
Securing the Future: Shifting to Post-Quantum Cryptography Amidst Quantum Threats
- 1 Physics Department, Imperial College London, London, United Kingdom
* Author to whom correspondence should be addressed.
Abstract
Current cryptographic systems, heavily reliant on classical algorithms, are increasingly vulnerable to the formidable capabilities of quantum computing. Notably, quantum algorithms such as Shor’s and Grover’s pose profound threats by accelerating decryption processes, which could soon make existing cryptosystems ineffective. This paper stresses the critical need and complexity of shifting to Post-Quantum Cryptography (PQC) to safeguard encrypted communications against these emerging quantum threats. It outlines the timeline of the National Institute of Standards and Technology’s (NIST) efforts in standardizing PQC, elucidating the significant challenges and the essential nature of adopting these new standards. While NIST provides structured guidance, transitioning to PQC presents substantial risks and difficulties, particularly in terms of organizational adaptation and the technical overhaul required. The discourse further explores the tangible implications of quantum advancements on both symmetric and asymmetric key cryptography, highlighting the potential vulnerabilities and the increased risk of security breaches. The paper underscores the imperative for immediate action in initiating the transition towards robust PQC systems, given the rapid development and anticipated deployment of quantum computing technologies capable of decrypting currently secure information. This transition is not merely a technical upgrade but a crucial strategic move to preemptively counteract quantum threats, ensuring the continued confidentiality and integrity of sensitive data across various sectors.
Keywords
Post-Quantum cryptography, quantum threats, cryptography standarization, quantum algorithms.
[1]. Delfs H, Knebl H, Knebl H 2002 Introduction to cryptography (Vol. 2) Heidelberg Springer
[2]. Menezes AJ, van Oorschot PC, Vanstone SA 1997 Handbook of Applied Cryptography (1st ed.) CRC Press https://doi.org/10.1201/9780429466335
[3]. Dang Q 2012 Recommendation for applications using approved hash algorithms (NIST Special Publication 800-107 Revision 1) National Institute of Standards and Technology
[4]. Grover LK 1996 A fast quantum mechanical algorithm for database search In: Miller GL (Ed.) Proceedings of the 28th Annual ACM Symposium on Theory of Computing ACM 212–219
[5]. Zhao Z, Peng Y, Zhu X, Wei X, Wang X, Zuo J 2020 Research on Prediction of Electricity Consumption in Smart Parks Based on Multiple Linear Regression IEEE 9th Joint International Information Technology and Artificial Intelligence Conference (ITAIC) 812-816
[6]. Shor PW 1994 Algorithms for quantum computation: Discrete logarithms and factoring In: Proceedings of the 35th Annual Symposium on Foundations of Computer Science IEEE 124–134
[7]. Xu H, Zhu X, Zhao Z, Wei X, Wang X, Zuo J 2020 Research of Pipeline Leak Detection Technology and Application Prospect of Petrochemical Wharf IEEE 9th Joint International Information Technology and Artificial Intelligence Conference (ITAIC) 263-271
[8]. Buchmann JA 2004 Digital Signatures In: Introduction to Cryptography Undergraduate Texts in Mathematics Springer New York NY https://doi.org/10.1007/978-1-4419-9003-7_12
[9]. Zhang Y, Zhao H, Zhu X, Zhao Z, Zuo J 2019 Strain Measurement Quantization Technology based on DAS System IEEE 3rd Advanced Information Management Communicates Electronic and Automation Control Conference (IMCEC) 214-218
[10]. Zhu X, Zhang Y, Zhao Z, Zuo J 2019 Radio frequency sensing based environmental monitoring technology Fourth International Workshop on Pattern Recognition 11198 187-191
[11]. Zhang Y., Xu H., Zhu X. Detection and Quantization Technique of Optical Distributed Acoustic Coupling Based on φ-OTDR. J. Shanghai Jiaotong Univ. (Sci.), 2020, 25: 208-213.
Cite this article
Sun,Y. (2024). Securing the Future: Shifting to Post-Quantum Cryptography Amidst Quantum Threats. Applied and Computational Engineering,110,154-160.
Data availability
The datasets used and/or analyzed during the current study will be available from the authors upon reasonable request.
Disclaimer/Publisher's Note
The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of EWA Publishing and/or the editor(s). EWA Publishing and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.
About volume
Volume title: Proceedings of CONF-MLA 2024 Workshop: Securing the Future: Empowering Cyber Defense with Machine Learning and Deep Learning
© 2024 by the author(s). Licensee EWA Publishing, Oxford, UK. This article is an open access article distributed under the terms and
conditions of the Creative Commons Attribution (CC BY) license. Authors who
publish this series agree to the following terms:
1. Authors retain copyright and grant the series right of first publication with the work simultaneously licensed under a Creative Commons
Attribution License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this
series.
2. Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the series's published
version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial
publication in this series.
3. Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and
during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See
Open access policy for details).