Post-Quantum Security: Opportunities and Challenges

被引:6
作者
Li, Silong [1 ]
Chen, Yuxiang [1 ]
Chen, Lin [1 ]
Liao, Jing [1 ]
Kuang, Chanchan [1 ]
Li, Kuanching [1 ]
Liang, Wei [1 ]
Xiong, Naixue [1 ]
机构
[1] Hunan Univ Sci & Technol, Sch Comp Sci & Engn, Xiangtan 411201, Peoples R China
关键词
cryptography; post-quantum encryption; quantum computing; CRYSTALS-KYBER; quantum security; SCHEME; ALGORITHMS; SIGNATURES; INTERNET; SYSTEM;
D O I
10.3390/s23218744
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
Cryptography is very essential in our daily life, not only for confidentiality of information, but also for information integrity verification, non-repudiation, authentication, and other aspects. In modern society, cryptography is widely used; everything from personal life to national security is inseparable from it. With the emergence of quantum computing, traditional encryption methods are at risk of being cracked. People are beginning to explore methods for defending against quantum computer attacks. Among the methods currently developed, quantum key distribution is a technology that uses the principles of quantum mechanics to distribute keys. Post-quantum encryption algorithms are encryption methods that rely on mathematical challenges that quantum computers cannot solve quickly to ensure security. In this study, an integrated review of post-quantum encryption algorithms is conducted from the perspective of traditional cryptography. First, the concept and development background of post-quantum encryption are introduced. Then, the post-quantum encryption algorithm Kyber is studied. Finally, the achievements, difficulties and outstanding problems in this emerging field are summarized, and some predictions for the future are made.
引用
收藏
页数:26
相关论文
共 105 条
  • [41] Efficient Barrett Modular Multiplication Based on Toom-Cook Multiplication
    Hao, Yue
    Wang, Weijiang
    Dang, Hua
    Wang, Guiyu
    [J]. IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS II-EXPRESS BRIEFS, 2024, 71 (02) : 862 - 866
  • [42] Harkanson R., 2017, Proceedings of the 12th annual conference on cyber and information security research, P1, DOI DOI 10.1145/3064814.3064818
  • [43] Propagation dynamics of abruptly autofocusing circular Airy Gaussian vortex beams in the fractional Schrodinger equation
    He, Shangling
    Malomed, Boris A.
    Mihalache, Dumitru
    Peng, Xi
    Yu, Xing
    He, Yingji
    Deng, Dongmei
    [J]. CHAOS SOLITONS & FRACTALS, 2021, 142
  • [44] Heinz D., 2022, Cryptology ePrint Archive, Report 2022/058
  • [45] Choosing Parameters for NTRUEncrypt
    Hoffstein, Jeff
    Pipher, Jill
    Schanck, John M.
    Silverman, Joseph H.
    Whyte, William
    Zhang, Zhenfei
    [J]. TOPICS IN CRYPTOLOGY - CT-RSA 2017, 2017, 10159 : 3 - 18
  • [46] Hofheinz D., 2017, P THEORY CRYPTOGRAPH
  • [47] Multi-range bidirectional mask graph convolution based GRU networks for traffic prediction
    Hu, Na
    Zhang, Dafang
    Xie, Kun
    Liang, Wei
    Diao, Chunyan
    Li, Kuan-Ching
    [J]. JOURNAL OF SYSTEMS ARCHITECTURE, 2022, 133
  • [48] MDFC-ResNet: An Agricultural IoT System to Accurately Recognize Crop Diseases
    Hu, Wei-Jian
    Fan, Jie
    Du, Yong-Xing
    Li, Bao-Shan
    Xiong, Naixue
    Bekkering, Ernst
    [J]. IEEE ACCESS, 2020, 8 : 115287 - 115298
  • [49] An Intelligent Collaboration Trust Interconnections System for Mobile Information Control in Ubiquitous 5G Networks
    Huang, Shaobo
    Zeng, Zhiwen
    Ota, Kaoru
    Dong, Mianxiong
    Wang, Tian
    Xiong, Neal N.
    [J]. IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2021, 8 (01): : 347 - 365
  • [50] Information Technology Laborator National Institute of Standards and Technology Secure Hash Standard, 2012, Federal Information Processing Standards Publication 180-4