Post-Quantum Security: Opportunities and Challenges.

Sensors (Basel)

School of Computer Science and Engineering, Hunan University of Science and Technology, Xiangtan 411201, China.

Published: October 2023

AI Article Synopsis

  • Cryptography is vital for ensuring confidentiality, information integrity, authentication, and non-repudiation in both personal and national security contexts.
  • The rise of quantum computing poses a threat to traditional encryption methods, leading to the exploration of new defense techniques such as quantum key distribution and post-quantum encryption algorithms.
  • This study reviews post-quantum encryption, focusing on its background, the Kyber algorithm, and the challenges and prospects within this innovative field.

Article Abstract

Cryptography is very essential in our daily life, not only for confidentiality of information, but also for information integrity verification, non-repudiation, authentication, and other aspects. In modern society, cryptography is widely used; everything from personal life to national security is inseparable from it. With the emergence of quantum computing, traditional encryption methods are at risk of being cracked. People are beginning to explore methods for defending against quantum computer attacks. Among the methods currently developed, quantum key distribution is a technology that uses the principles of quantum mechanics to distribute keys. Post-quantum encryption algorithms are encryption methods that rely on mathematical challenges that quantum computers cannot solve quickly to ensure security. In this study, an integrated review of post-quantum encryption algorithms is conducted from the perspective of traditional cryptography. First, the concept and development background of post-quantum encryption are introduced. Then, the post-quantum encryption algorithm Kyber is studied. Finally, the achievements, difficulties and outstanding problems in this emerging field are summarized, and some predictions for the future are made.

Download full-text PDF

Source
http://www.ncbi.nlm.nih.gov/pmc/articles/PMC10648643PMC
http://dx.doi.org/10.3390/s23218744DOI Listing

Publication Analysis

Top Keywords

post-quantum encryption
16
encryption methods
8
encryption algorithms
8
encryption
6
post-quantum
5
quantum
5
post-quantum security
4
security opportunities
4
opportunities challenges
4
challenges cryptography
4

Similar Publications

Want AI Summaries of new PubMed Abstracts delivered to your In-box?

Enter search terms and have AI summaries delivered each week - change queries or unsubscribe any time!