LE QUY DON
Technical University
VietnameseClear Cookie - decide language by browser settings

A Survey of Post-Quantum Cryptography: Start of a New Race

Dam, D.-T. and Tran, T.-H. and Hoang, V.-P. and Pham, C.-K. and Hoang, T.-T. (2023) A Survey of Post-Quantum Cryptography: Start of a New Race. Cryptography, 7 (3): 40. ISSN 2410387X

Full text not available from this repository. (Upload)

Abstract

Information security is a fundamental and urgent issue in the digital transformation era. Cryptographic techniques and digital signatures have been applied to protect and authenticate relevant information. However, with the advent of quantum computers and quantum algorithms, classical cryptographic techniques have been in danger of collapsing because quantum computers can solve complex problems in polynomial time. Stemming from that risk, researchers worldwide have stepped up research on post-quantum algorithms to resist attack by quantum computers. In this review paper, we survey studies in recent years on post-quantum cryptography (PQC) and provide statistics on the number and content of publications, including a literature overview, detailed explanations of the most common methods so far, current implementation status, implementation comparisons, and discussion on future work. These studies focused on essential public cryptography techniques and digital signature schemes, and the US National Institute of Standards and Technology (NIST) launched a competition to select the best candidate for the expected standard. Recent studies have practically implemented the public key encryption/key encapsulation mechanism (PKE/KEM) and digital signature schemes on different hardware platforms and applied various optimization measures based on other criteria. Along with the increasing number of scientific publications, the recent trend of PQC research is increasingly evident and is the general trend in the cryptography industry. The movement opens up a promising avenue for researchers in public key cryptography and digital signatures, especially on algorithms selected by NIST. © 2023 by the authors.

Item Type: Article
Divisions: Faculties > Faculty of Radio-Electronic Engineering
Institutes > Institute of System Integration
Identification Number: 10.3390/cryptography7030040
URI: http://eprints.lqdtu.edu.vn/id/eprint/10976

Actions (login required)

View Item
View Item