A Comprehensive Survey of Post-Quantum Cryptography and Its Implications

Authors

DOI:

https://doi.org/10.37256/est.5220244169

Keywords:

symmetric cryptography, asymmetric cryptography, quantum computing, post-quantum cryptography, lattice-based cryptography, algorithm, Crystal-Dilithium, Crystal-SPHINCS

Abstract

Cryptography has been in existence since before the advent of computers. It encompasses a variety of techniques designed to secure information, whether it is at rest or in transit. Symmetric key cryptography includes symmetric keys, which serve the dual purpose of encrypting and decoding communications. Descriptions have been provided for public/private key pairs, also known as asymmetric keys. Such pairs may be categorized as secret/public key pairs, where the private key remains confidential, while the public key is accessible to all relevant parties for communication and information exchange. The realm of private and public key cryptography is diverse. Recently, the National Institute of Standards and Technology (NIST) endorsed four post-quantum cryptography systems. This paper presents a comprehensive survey of cryptography, examining the implications of intricate cryptographic systems on our existing networks.

Downloads

Published

2024-03-25

How to Cite

[1]
B. S. Rawal and . A. Biswas, “A Comprehensive Survey of Post-Quantum Cryptography and Its Implications”, Engineering Science & Technology, vol. 5, no. 2, pp. 256–269, Mar. 2024.