Post-Quantum Security: Origin, Fundamentals, and Adoption

Johanna Barzen,Frank Leymann
2024-10-28
Abstract:Nowadays, predominant asymmetric cryptographic schemes are considered to be secure because discrete logarithms are believed to be hard to be computed. The algorithm of Shor can effectively compute discrete logarithms, i.e. it can brake such asymmetric schemes. But the algorithm of Shor is a quantum algorithm and at the time this algorithm has been invented, quantum computers that may successfully execute this algorithm seemed to be far out in the future. The latter has changed: quantum computers that are powerful enough are likely to be available in a couple of years. In this article, we first describe the relation between discrete logarithms and two well-known asymmetric security schemes, RSA and Elliptic Curve Cryptography. Next, we present the foundations of lattice-based cryptography which is the bases of schemes that are considered to be safe against attacks by quantum algorithms (as well as by classical algorithms). Then we describe two such quantum-safe algorithms (Kyber and Dilithium) in more detail. Finally, we give a very brief and selective overview of a few actions currently taken by governments and industry as well as standardization in this area. The article especially strives towards being self-contained: the required mathematical foundations to understand post-quantum cryptography are provided and examples are given.
Cryptography and Security,Quantum Physics
What problem does this paper attempt to address?
The main problem that this paper attempts to solve is the security threats faced by current encryption algorithms in the era of quantum computing. Specifically, Shor's algorithm can efficiently break classical encryption algorithms (such as RSA and elliptic - curve cryptography) based on the discrete logarithm and integer factorization problems on a quantum computer. This makes the existing security infrastructure potentially insecure in the future, because once a sufficiently powerful quantum computer emerges, these encryption algorithms will become vulnerable. To meet this challenge, the paper explores the fundamentals and applications of post - quantum cryptography (PQC), especially lattice - based cryptography encryption schemes. Such schemes are considered to be resistant to quantum attacks and can therefore serve as the basis for future secure communications. The paper details two specific post - quantum - secure algorithms - Kyber and Dilithium - and discusses the actions and efforts of governments, industries, and standardization organizations in this regard. ### Summary of Main Problems: 1. **Vulnerability of Existing Encryption Algorithms**: Shor's algorithm can efficiently break RSA and elliptic - curve cryptography, which poses a serious threat to security systems relying on these algorithms. 2. **Need for Post - Quantum Cryptography**: To counter the threats posed by quantum computing, new encryption algorithms need to be developed and adopted, especially those resistant to quantum attacks. 3. **Application of Lattice Theory**: Encryption schemes based on lattice theory are considered to be quantum - secure, and the paper details the principles and specific implementations of such schemes. 4. **Standardization and Promotion**: Governments and industries are actively promoting the standardization and practical application of post - quantum encryption technologies to ensure future data security. By addressing these issues, the paper aims to provide readers with a comprehensive perspective, helping them understand the importance and urgency of post - quantum cryptography, and introduce current research progress and practical application situations.