Post-Quantum Secure Cryptographic Algorithms

Xenia Bogomolec,Jochen Gerhard
DOI: https://doi.org/10.48550/arXiv.1809.00371
2018-09-12
Abstract:An overview on current developments in post quantum cryptography
Cryptography and Security
What problem does this paper attempt to address?
This paper aims to explore and outline the current algorithmic solutions to the threats of quantum computers, as well as the unsolved problems in the classical IT field. Specifically, with the development of quantum computer technology, the security of existing encryption algorithms that rely on integer factorization and the discrete logarithm problem (DLOG system) will be seriously threatened. Quantum computers are capable of cracking these traditional encryption algorithms, resulting in the leakage of encrypted data. Therefore, the paper focuses on how to develop new encryption algorithms to meet the challenges brought by quantum computing and ensure information security in the post - quantum era. The paper discusses a variety of post - quantum cryptography schemes, including code - based cryptography, hash - based digital signature schemes, lattice - based cryptography, multivariate cryptography, and isogeny - based cryptography, etc. Each scheme has its own characteristics and advantages, for example: - **Code - based cryptography**: It uses the intractability of linear error - correcting codes to build an encryption system, such as the MCELIECE and NIEDERREITER systems. - **Hash - based digital signature schemes**: It only depends on the security of the underlying hash function, such as the Merkle tree signature scheme and SPHINCS +. - **Lattice - based cryptography**: It is based on the problem of finding the nearest lattice point or the shortest basis, such as NTRU, BCNS, NEWHOPE and DILITHIUM. - **Multivariate cryptography**: It utilizes the NP - completeness of solving multivariate polynomial equations over finite fields, such as HIDDEN FIELD EQUATIONS and QUAD. - **Isogeny - based cryptography**: It uses the supersingular isogeny Diffie - Hellman protocol (SIDH), providing the minimum key size and perfect forward security. The paper also discusses the practical applications of these schemes and the challenges they face, including the complexity of parameter selection, potential vulnerabilities in implementation, and the importance of interdisciplinary cooperation. In short, this paper provides a comprehensive perspective for understanding and dealing with the threats of quantum computing to existing encryption systems.