Cargando…

Post-Quantum Security: Opportunities and Challenges

Cryptography is very essential in our daily life, not only for confidentiality of information, but also for information integrity verification, non-repudiation, authentication, and other aspects. In modern society, cryptography is widely used; everything from personal life to national security is in...

Descripción completa

Detalles Bibliográficos
Autores principales: Li, Silong, Chen, Yuxiang, Chen, Lin, Liao, Jing, Kuang, Chanchan, Li, Kuanching, Liang, Wei, Xiong, Naixue
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2023
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10648643/
https://www.ncbi.nlm.nih.gov/pubmed/37960442
http://dx.doi.org/10.3390/s23218744
_version_ 1785135386004029440
author Li, Silong
Chen, Yuxiang
Chen, Lin
Liao, Jing
Kuang, Chanchan
Li, Kuanching
Liang, Wei
Xiong, Naixue
author_facet Li, Silong
Chen, Yuxiang
Chen, Lin
Liao, Jing
Kuang, Chanchan
Li, Kuanching
Liang, Wei
Xiong, Naixue
author_sort Li, Silong
collection PubMed
description Cryptography is very essential in our daily life, not only for confidentiality of information, but also for information integrity verification, non-repudiation, authentication, and other aspects. In modern society, cryptography is widely used; everything from personal life to national security is inseparable from it. With the emergence of quantum computing, traditional encryption methods are at risk of being cracked. People are beginning to explore methods for defending against quantum computer attacks. Among the methods currently developed, quantum key distribution is a technology that uses the principles of quantum mechanics to distribute keys. Post-quantum encryption algorithms are encryption methods that rely on mathematical challenges that quantum computers cannot solve quickly to ensure security. In this study, an integrated review of post-quantum encryption algorithms is conducted from the perspective of traditional cryptography. First, the concept and development background of post-quantum encryption are introduced. Then, the post-quantum encryption algorithm Kyber is studied. Finally, the achievements, difficulties and outstanding problems in this emerging field are summarized, and some predictions for the future are made.
format Online
Article
Text
id pubmed-10648643
institution National Center for Biotechnology Information
language English
publishDate 2023
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-106486432023-10-26 Post-Quantum Security: Opportunities and Challenges Li, Silong Chen, Yuxiang Chen, Lin Liao, Jing Kuang, Chanchan Li, Kuanching Liang, Wei Xiong, Naixue Sensors (Basel) Review Cryptography is very essential in our daily life, not only for confidentiality of information, but also for information integrity verification, non-repudiation, authentication, and other aspects. In modern society, cryptography is widely used; everything from personal life to national security is inseparable from it. With the emergence of quantum computing, traditional encryption methods are at risk of being cracked. People are beginning to explore methods for defending against quantum computer attacks. Among the methods currently developed, quantum key distribution is a technology that uses the principles of quantum mechanics to distribute keys. Post-quantum encryption algorithms are encryption methods that rely on mathematical challenges that quantum computers cannot solve quickly to ensure security. In this study, an integrated review of post-quantum encryption algorithms is conducted from the perspective of traditional cryptography. First, the concept and development background of post-quantum encryption are introduced. Then, the post-quantum encryption algorithm Kyber is studied. Finally, the achievements, difficulties and outstanding problems in this emerging field are summarized, and some predictions for the future are made. MDPI 2023-10-26 /pmc/articles/PMC10648643/ /pubmed/37960442 http://dx.doi.org/10.3390/s23218744 Text en © 2023 by the authors. https://creativecommons.org/licenses/by/4.0/Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
spellingShingle Review
Li, Silong
Chen, Yuxiang
Chen, Lin
Liao, Jing
Kuang, Chanchan
Li, Kuanching
Liang, Wei
Xiong, Naixue
Post-Quantum Security: Opportunities and Challenges
title Post-Quantum Security: Opportunities and Challenges
title_full Post-Quantum Security: Opportunities and Challenges
title_fullStr Post-Quantum Security: Opportunities and Challenges
title_full_unstemmed Post-Quantum Security: Opportunities and Challenges
title_short Post-Quantum Security: Opportunities and Challenges
title_sort post-quantum security: opportunities and challenges
topic Review
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10648643/
https://www.ncbi.nlm.nih.gov/pubmed/37960442
http://dx.doi.org/10.3390/s23218744
work_keys_str_mv AT lisilong postquantumsecurityopportunitiesandchallenges
AT chenyuxiang postquantumsecurityopportunitiesandchallenges
AT chenlin postquantumsecurityopportunitiesandchallenges
AT liaojing postquantumsecurityopportunitiesandchallenges
AT kuangchanchan postquantumsecurityopportunitiesandchallenges
AT likuanching postquantumsecurityopportunitiesandchallenges
AT liangwei postquantumsecurityopportunitiesandchallenges
AT xiongnaixue postquantumsecurityopportunitiesandchallenges