Exploring Post-Quantum Cryptography: Review and Directions for the Transition Process

As quantum computing advances, current cryptographic protocols are increasingly vulnerable to quantum attacks, particularly those based on Public Key Infrastructure (PKI) like RSA or Elliptic Curve Cryptography (ECC). This paper presents a comprehensive review of Post-Quantum Cryptography (PQC) as a...

Full description

Saved in:
Bibliographic Details
Main Authors: Kanza Cherkaoui Dekkaki, Igor Tasic, Maria-Dolores Cano
Format: Article
Language:English
Published: MDPI AG 2024-11-01
Series:Technologies
Subjects:
Online Access:https://www.mdpi.com/2227-7080/12/12/241
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1846102580418052096
author Kanza Cherkaoui Dekkaki
Igor Tasic
Maria-Dolores Cano
author_facet Kanza Cherkaoui Dekkaki
Igor Tasic
Maria-Dolores Cano
author_sort Kanza Cherkaoui Dekkaki
collection DOAJ
description As quantum computing advances, current cryptographic protocols are increasingly vulnerable to quantum attacks, particularly those based on Public Key Infrastructure (PKI) like RSA or Elliptic Curve Cryptography (ECC). This paper presents a comprehensive review of Post-Quantum Cryptography (PQC) as a solution to protect digital systems in the quantum era. We provide an in-depth analysis of various quantum-resistant cryptographic algorithms, including lattice-based, code-based, hash-based, isogeny-based, and multivariate approaches. The review highlights the National Institute of Standards and Technology (NIST) PQC standardization process, highlighting key algorithms, such as CRYSTALS–Kyber, CRYSTALS–Dilithium, Falcon, and SPHINCS+, and discusses the strengths, vulnerabilities, and implementation challenges of the leading algorithms. In addition, we explore transition strategies for organizations, emphasizing hybrid cryptography to ensure backward compatibility during migration. This study offers key insights into the future of cryptographic standards and the critical steps necessary to prepare for the transition from classical to quantum-resistant systems.
format Article
id doaj-art-8f2da6e120f741c3b0a46587c98c6c93
institution Kabale University
issn 2227-7080
language English
publishDate 2024-11-01
publisher MDPI AG
record_format Article
series Technologies
spelling doaj-art-8f2da6e120f741c3b0a46587c98c6c932024-12-27T14:55:58ZengMDPI AGTechnologies2227-70802024-11-01121224110.3390/technologies12120241Exploring Post-Quantum Cryptography: Review and Directions for the Transition ProcessKanza Cherkaoui Dekkaki0Igor Tasic1Maria-Dolores Cano2Department of Information and Communication Technologies, Universidad Politécnica de Cartagena (UPCT), 30202 Cartagena, SpainFaculty of Economics and Business, UCAM Universidad Católica San Antonio de Murcia, 30107 Murcia, SpainDepartment of Information and Communication Technologies, Universidad Politécnica de Cartagena (UPCT), 30202 Cartagena, SpainAs quantum computing advances, current cryptographic protocols are increasingly vulnerable to quantum attacks, particularly those based on Public Key Infrastructure (PKI) like RSA or Elliptic Curve Cryptography (ECC). This paper presents a comprehensive review of Post-Quantum Cryptography (PQC) as a solution to protect digital systems in the quantum era. We provide an in-depth analysis of various quantum-resistant cryptographic algorithms, including lattice-based, code-based, hash-based, isogeny-based, and multivariate approaches. The review highlights the National Institute of Standards and Technology (NIST) PQC standardization process, highlighting key algorithms, such as CRYSTALS–Kyber, CRYSTALS–Dilithium, Falcon, and SPHINCS+, and discusses the strengths, vulnerabilities, and implementation challenges of the leading algorithms. In addition, we explore transition strategies for organizations, emphasizing hybrid cryptography to ensure backward compatibility during migration. This study offers key insights into the future of cryptographic standards and the critical steps necessary to prepare for the transition from classical to quantum-resistant systems.https://www.mdpi.com/2227-7080/12/12/241post-quantum cryptographyquantum computingpublic key infrastructurecybersecurity
spellingShingle Kanza Cherkaoui Dekkaki
Igor Tasic
Maria-Dolores Cano
Exploring Post-Quantum Cryptography: Review and Directions for the Transition Process
Technologies
post-quantum cryptography
quantum computing
public key infrastructure
cybersecurity
title Exploring Post-Quantum Cryptography: Review and Directions for the Transition Process
title_full Exploring Post-Quantum Cryptography: Review and Directions for the Transition Process
title_fullStr Exploring Post-Quantum Cryptography: Review and Directions for the Transition Process
title_full_unstemmed Exploring Post-Quantum Cryptography: Review and Directions for the Transition Process
title_short Exploring Post-Quantum Cryptography: Review and Directions for the Transition Process
title_sort exploring post quantum cryptography review and directions for the transition process
topic post-quantum cryptography
quantum computing
public key infrastructure
cybersecurity
url https://www.mdpi.com/2227-7080/12/12/241
work_keys_str_mv AT kanzacherkaouidekkaki exploringpostquantumcryptographyreviewanddirectionsforthetransitionprocess
AT igortasic exploringpostquantumcryptographyreviewanddirectionsforthetransitionprocess
AT mariadolorescano exploringpostquantumcryptographyreviewanddirectionsforthetransitionprocess