Skip to main page content
U.S. flag

An official website of the United States government

Dot gov

The .gov means it’s official.
Federal government websites often end in .gov or .mil. Before sharing sensitive information, make sure you’re on a federal government site.

Https

The site is secure.
The https:// ensures that you are connecting to the official website and that any information you provide is encrypted and transmitted securely.

Access keys NCBI Homepage MyNCBI Homepage Main Content Main Navigation
Review
. 2023 Oct 26;23(21):8744.
doi: 10.3390/s23218744.

Post-Quantum Security: Opportunities and Challenges

Affiliations
Review

Post-Quantum Security: Opportunities and Challenges

Silong Li et al. Sensors (Basel). .

Abstract

Cryptography is very essential in our daily life, not only for confidentiality of information, but also for information integrity verification, non-repudiation, authentication, and other aspects. In modern society, cryptography is widely used; everything from personal life to national security is inseparable from it. With the emergence of quantum computing, traditional encryption methods are at risk of being cracked. People are beginning to explore methods for defending against quantum computer attacks. Among the methods currently developed, quantum key distribution is a technology that uses the principles of quantum mechanics to distribute keys. Post-quantum encryption algorithms are encryption methods that rely on mathematical challenges that quantum computers cannot solve quickly to ensure security. In this study, an integrated review of post-quantum encryption algorithms is conducted from the perspective of traditional cryptography. First, the concept and development background of post-quantum encryption are introduced. Then, the post-quantum encryption algorithm Kyber is studied. Finally, the achievements, difficulties and outstanding problems in this emerging field are summarized, and some predictions for the future are made.

Keywords: CRYSTALS-KYBER; cryptography; post-quantum encryption; quantum computing; quantum security.

PubMed Disclaimer

Conflict of interest statement

The authors declare no conflict of interest.

Figures

Figure 1
Figure 1
Two-dimensional grids and two different sets of grids.
Figure 2
Figure 2
Merkle tree.
Figure 3
Figure 3
NIST four rounds of screening.
Figure 4
Figure 4
RSA algorithm key generation process.
Figure 5
Figure 5
Timeline of the post-NIST quantum cryptography process.
Figure 6
Figure 6
Future direction of NIST encryption standards.
Figure 7
Figure 7
Key encapsulation mechanism.
Figure 8
Figure 8
Background of post-quantum encryption Kyber algorithm applications.

References

    1. Xu F., Ma X., Zhang Q., Lo H.K., Pan J.W. Secure quantum key distribution with realistic devices. Rev. Mod. Phys. 2020;92:025002. doi: 10.1103/RevModPhys.92.025002. - DOI
    1. Buchmann J.A., Butin D., Göpfert F., Petzoldt A. Post-Quantum Cryptography: State of the Art. In: Ryan P., Naccache D., Quisquater J.J., editors. The New Codebreakers. Volume 9100. Springer; Berlin/Heidelberg, Germany: 2016. Lecture Notes in Computer Science. - DOI
    1. Cai J., Liang W., Li X., Li K., Gui Z., Khan M.K. GTxChain: A Secure IoT Smart Blockchain Architecture Based on Graph Neural Network. IEEE Internet Things J. 2023 doi: 10.1109/JIOT.2023.3296469. - DOI
    1. Liu S., Wang K., Yang X., Ye J., Wang X. Dataset distillation via factorization. Adv. Neural Inf. Process. Syst. 2022;35:1100–1113.
    1. Xiao L., Han D., Li D., Liang W., Yang C., Li K.C., Castiglione A. CTDM: Cryptocurrency abnormal transaction detection method with spatio-temporal and global representation. Soft Comput. 2023;27:11647–11660. doi: 10.1007/s00500-023-08220-x. - DOI

LinkOut - more resources