Paper 2024/1940

A Comprehensive Review of Post-Quantum Cryptography: Challenges and Advances

Seyed MohammadReza Hosseini, Sharif University of Technology
Hossein Pilaram, Sharif University of Technology
Abstract

One of the most crucial measures to maintain data security is the use of cryptography schemes and digital signatures built upon cryptographic algorithms. The resistance of cryptographic algorithms against conventional attacks is guaranteed by the computational difficulties and the immense amount of computation required to them. In the last decade, with the advances in quantum computing technology and the realization of quantum computers, which have higher computational power compared to conventional computers and can execute special kinds of algorithms (i.e., quantum algorithms), the security of many existing cryptographic algorithms has been questioned. The reason is that by using quantum computers and executing specific quantum algorithms through them, the computational difficulties of conventional cryptographic algorithms can be reduced, which makes it possible to overcome and break them in a relatively short period of time. Therefore, researchers began efforts to find new quantum-resistant cryptographic algorithms that would be impossible to break, even using quantum computers, in a short time. Such algorithms are called post-quantum cryptographic algorithms. In this article, we provide a comprehensive review of the challenges and vulnerabilities of different kinds of conventional cryptographic algorithms against quantum computers. Afterward, we review the latest cryptographic algorithms and standards that have been proposed to confront the threats posed by quantum computers. We present the classification of post-quantum cryptographic algorithms and digital signatures based on their technical specifications, provide examples of each category, and outline the strengths and weaknesses of each category.

Metadata
Available format(s)
PDF
Category
Public-key cryptography
Publication info
Preprint.
Keywords
Post-QuantumQuantum-ResistantCryptographyData SecurityReview
Contact author(s)
seyed hosseini sharif @ gmail com
pilaram @ sharif edu
History
2024-12-02: approved
2024-11-29: received
See all versions
Short URL
https://ia.cr/2024/1940
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2024/1940,
      author = {Seyed MohammadReza Hosseini and Hossein Pilaram},
      title = {A Comprehensive Review of Post-Quantum Cryptography: Challenges and Advances},
      howpublished = {Cryptology {ePrint} Archive, Paper 2024/1940},
      year = {2024},
      url = {https://eprint.iacr.org/2024/1940}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.