Post Quantum Cryptography Algorithms: A Review and Applications

0Citations
Citations of this article
3Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Recent development in the field of quantum computing pushed classical cryptosystem on the verge of serious security threat. Quantum cryptography employing quantum channel and post-quantum cryptography algorithms are two probable solutions to check the security problem. Among them post-quantum algorithms can be easily implemented on conventional computer systems and exhibit better resistant to classical as well as quantum computer based crypto-attacks and also can be realized using current VLSI technology. Hash, code, lattice or multivariate polynomial, chaotic dynamic system based cryptographic algorithms can be employed as cryptographic algorithms with optimal parameters such as key length, encryption speed etc. The choice of a suitable algorithm as per the requirement aids in the development of a robust system invincible against various malicious intrusion. Here a comparative study of various post quantum cryptography algorithms are presented along with our proposed lattice an chaotic dynamic system based encryption schemes.

Cite

CITATION STYLE

APA

Paul, B., & Trivedi, G. (2023). Post Quantum Cryptography Algorithms: A Review and Applications. In Lecture Notes in Networks and Systems (Vol. 685 LNNS, pp. 3–17). Springer Science and Business Media Deutschland GmbH. https://doi.org/10.1007/978-981-99-1912-3_1

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free