Exploring Post-Quantum Cryptography: Evaluating Algorithm Resilience against Global Quantum Threats
DOI:
https://doi.org/10.21928/uhdjst.v9n1y2025.pp18-28Keywords:
Post-Quantum Cryptography, Quantum Threats, Spatial Implications, Cryptographic AlgorithmsAbstract
Cryptographic algorithms perform a vital part in protecting information in general and safeguarding digital platforms. Nevertheless, improvements in quantum computing pose important concerns to traditional cryptographic approaches, demanding the development of quantum-resistant explanations. This study offers an inclusive investigation of post-quantum cryptographic algorithms, assessing their flexibility, competence, and practicality in justifying quantum risks. Through an equivalent approach, the research identifies optimistic applicants for upcoming cryptographic standards. Moreover, the study highlights the international essential for embracing these algorithms to ensure secure communication and data protection in the quantum era. These conclusions aim to notify the progress of strong cryptographic systems that address the appearing objections of quantum technologies.
References
P. Williams, I. K. Dutta, H. Daoud and M. Bayoumi. “A survey on security in internet of things with a focus on the impact of emerging technologies”. Internet of Things, vol. 19, p. 100564, 2022.
R. Rietsche, C. Dremel, S. Bosch, L. Steinacker, M. Meckel and J. M. Leimeister. “Quantum computing”. Electronic Markets, vol. 32, no. 4, pp. 2525-2536, 2022.
J. J. Tom, N. P. Anebo, B. A. Onyekwelu, A. Wilfred and R. E. Eyo. “Quantum computers and algorithms: A threat to classical cryptographic systems”. International Journal of Engineering and Advanced Technology, vol. 12, no. 5, pp. 25-38, 2023.
A. Naik, E. Yeniaras, G. Hellstern, G. Prasad and S. K. L. P. Vishwakarma. “From portfolio optimization to quantum blockchain and security: A systematic review of quantum computing in finance”. arXiv [cs.CR], 2023.
N. Sood. “Cryptography in post quantum computing era”. SSRN Electronic Journal, 2024. Available: Available at SSRN 4705470 [Last accessed on 2025 Jan 23].
M. Kumar and P. Pattnaik. “Post Quantum Cryptography (PQC)-an Overview”. In: 2020 IEEE High Performance Extreme Computing Conference (HPEC). IEEE, 2020.
H. Andås. “Emerging technology trends for defence and security”. 2020.
M. Kirshner. “Achieving Holistic Interoperability with Model-Based Systems Engineering”. Ph.D. dissertation, The University of Arizona, 2023.
J. Hekkala, M. Muurman, K. Halunen and V. Vallivaara. “Implementing post-quantum cryptography for developers”. SN Computer Science, vol. 4, no. 4, p. 365, 2023.
Y. Baseri, V. Chouhan and A. Ghorbani. “Cybersecurity in the quantum era: Assessing the impact of quantum computing on infrastructure”. arXiv [cs.CR], 2024.
I. Gunawan, S. Sumarno, H. S. Tambunan, E. Irawan, H. Qurniawan and D. Hartama. “Combination of caesar cipher algorithm and rivest shamir adleman algorithm for securing document files and text messages”. Journal of Physics: Conference Series, vol. 1255, p. 012077, 2019.
Z. Hu, B. Liu, X. Ren and Y. Tang. “Analysis and Implementation of the Enigma Machine”. In 2022 International Conference on Big Data, Information and Computer Network (BDICN). IEEE, 2022.
R. Slayton. “Democratizing Cryptography: The Work of Whitfield Diffie and Martin Hellman”. ACM, United States, 2022.
Y. Zhang, A. Liu, C. Liu, B. Ai and X. Zhang. “A track initiation algorithm using residual threshold for shore-based radar in heavy clutter environments”. Journal of Marine Science and Engineering, vol. 8, no. 8, p. 614, 2020.
S. Solanki, S. Sharma and A. Yahya. “Quantum algorithms: Unleashing the power of quantum computing”. OORJA - International Journal of Management & IT, vol. 21, no. 1, p. 28, 2023.
M. R. Habibi, S. Golestan, A. Soltanmanesh, J. M. Guerrero and J. C. Vasquez. “Power and energy applications based on quantum computing: The possible potentials of grover’s algorithm”. Electronics, vol. 11, no. 18, p. 2919, 2022.
K. F. Hasan, L. Simpson, M. Baee, C. Islam, Z. Rahman, W. Armstrong, P. Gauravaram and M. McKague. “A framework for migrating to post-quantum cryptography: Security dependency analysis and case studies”. IEEE Access, vol. 12, pp. 23427-23450, 2024.
M. A. Khan, S. Javaid, S. A. H. Mohsan, M. Tanveer and I. Ullah. “Future-proofing security for UAVs with post-quantum cryptography: A review”. IEEE Open Journal of the Communications Society, vol. 5, pp. 6849-6871, 2024.
P. K. Pradhan, S. Rakshit and S. Datta. “Lattice Based Cryptography: Its Applications, Areas of Interest & Future Scope”. In 2019 3rd International Conference on Computing Methodologies and Communication (ICCMC). IEEE, 2019.
G. Nookala. “Post-quantum cryptography: Preparing for a new era of data encryption”. MZ Computing Journal, vol. 5, no. 2, p. 012077, 2024.
A. Kichna and A. Farchane. “Secure and efficient code-based cryptography for multi-party computation and digital signatures”. Computer Sciences and Mathematics Forum, vol. 1, p. 1, 2023.
R. Kuang and M. Perepechaenko. “Optimization of the multivariate polynomial public key for quantum safe digital signature”. Scientific Reports, vol. 13, no. 1, p. 6363, 2023.
M. Singh, S. K. Singh, S. Kumar, M. Preet, V. Arya and B. B. Gupta. “Quantum-resilient cryptographic primitives: An innovative modular hash learning algorithm to enhanced security in the quantum era”. Research Square, 2024.
A. Karakaya and A. Ulu. “A survey on post-quantum based approaches for edge computing security”. Wiley Interdisciplinary Reviews: Computational Statistics, vol. 16, no. 1, p. e1644, 2024.
K. S. Roy and H. K. Kalita. “A survey on post-quantum cryptography for constrained devices”. International Journal of Applied Engineering Research, vol. 14, no. 11, pp. 2608-2615, 2019.
M. Das, A. Nag, M. Hassan, A. Santra, N. Chand, F. Yasmin, A. Sinha, A. K. Bairagi and A. Alkhayyat. “Synergy of 6G technology and IoT networks for transformative applications”. International Journal of Communication Systems, vol. 37, no. 14, p. e5869, 2024.
J. N. Pelton and S. Madry. “Space Systems, Quantum Computers, Big Data and Sustainability: New Tools for the United Nations Sustainable Development Goals”. CRC Press, United States, pp. 53-104, 2024.
J. Hoffstein. “NTRU: A ring based public key cryptosystem”. In: Algorithmic Number Theory (ANTS III). Springer, Berlin, Heidelberg, 1998.
V. Lyubashevsky, C. Peikert and O. Regev. “On ideal lattices and learning with errors over rings”. In: Advances in Cryptology- EUROCRYPT 2010. Springer, Berlin, Heidelberg, pp. 29-48, 2010.
R. J. McEliece. “A public-key cryptosystem based on algebraic”. Coding Thv, vol. 4244, pp. 114-116, 1978.
D. J. Bernstein, T. Lange and C. Peters. “Attacking and defending the McEliece cryptosystem”. In: Post-Quantum Cryptography. Springer, Berlin, Heidelberg, pp. 31-46, 2008.
J. Patarin. “Hidden Fields Equations (HFE) and Isomorphisms of Polynomials (IP): Two New Families of Asymmetric Algorithms”. In: International Conference on the Theory and Applications of Cryptographic Techniques. Springer, Berlin, Heidelberg, 1996.
J. Ding and D. Schmidt. “Rainbow, a new multivariable polynomial signature scheme”. In: International Conference on Applied Cryptography and Network Security, Springer, Berlin, Heidelberg, 2005.
L. Lamport. “Constructing digital signatures from a one way function”. 1979. Available from: https://www.microsoft.com/en-us/ research/publication/constructing-digital-signatures-one-way-function/ [Last accessed on 2025 Jan 22].
D. J. Bernstein, D. Hopwood, A. Hülsing, T. Lange, R. Niederhagen, L. Papachristodoulou, M. Schneider, P. Schwabe and Z. Wilcox- O’Hearn. “SPHINCS: Practical Stateless Hash-based Signatures”. In: Annual International Conference on the Theory and Applications of Cryptographic Techniques, Springer, Berlin, Heidelberg, 2015.
D. Jao and L. De Feo. “Towards Quantum-resistant Cryptosystems from Supersingular Elliptic Curve Isogenies”. In Post-Quantum Cryptography: 4th International Workshop. Springer, Berlin, Heidelberg, 2011.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2025 Tara Nawzad Ahmad Al Attar, Mohammed Anwar Mohammed, Rebaz Nawzad Mohammed
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.