Resilience Optimization of Post-Quantum Cryptography Key Encapsulation Algorithms. 2023

Sana Farooq, and Ayesha Altaf, and Faiza Iqbal, and Ernesto Bautista Thompson, and Debora Libertad Ramírez Vargas, and Isabel de la Torre Díez, and Imran Ashraf
Department of Computer Science, University of Engineering & Technology (UET), Lahore 54890, Pakistan.

Recent developments in quantum computing have shed light on the shortcomings of the conventional public cryptosystem. Even while Shor's algorithm cannot yet be implemented on quantum computers, it indicates that asymmetric key encryption will not be practicable or secure in the near future. The National Institute of Standards and Technology (NIST) has started looking for a post-quantum encryption algorithm that is resistant to the development of future quantum computers as a response to this security concern. The current focus is on standardizing asymmetric cryptography that should be impenetrable by a quantum computer. This has become increasingly important in recent years. Currently, the process of standardizing asymmetric cryptography is coming very close to being finished. This study evaluated the performance of two post-quantum cryptography (PQC) algorithms, both of which were selected as NIST fourth-round finalists. The research assessed the key generation, encapsulation, and decapsulation operations, providing insights into their efficiency and suitability for real-world applications. Further research and standardization efforts are required to enable secure and efficient post-quantum encryption. When selecting appropriate post-quantum encryption algorithms for specific applications, factors such as security levels, performance requirements, key sizes, and platform compatibility should be taken into account. This paper provides helpful insight for post-quantum cryptography researchers and practitioners, assisting in the decision-making process for selecting appropriate algorithms to protect confidential data in the age of quantum computing.

UI MeSH Term Description Entries
D011789 Quantum Theory The theory that the radiation and absorption of energy take place in definite quantities called quanta (E) which vary in size and are defined by the equation E Quantum Theories,Theories, Quantum,Theory, Quantum
D003201 Computers Programmable electronic devices designed to accept data, perform prescribed mathematical and logical operations at high speed, and display the results of these operations. Calculators, Programmable,Computer Hardware,Computers, Digital,Hardware, Computer,Calculator, Programmable,Computer,Computer, Digital,Digital Computer,Digital Computers,Programmable Calculator,Programmable Calculators
D003205 Computing Methodologies Computer-assisted analysis and processing of problems in a particular area. High Performance Computing,Methodologies, Computing,Computing Methodology,Computing, High Performance,Methodology, Computing,Performance Computing, High
D000465 Algorithms A procedure consisting of a sequence of algebraic formulas and/or logical steps to calculate or determine a given task. Algorithm
D016494 Computer Security Protective measures against unauthorized access to or interference with computer operating systems, telecommunications, or accompanying data; especially the modification, deletion, destruction, or release of data in computers. It includes methods of forestalling interference by computer viruses or computer hackers aiming to compromise stored data. Computer Viruses,Data Protection,Data Security,Compromising of Data,Computer Hackers,Computer Worms,Cyber Security,Cybersecurity,Data Encryption,Information Protection,Computer Hacker,Computer Virus,Computer Worm,Data Compromising,Data Encryptions,Encryption, Data,Encryptions, Data,Hacker, Computer,Hackers, Computer,Protection, Data,Protection, Information,Security, Computer,Security, Cyber,Security, Data,Virus, Computer,Viruses, Computer,Worm, Computer,Worms, Computer

Related Publications

Sana Farooq, and Ayesha Altaf, and Faiza Iqbal, and Ernesto Bautista Thompson, and Debora Libertad Ramírez Vargas, and Isabel de la Torre Díez, and Imran Ashraf
July 2022, Entropy (Basel, Switzerland),
Sana Farooq, and Ayesha Altaf, and Faiza Iqbal, and Ernesto Bautista Thompson, and Debora Libertad Ramírez Vargas, and Isabel de la Torre Díez, and Imran Ashraf
September 2017, Nature,
Sana Farooq, and Ayesha Altaf, and Faiza Iqbal, and Ernesto Bautista Thompson, and Debora Libertad Ramírez Vargas, and Isabel de la Torre Díez, and Imran Ashraf
January 2016, Designs, codes, and cryptography,
Sana Farooq, and Ayesha Altaf, and Faiza Iqbal, and Ernesto Bautista Thompson, and Debora Libertad Ramírez Vargas, and Isabel de la Torre Díez, and Imran Ashraf
August 2021, Optics express,
Sana Farooq, and Ayesha Altaf, and Faiza Iqbal, and Ernesto Bautista Thompson, and Debora Libertad Ramírez Vargas, and Isabel de la Torre Díez, and Imran Ashraf
January 2012, Nature communications,
Sana Farooq, and Ayesha Altaf, and Faiza Iqbal, and Ernesto Bautista Thompson, and Debora Libertad Ramírez Vargas, and Isabel de la Torre Díez, and Imran Ashraf
May 2022, Nature,
Sana Farooq, and Ayesha Altaf, and Faiza Iqbal, and Ernesto Bautista Thompson, and Debora Libertad Ramírez Vargas, and Isabel de la Torre Díez, and Imran Ashraf
August 2003, Physical review letters,
Sana Farooq, and Ayesha Altaf, and Faiza Iqbal, and Ernesto Bautista Thompson, and Debora Libertad Ramírez Vargas, and Isabel de la Torre Díez, and Imran Ashraf
April 2024, Physical review applied,
Sana Farooq, and Ayesha Altaf, and Faiza Iqbal, and Ernesto Bautista Thompson, and Debora Libertad Ramírez Vargas, and Isabel de la Torre Díez, and Imran Ashraf
January 2023, PeerJ. Computer science,
Sana Farooq, and Ayesha Altaf, and Faiza Iqbal, and Ernesto Bautista Thompson, and Debora Libertad Ramírez Vargas, and Isabel de la Torre Díez, and Imran Ashraf
December 2009, Physical review letters,
Copied contents to your clipboard!