Exploring Post-Quantum Cryptography: Review and Directions for the Transition Process
As quantum computing advances, current cryptographic protocols are increasingly vulnerable to quantum attacks, particularly those based on Public Key Infrastructure (PKI) like RSA or Elliptic Curve Cryptography (ECC). This paper presents a comprehensive review of Post-Quantum Cryptography (PQC) as a...
Saved in:
Main Authors: | , , |
---|---|
Format: | Article |
Language: | English |
Published: |
MDPI AG
2024-11-01
|
Series: | Technologies |
Subjects: | |
Online Access: | https://www.mdpi.com/2227-7080/12/12/241 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1846102580418052096 |
---|---|
author | Kanza Cherkaoui Dekkaki Igor Tasic Maria-Dolores Cano |
author_facet | Kanza Cherkaoui Dekkaki Igor Tasic Maria-Dolores Cano |
author_sort | Kanza Cherkaoui Dekkaki |
collection | DOAJ |
description | As quantum computing advances, current cryptographic protocols are increasingly vulnerable to quantum attacks, particularly those based on Public Key Infrastructure (PKI) like RSA or Elliptic Curve Cryptography (ECC). This paper presents a comprehensive review of Post-Quantum Cryptography (PQC) as a solution to protect digital systems in the quantum era. We provide an in-depth analysis of various quantum-resistant cryptographic algorithms, including lattice-based, code-based, hash-based, isogeny-based, and multivariate approaches. The review highlights the National Institute of Standards and Technology (NIST) PQC standardization process, highlighting key algorithms, such as CRYSTALS–Kyber, CRYSTALS–Dilithium, Falcon, and SPHINCS+, and discusses the strengths, vulnerabilities, and implementation challenges of the leading algorithms. In addition, we explore transition strategies for organizations, emphasizing hybrid cryptography to ensure backward compatibility during migration. This study offers key insights into the future of cryptographic standards and the critical steps necessary to prepare for the transition from classical to quantum-resistant systems. |
format | Article |
id | doaj-art-8f2da6e120f741c3b0a46587c98c6c93 |
institution | Kabale University |
issn | 2227-7080 |
language | English |
publishDate | 2024-11-01 |
publisher | MDPI AG |
record_format | Article |
series | Technologies |
spelling | doaj-art-8f2da6e120f741c3b0a46587c98c6c932024-12-27T14:55:58ZengMDPI AGTechnologies2227-70802024-11-01121224110.3390/technologies12120241Exploring Post-Quantum Cryptography: Review and Directions for the Transition ProcessKanza Cherkaoui Dekkaki0Igor Tasic1Maria-Dolores Cano2Department of Information and Communication Technologies, Universidad Politécnica de Cartagena (UPCT), 30202 Cartagena, SpainFaculty of Economics and Business, UCAM Universidad Católica San Antonio de Murcia, 30107 Murcia, SpainDepartment of Information and Communication Technologies, Universidad Politécnica de Cartagena (UPCT), 30202 Cartagena, SpainAs quantum computing advances, current cryptographic protocols are increasingly vulnerable to quantum attacks, particularly those based on Public Key Infrastructure (PKI) like RSA or Elliptic Curve Cryptography (ECC). This paper presents a comprehensive review of Post-Quantum Cryptography (PQC) as a solution to protect digital systems in the quantum era. We provide an in-depth analysis of various quantum-resistant cryptographic algorithms, including lattice-based, code-based, hash-based, isogeny-based, and multivariate approaches. The review highlights the National Institute of Standards and Technology (NIST) PQC standardization process, highlighting key algorithms, such as CRYSTALS–Kyber, CRYSTALS–Dilithium, Falcon, and SPHINCS+, and discusses the strengths, vulnerabilities, and implementation challenges of the leading algorithms. In addition, we explore transition strategies for organizations, emphasizing hybrid cryptography to ensure backward compatibility during migration. This study offers key insights into the future of cryptographic standards and the critical steps necessary to prepare for the transition from classical to quantum-resistant systems.https://www.mdpi.com/2227-7080/12/12/241post-quantum cryptographyquantum computingpublic key infrastructurecybersecurity |
spellingShingle | Kanza Cherkaoui Dekkaki Igor Tasic Maria-Dolores Cano Exploring Post-Quantum Cryptography: Review and Directions for the Transition Process Technologies post-quantum cryptography quantum computing public key infrastructure cybersecurity |
title | Exploring Post-Quantum Cryptography: Review and Directions for the Transition Process |
title_full | Exploring Post-Quantum Cryptography: Review and Directions for the Transition Process |
title_fullStr | Exploring Post-Quantum Cryptography: Review and Directions for the Transition Process |
title_full_unstemmed | Exploring Post-Quantum Cryptography: Review and Directions for the Transition Process |
title_short | Exploring Post-Quantum Cryptography: Review and Directions for the Transition Process |
title_sort | exploring post quantum cryptography review and directions for the transition process |
topic | post-quantum cryptography quantum computing public key infrastructure cybersecurity |
url | https://www.mdpi.com/2227-7080/12/12/241 |
work_keys_str_mv | AT kanzacherkaouidekkaki exploringpostquantumcryptographyreviewanddirectionsforthetransitionprocess AT igortasic exploringpostquantumcryptographyreviewanddirectionsforthetransitionprocess AT mariadolorescano exploringpostquantumcryptographyreviewanddirectionsforthetransitionprocess |