Volume 22 No 3 (2024)
 Download PDF
A Systematic Survey of Post-Quantum Cryptography Algorithms and Security Models
P. Vamshi Krishna, Meeravali Shaik
Abstract
The rapid advancement of quantum computing poses a significant threat to traditional cryptographic algorithms, necessitating the development of robust security solutions under the realm of Post-Quantum Cryptography (PQC). This survey provides a comprehensive analysis of the state-of-the-art PQC algorithms, emphasizing their potential to safeguard information in a post-quantum world. It delves into various classes of PQC algorithms, including lattice-based, code-based, multivariate polynomial, hash-based, and isogeny-based cryptographic schemes. Each category is critically evaluated in terms of its security strengths, computational efficiency, key sizes, and resilience to quantum attacks. The survey also discusses the challenges of implementing PQC algorithms, such as their integration into existing systems, scalability, and performance overheads. Moreover, it highlights the ongoing standardization efforts by organizations like NIST and the practical considerations for transitioning from classical to quantum-resistant cryptographic protocols. The article concludes by identifying future research directions that address the current limitations and explore innovative approaches to enhancing the security, efficiency, and adaptability of PQC algorithms, ensuring the longevity and reliability of cryptographic systems in the quantum era.
Keywords
Post-Quantum Cryptography, Quantum-Resistant Algorithms, Lattice-Based Cryptography, Isogeny-Based Cryptography, Code-Based Cryptography, Multivariate Cryptography, Hash-Based Signatures
Copyright
Copyright © Neuroquantology

Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.

Articles published in the Neuroquantology are available under Creative Commons Attribution Non-Commercial No Derivatives Licence (CC BY-NC-ND 4.0). Authors retain copyright in their work and grant IJECSE right of first publication under CC BY-NC-ND 4.0. Users have the right to read, download, copy, distribute, print, search, or link to the full texts of articles in this journal, and to use them for any other lawful purpose.