographic algorithms and digital signatures based on their technical specifications, provide examples of each category, and outline the strengths and weaknesses of each category.
Metadata
- Available format(s)
- Category
- Public-key cryptography
- Publication info
- Preprint.
- Keywords
- Post-QuantumQuantum-ResistantCryptographyData SecurityReview
- Contact author(s)
-
seyed hosseini sharif @ gmail com
pilaram @ sharif edu - History
- 2024-12-02: approved
- 2024-11-29: received
- See all versions
- Short URL
- https://ia.cr/2024/1940
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2024/1940, author = {Seyed MohammadReza Hosseini and Hossein Pilaram}, title = {A Comprehensive Review of Post-Quantum Cryptography: Challenges and Advances}, howpublished = {Cryptology {ePrint} Archive, Paper 2024/1940}, year = {2024}, url = {https://eprint.iacr.org/2024/1940} }