Post-Quantum Cryptography: Current Developments, Challenges, and Future Directions
Abstract
Keywords
Full Text:
PDFReferences
1. Dam, D., Tran, T., Hoang, V., Pham, C., & Hoang, T. (2023). A survey of Post-Quantum Cryptography: Start of a new race. Cryptography, 7(3), 40. doi: 10.3390/cryptography7030040
2. Käppler, S. A., & Schneider, B. (2022). Post-Quantum Cryptography: An Introductory overview and implementation challenges of Quantum-Resistant Algorithms. EPiC Series in Computing, 84, 61–49. doi: 10.29007/2tpw
3. Hegde, S. B., Jamuar, A., & Kulkarni, R. (2023). Post Quantum Implications on Private and Public Key Cryptography. International Conference on Smart Systems for Applications in Electrical Sciences (ICSSES), 1–6. doi: 10.1109/icsses58299.2023.10199503
4. Ott, D., Peikert, C., & Participants, O. W. (2019). Identifying research challenges in post-quantum cryptography migration and cryptographic agility. arXiv (Cornell University). doi: 10.48550/arxiv.1909.07353
5. Lella, E., Gatto, A., Pazienza, A., Romano, D., Noviello, P., Vitulano, F., & Schmid, G. (2022). Cryptography in the Quantum Era. IEEE 15th Workshop on Low Temperature Electronics (WOLTE), 1–4. doi: 10.1109/wolte55422.2022.9882585
6. Roy, K. S., & Kalita, H. K. (2019). A Survey on Post-Quantum Cryptography for Constrained Devices. International Journal of Applied Engineering Research, 14(11), 2608–2615.
7. Gajbhiye, S., Karmakar, S., Sharma, M., & Sharma, S. (2017). Paradigm shift from classical cryptography to quantum cryptography. International Conference on Intelligent Sustainable Systems (ICISS), 548–555. doi: 10.1109/iss1.2017.8389231
8. Richter, M., Bertram, M., Seidensticker, J., & Tschache, A. (2022). A Mathematical Perspective on Post-Quantum Cryptography. Mathematics, 10(15), 2579. doi: 10.3390/math10152579
9. Bavdekar, R., Chopde, E. J., Agrawal, A., Bhatia, A., & Tiwari, K. (2023). Post Quantum Cryptography: A review of techniques, challenges and standardisations. 2022 International Conference on Information Networking (ICOIN), 146–151. doi: 10.1109/icoin56518.2023.10048976
10. Pinto, J. (2022). Post-Quantum cryptography. ARIS2 - Advanced Research on Information Systems Security, 2(2), 4–16. doi: 10.56394/aris2.v2i2.17
11. Yalamuri, G., Honnavalli, P., & Eswaran, S. (2022). A Review of the Present Cryptographic Arsenal to Deal with Post-Quantum Threats. Procedia Computer Science, 215, 834–845. doi: 10.1016/j.procs.2022.12.086
12. Soni, D., Basu, K., Nabeel, M., & Karri, R. (2019). A Hardware Evaluation Study of NIST Post-Quantum Cryptographic Signature Schemes. 2nd PQC Standardisation Conference.
13. Balamurugan, C., Singh, K., Ganesan, G., & Rajarajan, M. (2021). Post-Quantum and Code-Based Cryptography—Some prospective research directions. Cryptography, 5(4), 38. doi: 10.3390/cryptography5040038
14. Pratama, I. P. A. E., & Adhitya, I. G. N. A. K. (2022). Post Quantum Cryptography: Comparison between RSA and McEliece. International Conference on ICT for Smart Society (ICISS), 01–05. doi: 10.1109/iciss55894.2022.9915232
15. Lingeshwaran, B., & Singh, A. (2022). Performance Evaluation of Classic McEliece Post Quantum Cryptography. Algorithms, Computing and Mathematics Conference (ACM), 90–94. doi: 10.1109/acm57404.2022.00022
16. Roma, C. A., Tai, C. A., & Hasan, M. A. (2021). Energy efficiency analysis of Post-Quantum Cryptographic Algorithms. IEEE Access, 9, 71295–71317. doi: 10.1109/access.2021.3077843
17. Sanon, S. P., Alzalam, I., & Schotten, H. D. (2023). Quantum and Post-Quantum Security in Future Networks. IEEE Future Networks World Forum (FNWF), 1–6. doi: 10.1109/fnwf58287.2023.10520624
18. Grote, O., Ahrens, A., & Benavente-Peces, C. (2019). A Review of Post-quantum Cryptography and Crypto-agility Strategies. International Interdisciplinary PhD Workshop (IIPhDW), 115–120. doi: 10.1109/iiphdw.2019.8755433
19. Kumar, M. (2022). Post-Quantum Cryptography Algorithms' Standardisation and Performance Analysis. Array, 15, 100242. doi: 10.1016/j.array.2022.100242
20. Tiwari, A., Chauhan, R., Joshi, N., Devliyal, S., Aluvala, S., & Kumar, A. (2024). The Quantum Threat: Implications for data security and the rise of Post-Quantum cryptography. IEEE 7th International Conference for Convergence in Technology (I2CT). doi: 10.1109/i2ct61223.2024.10543513
21. Giroti, I., & Malhotra, M. (2022). Quantum Cryptography: A Pathway to Secure Communication. 6th International Conference on Computation System and Information Technology for Sustainable Solutions (CSITSS), 1–6. doi: 10.1109/csitss57437.2022.10026388
22. Garcia, C. R., Aguilera, A. C., Olmos, J. J. V., Monroy, I. T., & Rommel, S. (2023). Quantum-Resistant TLS 1.3: A Hybrid Solution Combining Classical, Quantum and Post-Quantum Cryptography. IEEE 28th International Workshop on Computer Aided Modelling and Design of Communication Links and Networks (CAMAD), 13895, 246–251. doi: 10.1109/camad59638.2023.10478407
23. Li, S., Chen, Y., Chen, L., Liao, J., Kuang, C., Li, K., Liang, W., & Xiong, N. (2023). Post-Quantum Security: opportunities and challenges. Sensors, 23(21), 8744. doi: 10.3390/s23218744
24. NIST. (2024). NIST Releases First 3 Finalised Post-Quantum Encryption Standards. Retrieved from https://www.nist.gov/news-events/news/2024/08/nist-releases-first-3-finalized-post-quantum-encryption-standards
25. Kan, K., & Une, M. (2021). Recent Trends on Research and Development of Quantum Computers and Standardisation of Post-Quantum Cryptography. Monetary and Economic Studies.
26. Alagic, G., Apon, D., Cooper, D., Dang, Q., Dang, T., Kelsey, J., Lichtinger, J., Liu, Y., Miller, C., Moody, D., Peralta, R., Perlner, R., Robinson, A., & Smith-Tone, D. (2022). Status report on the third round of the NIST Post-Quantum Cryptography Standardisation process. NIST. doi: 10.6028/nist.ir.8413-upd1
27. NIST. (2024). Module-Lattice-Based Key-Encapsulation Mechanism Standard. NIST. doi: 10.6028/nist.fips.203
28. Ristov, R., & Koceski, S. (2023). Quantum resilient public key cryptography in the internet of things. 11th Mediterranean Conference on Embedded Computing (MECO), 1–4. doi: 10.1109/meco58584.2023.10154994
29. Sajimon, P. C., Jain, K., & Krishnan, P. (2022). Analysis of Post-Quantum Cryptography for Internet of Things. 6th International Conference on Intelligent Computing and Control Systems (ICICCS), 387–394. doi: 10.1109/iciccs53718.2022.9787987
30. FIPS 204 (2024). Module-Lattice-Based Digital Signature Standard. NIST doi: 10.6028/nist.fips.204
31. Doring, R., & Geitz, M. (2022). Post-Quantum Cryptography in Use: Empirical analysis of the TLS handshake performance. NOMS 2022-2022 IEEE/IFIP Network Operations and Management Symposium, 1–5. doi: 10.1109/noms54207.2022.9789913
32. FIPS 205 (2024). Stateless Hash-Based Digital Signature Standard. NIST doi: 10.6028/nist.fips.205
33. NIST. (2022). PQC Standardisation Process: Announcing Four Candidates to be Standardised, Plus Fourth Round Candidates. Retrieved from https://csrc.nist.gov/News/2022/pqc-candidates-to-be-standardized-and-round-4
34. Bene, F., & Kiss, A. (2023). Post-Quantum Security: An overview of the public key infrastructure. System Theory Control And Computing Journal, 3(2), 27–35. doi: 10.52846/stccj.2023.3.2.55
35. Thakur, M. S. D., Vidhani, K., Syed, H. B., & MA, R. (2024). Enterprise Post Quantum Cryptography Migration Tools. 16th International Conference on COMmunication Systems & NETworkS (COMSNETS), 327–329. doi: 10.1109/comsnets59351.2024.10427442
36. Aydeger, A., Zeydan, E., Yadav, A. K., Hemachandra, K. T., & Liyanage, M. (2024). Towards a Quantum-Resilient Future: Strategies for Transitioning to Post-Quantum Cryptography. 15th International Conference on Network of the Future (NoF), 195–203. doi: 10.1109/nof62948.2024.10741441
37. Mehic, M., Michalek, L., Dervisevic, E., Burdiak, P., Plakalovic, M., Rozhon, J., Mahovac, N., Richter, F., Kaljic, E., Lauterbach, F., Njemcevic, P., Maric, A., Hamza, M., Fazio, P., & Voznak, M. (2023). Quantum Cryptography in 5G Networks: A Comprehensive Overview. IEEE Communications Surveys & Tutorials, 26(1), 302–346. doi: 10.1109/comst.2023.3309051
38. Marrok, A., Boukhelef, S., & Chikouche, N. (2024). PQH-WireGuard: Post-Quantum Hybrid Cryptography-Based WireGuard VPN Protocol. In Lecture Notes in Networks and Systems (pp. 283–292). doi: 10.1007/978-981-99-8324-7_25
39. Moraes, D. H., Pereira, J. P. A., Grossi, B. E., Mirapalheta, G. C., Smetana, G. M. M. A., Rodrigues, W., Guimarães, N., Domingues, B., Saito, F., Simplício, M., & Guimarães, J. C. N. (2024). Applying Post-Quantum Cryptography Algorithms to a DLT-Based CBDC Infrastructure: Comparative and Feasibility Analysis. Cryptology EPrint Archive.
40. Chauhan, S., Ojha, V. P., Yarahmadian, S., & Carvalho, D. (2023). Towards building quantum-resistant blockchain. International Conference on Electrical, Computer and Energy Technologies (ICECET), 1–9. doi: 10.1109/icecet58911.2023.10389558
41. Jose, J. M., & V, P. (2022). A Survey on Consensus Algorithms in Blockchain Based on Post-Quantum Cryptosystems. 5th International Conference on Computational Intelligence and Networks (CINE), 1–6. doi: 10.1109/cine56307.2022.10037353
42. Yang, Z., Alfauri, H., Farkiani, B., Jain, R., Di Pietro, R., & Erbad, A. (2023). A survey and comparison of Post-Quantum and quantum blockchains. IEEE Communications Surveys & Tutorials, 26(2), 967–1002. doi: 10.1109/comst.2023.3325761
43. Zeydan, E., Turk, Y., Aksoy, B., & Ozturk, S. B. (2022). Recent Advances in Post-Quantum Cryptography for Networks: A Survey. Seventh International Conference on Mobile and Secure Services (MobiSecServ), 1–8. doi: 10.1109/mobisecserv50855.2022.9727214
44. Dhinakaran, D., Selvaraj, D., Dharini, N., Raja, S. E., & Priya, C. S. L. (2024). Towards a Novel Privacy-Preserving Distributed Multiparty Data Outsourcing Scheme for Cloud Computing with Quantum Key Distribution. arXiv (Cornell University). doi: 10.48550/arxiv.2407.18923
45. Bell, C. (2023). Building a quantum-safe future. Retrieved from https://blogs.microsoft.com/blog/2023/05/31/building-a-quantum-safe-future/
46. Meaney, P., Mishra, A., & Rao, R. (2024). Synchronous, Low-Latency, Off-Module Interface for the IBM z16TM Telum® Processor. IEEE Micro, 1–9. doi: 10.1109/mm.2024.3424506
47. Hekkala, J., Muurman, M., Halunen, K., & Vallivaara, V. (2023). Implementing post-quantum cryptography for developers. SN Computer Science, 4(4). doi: 10.1007/s42979-023-01724-1
48. Ni, Z., Khalid, A., & O'Neill, M. (2022). High Performance FPGA-based Post Quantum Cryptography Implementations. 32nd International Conference on Field-Programmable Logic and Applications (FPL), 456–457. doi: 10.1109/fpl57034.2022.00076
49. Ricci, S., Dobias, P., Malina, L., Hajny, J., & Jedlicka, P. (2024). Hybrid keys in practice: combining classical, quantum and Post-Quantum cryptography. IEEE Access, 12, 23206–23219. doi: 10.1109/access.2024.3364520
50. Fritzmann, T., Van Beirendonck, M., Roy, D. B., Karl, P., Schamberger, T., Verbauwhede, I., & Sigl, G. (2021). Masked accelerators and instruction set extensions for Post-Quantum cryptography. IACR Transactions on Cryptographic Hardware and Embedded Systems, 414–460. doi: 10.46586/tches.v2022.i1.414-460
51. Saarinen, M. O. (2022). WiP: Applicability of ISO Standard Side-Channel Leakage Tests to NIST Post-Quantum Cryptography. IEEE International Symposium on Hardware Oriented Security and Trust (HOST), 69–72. doi: 10.1109/host54066.2022.9839849
52. Bettale, L., Montoya, S., & Renault, G. (2021). Safe-Error Analysis of Post-Quantum Cryptography Mechanisms - Short Paper-. Workshop on Fault Detection and Tolerance in Cryptography (FDTC), 39–44. doi: 10.1109/fdtc53659.2021.00015
53. Ahn, J., Kwon, H., Ahn, B., Park, K., Kim, T., Lee, M., Kim, J., & Chung, J. (2022). Toward quantum-secured distributed energy resources: adoption of Post-Quantum Cryptography (PQC) and Quantum Key Distribution (QKD). Energies, 15(3), 714. doi: 10.3390/en15030714
Article Metrics
Metrics powered by PLOS ALM
Refbacks
- There are currently no refbacks.
Copyright (c) 2025 Prageeth Fernando

This work is licensed under a Creative Commons Attribution 4.0 International License.




