Cargando…

Resilience Optimization of Post-Quantum Cryptography Key Encapsulation Algorithms

Recent developments in quantum computing have shed light on the shortcomings of the conventional public cryptosystem. Even while Shor’s algorithm cannot yet be implemented on quantum computers, it indicates that asymmetric key encryption will not be practicable or secure in the near future. The Nati...

Descripción completa

Detalles Bibliográficos
Autores principales: Farooq, Sana, Altaf, Ayesha, Iqbal, Faiza, Thompson, Ernesto Bautista, Vargas, Debora Libertad Ramírez, Díez, Isabel de la Torre, Ashraf, Imran
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2023
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10303738/
https://www.ncbi.nlm.nih.gov/pubmed/37420546
http://dx.doi.org/10.3390/s23125379
_version_ 1785065346586116096
author Farooq, Sana
Altaf, Ayesha
Iqbal, Faiza
Thompson, Ernesto Bautista
Vargas, Debora Libertad Ramírez
Díez, Isabel de la Torre
Ashraf, Imran
author_facet Farooq, Sana
Altaf, Ayesha
Iqbal, Faiza
Thompson, Ernesto Bautista
Vargas, Debora Libertad Ramírez
Díez, Isabel de la Torre
Ashraf, Imran
author_sort Farooq, Sana
collection PubMed
description Recent developments in quantum computing have shed light on the shortcomings of the conventional public cryptosystem. Even while Shor’s algorithm cannot yet be implemented on quantum computers, it indicates that asymmetric key encryption will not be practicable or secure in the near future. The National Institute of Standards and Technology (NIST) has started looking for a post-quantum encryption algorithm that is resistant to the development of future quantum computers as a response to this security concern. The current focus is on standardizing asymmetric cryptography that should be impenetrable by a quantum computer. This has become increasingly important in recent years. Currently, the process of standardizing asymmetric cryptography is coming very close to being finished. This study evaluated the performance of two post-quantum cryptography (PQC) algorithms, both of which were selected as NIST fourth-round finalists. The research assessed the key generation, encapsulation, and decapsulation operations, providing insights into their efficiency and suitability for real-world applications. Further research and standardization efforts are required to enable secure and efficient post-quantum encryption. When selecting appropriate post-quantum encryption algorithms for specific applications, factors such as security levels, performance requirements, key sizes, and platform compatibility should be taken into account. This paper provides helpful insight for post-quantum cryptography researchers and practitioners, assisting in the decision-making process for selecting appropriate algorithms to protect confidential data in the age of quantum computing.
format Online
Article
Text
id pubmed-10303738
institution National Center for Biotechnology Information
language English
publishDate 2023
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-103037382023-06-29 Resilience Optimization of Post-Quantum Cryptography Key Encapsulation Algorithms Farooq, Sana Altaf, Ayesha Iqbal, Faiza Thompson, Ernesto Bautista Vargas, Debora Libertad Ramírez Díez, Isabel de la Torre Ashraf, Imran Sensors (Basel) Article Recent developments in quantum computing have shed light on the shortcomings of the conventional public cryptosystem. Even while Shor’s algorithm cannot yet be implemented on quantum computers, it indicates that asymmetric key encryption will not be practicable or secure in the near future. The National Institute of Standards and Technology (NIST) has started looking for a post-quantum encryption algorithm that is resistant to the development of future quantum computers as a response to this security concern. The current focus is on standardizing asymmetric cryptography that should be impenetrable by a quantum computer. This has become increasingly important in recent years. Currently, the process of standardizing asymmetric cryptography is coming very close to being finished. This study evaluated the performance of two post-quantum cryptography (PQC) algorithms, both of which were selected as NIST fourth-round finalists. The research assessed the key generation, encapsulation, and decapsulation operations, providing insights into their efficiency and suitability for real-world applications. Further research and standardization efforts are required to enable secure and efficient post-quantum encryption. When selecting appropriate post-quantum encryption algorithms for specific applications, factors such as security levels, performance requirements, key sizes, and platform compatibility should be taken into account. This paper provides helpful insight for post-quantum cryptography researchers and practitioners, assisting in the decision-making process for selecting appropriate algorithms to protect confidential data in the age of quantum computing. MDPI 2023-06-06 /pmc/articles/PMC10303738/ /pubmed/37420546 http://dx.doi.org/10.3390/s23125379 Text en © 2023 by the authors. https://creativecommons.org/licenses/by/4.0/Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
spellingShingle Article
Farooq, Sana
Altaf, Ayesha
Iqbal, Faiza
Thompson, Ernesto Bautista
Vargas, Debora Libertad Ramírez
Díez, Isabel de la Torre
Ashraf, Imran
Resilience Optimization of Post-Quantum Cryptography Key Encapsulation Algorithms
title Resilience Optimization of Post-Quantum Cryptography Key Encapsulation Algorithms
title_full Resilience Optimization of Post-Quantum Cryptography Key Encapsulation Algorithms
title_fullStr Resilience Optimization of Post-Quantum Cryptography Key Encapsulation Algorithms
title_full_unstemmed Resilience Optimization of Post-Quantum Cryptography Key Encapsulation Algorithms
title_short Resilience Optimization of Post-Quantum Cryptography Key Encapsulation Algorithms
title_sort resilience optimization of post-quantum cryptography key encapsulation algorithms
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10303738/
https://www.ncbi.nlm.nih.gov/pubmed/37420546
http://dx.doi.org/10.3390/s23125379
work_keys_str_mv AT farooqsana resilienceoptimizationofpostquantumcryptographykeyencapsulationalgorithms
AT altafayesha resilienceoptimizationofpostquantumcryptographykeyencapsulationalgorithms
AT iqbalfaiza resilienceoptimizationofpostquantumcryptographykeyencapsulationalgorithms
AT thompsonernestobautista resilienceoptimizationofpostquantumcryptographykeyencapsulationalgorithms
AT vargasdeboralibertadramirez resilienceoptimizationofpostquantumcryptographykeyencapsulationalgorithms
AT diezisabeldelatorre resilienceoptimizationofpostquantumcryptographykeyencapsulationalgorithms
AT ashrafimran resilienceoptimizationofpostquantumcryptographykeyencapsulationalgorithms