Post-Quantum Cryptography: Current Developments, Challenges, and Future Directions

Prageeth Fernando

Abstract

Quantum computing poses a significant threat to existing cryptosystems, as Shor's and Grover's algorithms efficiently solve the underlying mathematical problems of classical cryptographic algorithms. Post-Quantum Cryptography (PQC) provides a proactive response to this emerging threat, enabling resilience against quantum attacks. Researchers have extensively explored various mathematical structures believed to be resilient against quantum attacks across several PQC families. The NIST PQC standardisation project demonstrates the global need to integrate PQC into existing digital systems, even before the quantum era. Practical use cases of PQC schemes in various areas, along with the associated challenges, have been thoroughly studied to understand future research directions that must be followed for the better optimisation of real-world PQC implementation in a quantum-safe future.



Keywords


Post-quantum cryptography; NIST standardisation; Classical cryptography; Digital signatures; Quantum Computing Threats

Full Text:

PDF


References


1. Dam, D., Tran, T., Hoang, V., Pham, C., & Hoang, T. (2023). A survey of Post-Quantum Cryptography: Start of a new race. Cryptography, 7(3), 40. doi: 10.3390/cryptography7030040

2. Käppler, S. A., & Schneider, B. (2022). Post-Quantum Cryptography: An Introductory overview and implementation challenges of Quantum-Resistant Algorithms. EPiC Series in Computing, 84, 61–49. doi: 10.29007/2tpw

3. Hegde, S. B., Jamuar, A., & Kulkarni, R. (2023). Post Quantum Implications on Private and Public Key Cryptography. International Conference on Smart Systems for Applications in Electrical Sciences (ICSSES), 1–6. doi: 10.1109/icsses58299.2023.10199503

4. Ott, D., Peikert, C., & Participants, O. W. (2019). Identifying research challenges in post-quantum cryptography migration and cryptographic agility. arXiv (Cornell University). doi: 10.48550/arxiv.1909.07353

5. Lella, E., Gatto, A., Pazienza, A., Romano, D., Noviello, P., Vitulano, F., & Schmid, G. (2022). Cryptography in the Quantum Era. IEEE 15th Workshop on Low Temperature Electronics (WOLTE), 1–4. doi: 10.1109/wolte55422.2022.9882585

6. Roy, K. S., & Kalita, H. K. (2019). A Survey on Post-Quantum Cryptography for Constrained Devices. International Journal of Applied Engineering Research, 14(11), 2608–2615.

7. Gajbhiye, S., Karmakar, S., Sharma, M., & Sharma, S. (2017). Paradigm shift from classical cryptography to quantum cryptography. International Conference on Intelligent Sustainable Systems (ICISS), 548–555. doi: 10.1109/iss1.2017.8389231

8. Richter, M., Bertram, M., Seidensticker, J., & Tschache, A. (2022). A Mathematical Perspective on Post-Quantum Cryptography. Mathematics, 10(15), 2579. doi: 10.3390/math10152579

9. Bavdekar, R., Chopde, E. J., Agrawal, A., Bhatia, A., & Tiwari, K. (2023). Post Quantum Cryptography: A review of techniques, challenges and standardisations. 2022 International Conference on Information Networking (ICOIN), 146–151. doi: 10.1109/icoin56518.2023.10048976

10. Pinto, J. (2022). Post-Quantum cryptography. ARIS2 - Advanced Research on Information Systems Security, 2(2), 4–16. doi: 10.56394/aris2.v2i2.17

11. Yalamuri, G., Honnavalli, P., & Eswaran, S. (2022). A Review of the Present Cryptographic Arsenal to Deal with Post-Quantum Threats. Procedia Computer Science, 215, 834–845. doi: 10.1016/j.procs.2022.12.086

12. Soni, D., Basu, K., Nabeel, M., & Karri, R. (2019). A Hardware Evaluation Study of NIST Post-Quantum Cryptographic Signature Schemes. 2nd PQC Standardisation Conference.

13. Balamurugan, C., Singh, K., Ganesan, G., & Rajarajan, M. (2021). Post-Quantum and Code-Based Cryptography—Some prospective research directions. Cryptography, 5(4), 38. doi: 10.3390/cryptography5040038

14. Pratama, I. P. A. E., & Adhitya, I. G. N. A. K. (2022). Post Quantum Cryptography: Comparison between RSA and McEliece. International Conference on ICT for Smart Society (ICISS), 01–05. doi: 10.1109/iciss55894.2022.9915232

15. Lingeshwaran, B., & Singh, A. (2022). Performance Evaluation of Classic McEliece Post Quantum Cryptography. Algorithms, Computing and Mathematics Conference (ACM), 90–94. doi: 10.1109/acm57404.2022.00022

16. Roma, C. A., Tai, C. A., & Hasan, M. A. (2021). Energy efficiency analysis of Post-Quantum Cryptographic Algorithms. IEEE Access, 9, 71295–71317. doi: 10.1109/access.2021.3077843

17. Sanon, S. P., Alzalam, I., & Schotten, H. D. (2023). Quantum and Post-Quantum Security in Future Networks. IEEE Future Networks World Forum (FNWF), 1–6. doi: 10.1109/fnwf58287.2023.10520624

18. Grote, O., Ahrens, A., & Benavente-Peces, C. (2019). A Review of Post-quantum Cryptography and Crypto-agility Strategies. International Interdisciplinary PhD Workshop (IIPhDW), 115–120. doi: 10.1109/iiphdw.2019.8755433

19. Kumar, M. (2022). Post-Quantum Cryptography Algorithms' Standardisation and Performance Analysis. Array, 15, 100242. doi: 10.1016/j.array.2022.100242

20. Tiwari, A., Chauhan, R., Joshi, N., Devliyal, S., Aluvala, S., & Kumar, A. (2024). The Quantum Threat: Implications for data security and the rise of Post-Quantum cryptography. IEEE 7th International Conference for Convergence in Technology (I2CT). doi: 10.1109/i2ct61223.2024.10543513

21. Giroti, I., & Malhotra, M. (2022). Quantum Cryptography: A Pathway to Secure Communication. 6th International Conference on Computation System and Information Technology for Sustainable Solutions (CSITSS), 1–6. doi: 10.1109/csitss57437.2022.10026388

22. Garcia, C. R., Aguilera, A. C., Olmos, J. J. V., Monroy, I. T., & Rommel, S. (2023). Quantum-Resistant TLS 1.3: A Hybrid Solution Combining Classical, Quantum and Post-Quantum Cryptography. IEEE 28th International Workshop on Computer Aided Modelling and Design of Communication Links and Networks (CAMAD), 13895, 246–251. doi: 10.1109/camad59638.2023.10478407

23. Li, S., Chen, Y., Chen, L., Liao, J., Kuang, C., Li, K., Liang, W., & Xiong, N. (2023). Post-Quantum Security: opportunities and challenges. Sensors, 23(21), 8744. doi: 10.3390/s23218744

24. NIST. (2024). NIST Releases First 3 Finalised Post-Quantum Encryption Standards. Retrieved from https://www.nist.gov/news-events/news/2024/08/nist-releases-first-3-finalized-post-quantum-encryption-standards

25. Kan, K., & Une, M. (2021). Recent Trends on Research and Development of Quantum Computers and Standardisation of Post-Quantum Cryptography. Monetary and Economic Studies.

26. Alagic, G., Apon, D., Cooper, D., Dang, Q., Dang, T., Kelsey, J., Lichtinger, J., Liu, Y., Miller, C., Moody, D., Peralta, R., Perlner, R., Robinson, A., & Smith-Tone, D. (2022). Status report on the third round of the NIST Post-Quantum Cryptography Standardisation process. NIST. doi: 10.6028/nist.ir.8413-upd1

27. NIST. (2024). Module-Lattice-Based Key-Encapsulation Mechanism Standard. NIST. doi: 10.6028/nist.fips.203

28. Ristov, R., & Koceski, S. (2023). Quantum resilient public key cryptography in the internet of things. 11th Mediterranean Conference on Embedded Computing (MECO), 1–4. doi: 10.1109/meco58584.2023.10154994

29. Sajimon, P. C., Jain, K., & Krishnan, P. (2022). Analysis of Post-Quantum Cryptography for Internet of Things. 6th International Conference on Intelligent Computing and Control Systems (ICICCS), 387–394. doi: 10.1109/iciccs53718.2022.9787987

30. FIPS 204 (2024). Module-Lattice-Based Digital Signature Standard. NIST doi: 10.6028/nist.fips.204

31. Doring, R., & Geitz, M. (2022). Post-Quantum Cryptography in Use: Empirical analysis of the TLS handshake performance. NOMS 2022-2022 IEEE/IFIP Network Operations and Management Symposium, 1–5. doi: 10.1109/noms54207.2022.9789913

32. FIPS 205 (2024). Stateless Hash-Based Digital Signature Standard. NIST doi: 10.6028/nist.fips.205

33. NIST. (2022). PQC Standardisation Process: Announcing Four Candidates to be Standardised, Plus Fourth Round Candidates. Retrieved from https://csrc.nist.gov/News/2022/pqc-candidates-to-be-standardized-and-round-4

34. Bene, F., & Kiss, A. (2023). Post-Quantum Security: An overview of the public key infrastructure. System Theory Control And Computing Journal, 3(2), 27–35. doi: 10.52846/stccj.2023.3.2.55

35. Thakur, M. S. D., Vidhani, K., Syed, H. B., & MA, R. (2024). Enterprise Post Quantum Cryptography Migration Tools. 16th International Conference on COMmunication Systems & NETworkS (COMSNETS), 327–329. doi: 10.1109/comsnets59351.2024.10427442

36. Aydeger, A., Zeydan, E., Yadav, A. K., Hemachandra, K. T., & Liyanage, M. (2024). Towards a Quantum-Resilient Future: Strategies for Transitioning to Post-Quantum Cryptography. 15th International Conference on Network of the Future (NoF), 195–203. doi: 10.1109/nof62948.2024.10741441

37. Mehic, M., Michalek, L., Dervisevic, E., Burdiak, P., Plakalovic, M., Rozhon, J., Mahovac, N., Richter, F., Kaljic, E., Lauterbach, F., Njemcevic, P., Maric, A., Hamza, M., Fazio, P., & Voznak, M. (2023). Quantum Cryptography in 5G Networks: A Comprehensive Overview. IEEE Communications Surveys & Tutorials, 26(1), 302–346. doi: 10.1109/comst.2023.3309051

38. Marrok, A., Boukhelef, S., & Chikouche, N. (2024). PQH-WireGuard: Post-Quantum Hybrid Cryptography-Based WireGuard VPN Protocol. In Lecture Notes in Networks and Systems (pp. 283–292). doi: 10.1007/978-981-99-8324-7_25

39. Moraes, D. H., Pereira, J. P. A., Grossi, B. E., Mirapalheta, G. C., Smetana, G. M. M. A., Rodrigues, W., Guimarães, N., Domingues, B., Saito, F., Simplício, M., & Guimarães, J. C. N. (2024). Applying Post-Quantum Cryptography Algorithms to a DLT-Based CBDC Infrastructure: Comparative and Feasibility Analysis. Cryptology EPrint Archive.

40. Chauhan, S., Ojha, V. P., Yarahmadian, S., & Carvalho, D. (2023). Towards building quantum-resistant blockchain. International Conference on Electrical, Computer and Energy Technologies (ICECET), 1–9. doi: 10.1109/icecet58911.2023.10389558

41. Jose, J. M., & V, P. (2022). A Survey on Consensus Algorithms in Blockchain Based on Post-Quantum Cryptosystems. 5th International Conference on Computational Intelligence and Networks (CINE), 1–6. doi: 10.1109/cine56307.2022.10037353

42. Yang, Z., Alfauri, H., Farkiani, B., Jain, R., Di Pietro, R., & Erbad, A. (2023). A survey and comparison of Post-Quantum and quantum blockchains. IEEE Communications Surveys & Tutorials, 26(2), 967–1002. doi: 10.1109/comst.2023.3325761

43. Zeydan, E., Turk, Y., Aksoy, B., & Ozturk, S. B. (2022). Recent Advances in Post-Quantum Cryptography for Networks: A Survey. Seventh International Conference on Mobile and Secure Services (MobiSecServ), 1–8. doi: 10.1109/mobisecserv50855.2022.9727214

44. Dhinakaran, D., Selvaraj, D., Dharini, N., Raja, S. E., & Priya, C. S. L. (2024). Towards a Novel Privacy-Preserving Distributed Multiparty Data Outsourcing Scheme for Cloud Computing with Quantum Key Distribution. arXiv (Cornell University). doi: 10.48550/arxiv.2407.18923

45. Bell, C. (2023). Building a quantum-safe future. Retrieved from https://blogs.microsoft.com/blog/2023/05/31/building-a-quantum-safe-future/

46. Meaney, P., Mishra, A., & Rao, R. (2024). Synchronous, Low-Latency, Off-Module Interface for the IBM z16TM Telum® Processor. IEEE Micro, 1–9. doi: 10.1109/mm.2024.3424506

47. Hekkala, J., Muurman, M., Halunen, K., & Vallivaara, V. (2023). Implementing post-quantum cryptography for developers. SN Computer Science, 4(4). doi: 10.1007/s42979-023-01724-1

48. Ni, Z., Khalid, A., & O'Neill, M. (2022). High Performance FPGA-based Post Quantum Cryptography Implementations. 32nd International Conference on Field-Programmable Logic and Applications (FPL), 456–457. doi: 10.1109/fpl57034.2022.00076

49. Ricci, S., Dobias, P., Malina, L., Hajny, J., & Jedlicka, P. (2024). Hybrid keys in practice: combining classical, quantum and Post-Quantum cryptography. IEEE Access, 12, 23206–23219. doi: 10.1109/access.2024.3364520

50. Fritzmann, T., Van Beirendonck, M., Roy, D. B., Karl, P., Schamberger, T., Verbauwhede, I., & Sigl, G. (2021). Masked accelerators and instruction set extensions for Post-Quantum cryptography. IACR Transactions on Cryptographic Hardware and Embedded Systems, 414–460. doi: 10.46586/tches.v2022.i1.414-460

51. Saarinen, M. O. (2022). WiP: Applicability of ISO Standard Side-Channel Leakage Tests to NIST Post-Quantum Cryptography. IEEE International Symposium on Hardware Oriented Security and Trust (HOST), 69–72. doi: 10.1109/host54066.2022.9839849

52. Bettale, L., Montoya, S., & Renault, G. (2021). Safe-Error Analysis of Post-Quantum Cryptography Mechanisms - Short Paper-. Workshop on Fault Detection and Tolerance in Cryptography (FDTC), 39–44. doi: 10.1109/fdtc53659.2021.00015

53. Ahn, J., Kwon, H., Ahn, B., Park, K., Kim, T., Lee, M., Kim, J., & Chung, J. (2022). Toward quantum-secured distributed energy resources: adoption of Post-Quantum Cryptography (PQC) and Quantum Key Distribution (QKD). Energies, 15(3), 714. doi: 10.3390/en15030714


Article Metrics

Metrics Loading ...

Metrics powered by PLOS ALM

Refbacks

  • There are currently no refbacks.




Copyright (c) 2025 Prageeth Fernando

Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 International License.