Ijraset Journal For Research in Applied Science and Engineering Technology
Authors: Suvhodip Saha, Soumendu Banerjee
DOI Link: https://doi.org/10.22214/ijraset.2026.78550
Certificate: View Certificate
The rapid growth of quantum computing poses a critical threat to classical cryptographic systems. That is due in large part to the fact that they represent efficient solutions for some of the most challenging mathematical problems such as integer factoring or finding discrete logarithms. Schemes currently in wide use including RSA, Diffie–Hellman, and elliptic curve cryptography are particularly susceptible to being attacked by quantum computers, using algorithms like Shor\'s Algorithm and Grover\'s Algorithm. The advent of post-quantum cryptography (PQC) provides a promising potential answer to providing long-term security from adversaries using quantum computing capabilities. This paper presents a comprehensive state-of-the-art review of various PQC techniques currently being researched, including lattice-based methods, code-based methods, multivariate methods, hash-based methods, and isogeny-based methods. key challenges that will need to be addressed include computational overhead, large key sizes and implementation complexity. Furthermore the study reviews the current standardization efforts by the National Institute of Standards and Technology related to PQC and discusses some of the very specific practical considerations that need to be considered before widely deploying these techniques. The paper concludes by a complete list of existing research challenges and proposed future work that will assist in the development of efficient and scalable systems that will resist attacks from quantum computers.
Modern secure communications rely on classical cryptographic systems—symmetric, asymmetric, and hash-based algorithms—to provide confidentiality, integrity, and authentication. Widely used schemes like RSA, Diffie-Hellman, and ECC underpin applications from online banking to digital signatures. However, the emergence of quantum computers threatens these systems, as quantum algorithms such as Shor’s and Grover’s can efficiently break current public-key and symmetric cryptography, raising concerns about long-term data security and “harvest now, decrypt later” attacks.
To address this, Post-Quantum Cryptography (PQC) has been developed to secure communications against both classical and quantum attacks. PQC includes techniques such as lattice-based cryptography, code-based cryptography, hash-based signatures, multivariate polynomial cryptography, and isogeny-based cryptography. These methods rely on mathematical problems resistant to known quantum algorithms. While PQC provides long-term security, it introduces trade-offs in key size, computational efficiency, hardware complexity, and implementation.
The paper reviews the impact of quantum computing on classical cryptography, analyzes PQC methods and their performance, and discusses standardization efforts led by NIST. It highlights applications in secure communications, long-term data protection, cloud computing, IoT, and blockchain systems. The research also evaluates practical deployment challenges and provides guidance for future development of efficient, quantum-resistant cryptographic solutions.
Quantum computing will likely raise many viable threats to the Public Key Cryptographic systems being utilized today (digital communications, data storage, and authentication), and more importantly to utilize those technologies in an unauthorized fashion with quantum computing assisting in their capability. The Public Key Cryptosystems currently threatened by quantum attacks are RSA, Diffie–Hellman, and ECC. Shor\'s and Grover\'s algorithms pose a risk to these systems. Therefore, The need for a new post-quantum cryptographic solution is essential for long-term security in the Post-Quantum Era. In this paper a detailed examination of the interrelationships among cryptography, quantum computing and post-quantum cryptographic techniques is presented with a focus on their respective areas of application, their mathematical foundations and their impact on security. The work discussed the major families of post-quantum cryptographic methods such as lattice, code, hash, multivariate and isogeny-based methods. It also provided an in-depth analysis of NIST\'s post-quantum cryptography standards process. The analysis included the reasons, strengths, and performance of the leading candidate algorithms for post-quantum cryptography such as Crystals-Kyber, Crystals-Dilithium, Falcon and SPHINCS+. A direct comparison of the performance of the solutions illustrates that the networks are able to provide an ideal trade off between security and efficiency. This characteristic makes lattice-based systems attractive candidates for the potential mass-use in numerous applications, particularly in areas like secure communications protocols, cloud computing, and embedded devices. The biggest hindrances to the widespread adoption of mesh-based technologies are still incomplete solutions for ensuring implementation security, an ever-growing computational burden and a limited level of compatibility between multiple implementations of the same solution. To summarise, post-quantum cryptography has been a game changer in designing cryptographic systems and gives us an additional layer of defence against the very real threat of quantum technology-based attacks. As we turn our attention towards continuing to do well-researched post-quantum cryptographic research and evaluation of the efficacy of post-quantum cryptography, we will develop strong post-quantum cryptographic systems that secure computers and digital data against the changing technology landscape for years to come. Furthermore, by establishing and applying post-quantum cryptographic solutions today, we will continue to provide our digital infrastructure with defence against possible attacks over the next several decades.
[1] Bernstein, D. J., Buchmann, J., & Dahmen, E., Post-Quantum Cryptography, Springer-Verlag, Berlin, Heidelberg, 2009, ISBN: 978-3-540-88701-0 [2] NIST, FIPS 203: Module-Lattice-Based Key-Encapsulation Mechanism (ML-KEM), Federal Information Processing Standards Publication, 2024. [3] P. W. Shor, “Algorithms for quantum computation: Discrete logarithms and factoring,” SIAM Journal on Computing, vol. 26, no. 5, pp. 1484–1509, 1997 [4] L. K. Grover, “A fast quantum mechanical algorithm for database search,” Physical Review Letters, vol. 79, no. 2, pp. 325–328, 1997. [5] Alagic, G., Apon, D., Cooper, D., Dang, Q., Kelsey, J., Liu, Y. K., Miller, C., Moody, D., Peralta, R., & Smith-Tone, D., Status Report on the Second Round of the NIST Post-Quantum Cryptography Standardization Process, NIST Interagency Report (NISTIR) 8309, 2020. [6] G. Chhetri, S. Somvanshi, P. Hebli, S. Brotee, S. Das, “Post-Quantum Cryptography and Quantum-Safe Security: A Comprehensive Survey,” arXiv, 2025. [7] Omar Alnaseri, Yassine Himeur, Shadi Atalla, Wathiq Mansoor, “Complexity of Post-Quantum Cryptography in Embedded Systems and Its Optimization Strategies,” arXiv, 2025 [8] Elif D. Demir, Buse Bilgin, Mehmet C. Onbasli, “Performance Analysis and Industry Deployment of Post-Quantum Cryptography Algorithms,” arXiv, 2025. [9] Zixian Gong., “A survey on lattice-based digital signature,” Cybersecurity, vol. 7, no. 7, 2024 [10] Duc-Thuan dum.“A Survey of Post-Quantum Cryptography: Start of a New Race,” Cryptography, vol. 7, no. 3, 2023, [11] Saurabh Sharma. “New Innovations in Cryptography and Its Applications”. pp 527–538. [12] K. Ren, C. Wang, and Q. Wang, “Security challenges for the public cloud,” IEEE Internet Computing, vol. 16, no. 1, 2012. [13] Laurie Hughes, “Blockchain research, practice and policy: Applications, benefits, limitations, emerging research themes and research agenda,” volume49. [14] Abdel Rahman “Internet of Things (IOT): Research Challenges and Future Applications” Vol. 10, No. 6, 2019. [15] Sourabh Chandra“A study and analysis on symmetric cryptography”. [16] Pubali Maiti “Comparative Study of Asymmetric Key Cryptographic Algorithms in Image Encryption” [17] Darshana Upadhyay “Investigating the Avalanche Effect of Various Cryptographically Secure Hash Functions and Hash-Based Applications” [18] HILAL AHMAD BHAT “Quantum Computing: Fundamentals, Implementations and Applications” [19] Amirul Asyraf Zhahir “Quantum Computing and Its Application” [20] R. P. Feynman, “Simulating physics with computers,” International Journal of Theoretical Physics, vol. 21, 1982. [21] Rafael Pereira da Silva “Quantum Factorization: Shor’s Algorithm” [22] Shivani Mehta “Implementation of Grover\'s Algorithm based on Quantum Reservoir Computing” [23] Loïc Dewitte. “Application of the quantum Fourier transform in a harmonic balance solver for Burgers’ equation” [24] Kostas Blekos. “A review on Quantum Approximate Optimization Algorithm and its variants”. [25] Supreeth Mysore Venkatesh “Qubit-Efficient Variational Quantum Algorithms for Image Segmentation” [26] Manish Kumar.“Post-quantum cryptography Algorithm’s standardization and performance analysis”. [27] Francis Kagai. “Harvest-Now, Decrypt-Later: A Temporal Cybersecurity Risk in the Quantum Transition”. [28] Pawan Kumar Pradhan.“Lattice Based Cryptography : Its Applications, Areas of Interest & Future Scope” [29] N. Sendrier,“Code-Based Cryptography: State of the Art and Perspectives”. [30] Takagi, T., Wakayama.“Improving Hash-Based Signature Schemes: From Theory to Practice” [31] Dheerendra Mishra. “The rise and resilience of multivariate cryptography: Advances, pitfalls, and promising pathways” [32] Dheerendra Mishra.“Isogeny-based cryptography: A comprehensive review on advancements, analysis of attacks, and future directions”. [33] J. Bos. “CRYSTALS-Kyber: A CCA-secure module-lattice-based KEM,” IEEE European Symposium on Security and Privacy, 2018. [34] D’Anvers, Jan-Pieter. \"Saber: Module-LWR based key exchange, CPA-secure encryption and CCA-secure KEM.\" International Conference on Cryptology in Africa. Cham: Springer International Publishing, 2018. [35] Hoffstein, J., Pipher, J., & Silverman, J. H. (1998, June). NTRU: A ring-based public key cryptosystem. In International algorithmic number theory symposium (pp. 267-288). Berlin, Heidelberg: Springer Berlin Heidelberg. DOI https://doi.org/10.1007/BFb0054868 [36] Ducas, L., Lepoint, T., Lyubashevsky, V., Schwabe, P., Seiler, G., & Stehlé, D. (2018). Crystals–dilithium: Digital signatures from module lattices. [37] Fouque, Pierre-Alain, et al. \"Falcon: Fast-Fourier lattice-based compact signatures over NTRU.\" Submission to the NIST’s post-quantum cryptography standardization process 36.5 (2018): 1-75. [38] Bernstein, D. J., Lange, T., & Peters, C. (2008, October). Attacking and defending the McEliece cryptosystem. In International Workshop on Post-Quantum Cryptography (pp. 31-46). Berlin, Heidelberg: Springer Berlin Heidelberg. [39] P. Schwabe, “SPHINCS+,” December 2020 [40] Ding, J., & Schmidt, D. (2005, June). Rainbow, a new multivariable polynomial signature scheme. In International conference on applied cryptography and network security (pp. 164-175). Berlin, Heidelberg: Springer Berlin Heidelberg. [41] Beullens, Ward. \"Breaking rainbow takes a weekend on a laptop.\" Annual International Cryptology Conference. Cham: Springer Nature Switzerland, 2022. [42] Jao, David, and Luca De Feo. \"Towards quantum-resistant cryptosystems from supersingular elliptic curve isogenies.\" International workshop on post-quantum cryptography. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. [43] Castryck, Wouter, and Thomas Decru. \"An efficient key recovery attack on SIDH.\" Annual international conference on the theory and applications of cryptographic techniques. Cham: Springer Nature Switzerland, 2023. [44] Bavdekar, R., Chopde, E. J., Bhatia, A., Tiwari, K., & Daniel, S. J. (2022). Post quantum cryptography: Techniques, challenges, standardization, and directions for future research. arXiv preprint arXiv:2202.02826. [45] Bernstein, D. J. (2025). Post-quantum cryptography. In Encyclopedia of Cryptography, Security and Privacy (pp. 1846-1847). Cham: Springer Nature Switzerland. [46] Alagic, G., Alagic, G., Apon, D., Cooper, D., Dang, Q., Dang, T., ... & Smith-Tone, D. (2022). Status report on the third round of the NIST post-quantum cryptography standardization process. [47] Pirandola, S., Andersen, U. L., Banchi, L., Berta, M., Bunandar, D., Colbeck, R., ... & Wallden, P. (2020). Advances in quantum cryptography. Advances in optics and photonics, 12(4), 1012-1236. [48] Castryck, W., Lange, T., Martindale, C., Panny, L., & Renes, J. (2018, October). CSIDH: an efficient post-quantum commutative group action. In International conference on the theory and application of cryptology and information security (pp. 395-427). Cham: Springer International Publishing. [49] Bos, J., Ducas, L., Kiltz, E., Lepoint, T., Lyubashevsky, V., Schanck, J. M., ... & Stehlé, D. (2018, April). CRYSTALS-Kyber: a CCA-secure module-lattice-based KEM. In 2018 IEEE European symposium on security and privacy (EuroS&P) (pp. 353-367). IEEE. [50] Mosca, M. (2018). Cybersecurity in an era with quantum computers: Will we be ready?. IEEE Security & Privacy, 16(5), 38-41. [51] Ben-Sasson, E., Bentov, I., Horesh, Y., & Riabzev, M. (2018). Scalable, transparent, and post-quantum secure computational integrity. Cryptology ePrint Archive. [52] Yin, J., Li, Y. H., Liao, S. K., Yang, M., Cao, Y., Zhang, L., ... & Pan, J. W. (2020). Entanglement-based secure quantum cryptography over 1,120 kilometres. Nature, 582(7813), 501-505. [53] Kim, Y., Eddins, A., Anand, S., Wei, K. X., Van Den Berg, E., Rosenblatt, S., ... & Kandala, A. (2023). Evidence for the utility of quantum computing before fault tolerance. Nature, 618(7965), 500-505. [54] Harrow, A. W., & Montanaro, A. (2017). Quantum computational supremacy. Nature, 549(7671), 203-209. [55] Xu, F., Ma, X., Zhang, Q., Lo, H. K., & Pan, J. W. (2020). Secure quantum key distribution with realistic devices. Reviews of modern physics, 92(2), 025002. [56] Fernandez-Carames, T. M., & Fraga-Lamas, P. (2020). Towards post-quantum blockchain: A review on blockchain cryptography resistant to quantum computing attacks. IEEE access, 8, 21091-21116. [57] Alkim, E., Ducas, L., Pöppelmann, T., & Schwabe, P. (2016). Post-quantum key {Exchange—A} new hope. In 25th USENIX security symposium (USENIX Security 16) (pp. 327-343). [58] Chen, L., Chen, L., Jordan, S., Liu, Y. K., Moody, D., Peralta, R., ... & Smith-Tone, D. (2016). Report on post-quantum cryptography (Vol. 12). Gaithersburg, MD, USA: US Department of Commerce, National Institute of Standards and Technology. [59] Alagic, G., Alperin-Sheriff, J., Apon, D., Cooper, D., Dang, Q., Kelsey, J., ... & Smith-Tone, D. (2020). Status report on the second round of the NIST post-quantum cryptography standardization process. US Department of Commerce, NIST, 2, 69. [60] Nejatollahi, H., Dutt, N., Ray, S., Regazzoni, F., Banerjee, I., & Cammarota, R. (2019). Post-quantum lattice-based cryptography implementations: A survey. ACM Computing Surveys (CSUR), 51(6), 1-41. [61] Sikeridis, D., Kampanakis, P., & Devetsikiotis, M. (2020, November). Assessing the overhead of post-quantum cryptography in TLS 1.3 and SSH. In Proceedings of the 16th International Conference on emerging Networking EXperiments and Technologies (pp. 149-156). [62] Kumar, M. (2022). Post-quantum cryptography Algorithm\'s standardization and performance analysis. Array, 15, 100242. [63] Buchmann, J. A., Butin, D., Göpfert, F., & Petzoldt, A. (2016). Post-quantum cryptography: state of the art. The New Codebreakers: Essays Dedicated to David Kahn on the Occasion of His 85th Birthday, 88-108. [64] Crockett, E., Paquin, C., & Stebila, D. (2019). Prototyping post-quantum and hybrid key exchange and authentication in TLS and SSH. Cryptology ePrint Archive. [65] Gao, Y. L., Chen, X. B., Chen, Y. L., Sun, Y., Niu, X. X., & Yang, Y. X. (2018). A secure cryptocurrency scheme based on post-quantum blockchain. Ieee Access, 6, 27205-27213. [66] Althobaiti, O. S., & Dohler, M. (2020). Cybersecurity challenges associated with the internet of things in a post-quantum world. Ieee Access, 8, 157356-157381. [67] Basu, K., Soni, D., Nabeel, M., & Karri, R. (2019). Nist post-quantum cryptography-a hardware evaluation study. Cryptology ePrint Archive. [68] Alagic, G., Bros, M., Ciadoux, P., Cooper, D., Dang, Q., Dang, T., ... & Waller, N. (2025). Status report on the fourth round of the nist post-quantum cryptography standardization process (p. 5). Gaithersburg, MD, USA: US Department of Commerce, National Institute of Standards and Technology. [69] Moody, D., Alagic, G., Apon, D. C., Cooper, D. A., Dang, Q. H., Kelsey, J. M., ... & Alperin-Sheriff, J. (2020). Status report on the second round of the NIST post-quantum cryptography standardization process. [70] Bisheh-Niasar, M., Azarderakhsh, R., & Mozaffari-Kermani, M. (2021, June). High-speed NTT-based polynomial multiplication accelerator for post-quantum cryptography. In 2021 IEEE 28th symposium on computer arithmetic (ARITH) (pp. 94-101). IEEE. [71] Beullens, W. (2021, September). MAYO: practical post-quantum signatures from oil-and-vinegar maps. In International Conference on Selected Areas in Cryptography (pp. 355-376). Cham: Springer International Publishing. [72] Hülsing, A., Ning, K. C., Schwabe, P., Weber, F. J., & Zimmermann, P. R. (2021, May). Post-quantum wireguard. In 2021 IEEE Symposium on Security and Privacy (SP) (pp. 304-321). IEEE. [73] Bürstinghaus-Steinbach, K., Krauß, C., Niederhagen, R., & Schneider, M. (2020, October). Post-quantum tls on embedded systems: Integrating and evaluating kyber and sphincs+ with mbed tls. In Proceedings of the 15th ACM Asia Conference on Computer and Communications Security (pp. 841-852). [74] Schwabe, P., Stebila, D., & Wiggers, T. (2020, October). Post-quantum TLS without handshake signatures. In Proceedings of the 2020 ACM SIGSAC conference on computer and communications security (pp. 1461-1480). [75] Li, C. Y., Chen, X. B., Chen, Y. L., Hou, Y. Y., & Li, J. (2018). A new lattice-based signature scheme in post-quantum blockchain network. Ieee Access, 7, 2026-2033. [76] Bos, J. W., Costello, C., Naehrig, M., & Stebila, D. (2015, May). Post-quantum key exchange for the TLS protocol from the ring learning with errors problem. In 2015 IEEE symposium on security and privacy (pp. 553-570). IEEE. [77] Koziel, B., Azarderakhsh, R., Kermani, M. M., & Jao, D. (2016). Post-quantum cryptography on FPGA based on isogenies on elliptic curves. IEEE Transactions on Circuits and Systems I: Regular Papers, 64(1), 86-99. [78] Malina, L., Dzurenda, P., Ricci, S., Hajny, J., Srivastava, G., Matulevi?ius, R., ... & Tang, Q. (2021). Post-quantum era privacy protection for intelligent infrastructures. IEEE Access, 9, 36038-36077. [79] Banerjee, U., Ukyab, T. S., & Chandrakasan, A. P. (2019). Sapphire: A configurable crypto-processor for post-quantum lattice-based protocols. arXiv preprint arXiv:1910.07557. [80] Mavroeidis, V., Vishi, K., Zych, M. D., & Jøsang, A. (2018). The impact of quantum computing on present cryptography. arXiv preprint arXiv:1804.00200. [81] Guo, Q., Johansson, T., & Nilsson, A. (2020, August). A key-recovery timing attack on post-quantum primitives using the Fujisaki-Okamoto transformation and its application on FrodoKEM. In Annual International Cryptology Conference (pp. 359-386). Cham: Springer International Publishing. [82] Chase, M., Derler, D., Goldfeder, S., Orlandi, C., Ramacher, S., Rechberger, C., ... & Zaverucha, G. (2017, October). Post-quantum zero-knowledge and signatures from symmetric-key primitives. In Proceedings of the 2017 acm sigsac conference on computer and communications security (pp. 1825-1842). [83] Katz, J., Kolesnikov, V., & Wang, X. (2018, October). Improved non-interactive zero knowledge with applications to post-quantum signatures. In Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security (pp. 525-537). [84] Fritzmann, T., Sigl, G., & Sepúlveda, J. (2020). RISQ-V: Tightly coupled RISC-V accelerators for post-quantum cryptography. IACR Transactions on Cryptographic Hardware and Embedded Systems, 239-280. [85] Pessl, P., Bruinderink, L. G., & Yarom, Y. (2017, October). To BLISS-B or not to be: Attacking strongSwan\'s Implementation of Post-Quantum Signatures. In Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security (pp. 1843-1855). [86] Fritzmann, T., Van Beirendonck, M., Roy, D. B., Karl, P., Schamberger, T., Verbauwhede, I., & Sigl, G. (2022). Masked accelerators and instruction set extensions for post-quantum cryptography. IACR Transactions on Cryptographic Hardware and Embedded Systems, 414-460. [87] De Feo, L., Kohel, D., Leroux, A., Petit, C., & Wesolowski, B. (2020, December). SQISign: compact post-quantum signatures from quaternions and isogenies. In International conference on the theory and application of cryptology and information security (pp. 64-93). Cham: Springer International Publishing. [88] Unruh, D. (2017, November). Post-quantum security of Fiat-Shamir. In International Conference on the Theory and Application of Cryptology and Information Security (pp. 65-95). Cham: Springer International Publishing. [89] Liu, Z., Choo, K. K. R., & Grossschadl, J. (2018). Securing edge devices in the post-quantum internet of things using lattice-based cryptography. IEEE Communications Magazine, 56(2), 158-162. [90] Liu, Q., & Zhandry, M. (2019, August). Revisiting post-quantum fiat-shamir. In Annual International Cryptology Conference (pp. 326-355). Cham: Springer International Publishing. [91] Bernstein, D. J., Jeffery, S., Lange, T., & Meurer, A. (2013, June). Quantum algorithms for the subset-sum problem. In International Workshop on Post-Quantum Cryptography (pp. 16-33). Berlin, Heidelberg: Springer Berlin Heidelberg. [92] Mohammed, A. (2018). Quantum-Resistant Cryptography: Developing Encryption Against Quantum Attacks. Journal of Innovative Technologies, 1(1), 1-14. [93] Irshad, R. R., Hussain, S., Hussain, I., Nasir, J. A., Zeb, A., Alalayah, K. M., ... & Alwayle, I. M. (2023). IoT-enabled secure and scalable cloud architecture for multi-user systems: A hybrid post-quantum cryptographic and blockchain-based approach toward a trustworthy cloud computing. IEEE Access, 11, 105479-105498.
Copyright © 2026 Suvhodip Saha, Soumendu Banerjee. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Paper Id : IJRASET78550
Publish Date : 2026-03-20
ISSN : 2321-9653
Publisher Name : IJRASET
DOI Link : Click Here
Submit Paper Online
