A Comprehensive Survey of Post-Quantum Cryptography and Its Implications
DOI:
https://doi.org/10.37256/est.5220244169Keywords:
symmetric cryptography, asymmetric cryptography, quantum computing, post-quantum cryptography, lattice-based cryptography, algorithm, Crystal-Dilithium, Crystal-SPHINCSAbstract
Cryptography has been in existence since before the advent of computers. It encompasses a variety of techniques designed to secure information, whether it is at rest or in transit. Symmetric key cryptography includes symmetric keys, which serve the dual purpose of encrypting and decoding communications. Descriptions have been provided for public/private key pairs, also known as asymmetric keys. Such pairs may be categorized as secret/public key pairs, where the private key remains confidential, while the public key is accessible to all relevant parties for communication and information exchange. The realm of private and public key cryptography is diverse. Recently, the National Institute of Standards and Technology (NIST) endorsed four post-quantum cryptography systems. This paper presents a comprehensive survey of cryptography, examining the implications of intricate cryptographic systems on our existing networks.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2024 Bharat S. Rawal, Anjan Biswas
This work is licensed under a Creative Commons Attribution 4.0 International License.