Ijraset Journal For Research in Applied Science and Engineering Technology
Authors: Vivek Gujar
DOI Link: https://doi.org/10.22214/ijraset.2025.75045
Certificate: View Certificate
In the wake of accelerating quantum computing threats, Post-Quantum Cryptography (PQC) emerges as a vital shield for global data security, that will poised to revolutionize industries by 2030. This review article traces cryptography\'s evolution from ancient ciphers to NIST\'s 2025 standards, detailing quantum-resistant algorithms like ML-KEM and ML-DSA that counter Shor\'s algorithm vulnerabilities. Potential real-world applications in finance, healthcare, cloud computing and beyond, it highlights PQC\'s role in safeguarding sensitive transactions, patient records and IoT networks amid projections of Q-Day as early as 2029. With the PQC market surging from $0.42 billion in 2025 to potentially $29.95 billion by 2034, driven by regulatory mandates and innovation, the paper underscores India\'s GCCs as quantum-ready hubs unlocking trillions in value through strategic adoption. Also,as data Centres are projected to grow to $100B by 2027, needs immediate migration to avert catastrophic breaches, this article equips stakeholders to strategise the quantum era\'s challenges and opportunities.
Quantum computers exploit quantum mechanics to solve specific computational problems exponentially faster than classical computers. They threaten current cryptographic systems, such as RSA-2048, using algorithms like Shor’s algorithm, potentially breaking common encryption in days. Google Quantum AI estimates that breaking RSA-2048 could be achieved in under a week with fewer than one million noisy qubits.
Historical Evolution of Cryptography
Ancient Egypt (1900 BC): Early ciphers using non-standard hieroglyphs.
Medieval period: Polyalphabetic ciphers (Vigenère, 1586).
20th century: Mechanical encryption (Enigma), digital standards (DES, 1975), public-key cryptography (Diffie-Hellman, 1976), RSA (1977).
Quantum era: Quantum Key Distribution (QKD) in 1984 (BB84 protocol) and Shor’s algorithm in 1994 exposed conventional vulnerabilities, prompting PQC research.
Post-Quantum Cryptography (PQC)
PQC uses algorithms resistant to quantum attacks, with NIST standardization completed in 2024. Key PQC algorithms include:
ML-KEM (Key Exchange)
Secure key exchange, messaging, VPNs, cloud storage, smart home encryption.
ML-DSA (Digital Signatures)
Document signing, secure software distribution, financial transactions, dual-use certificates.
SLH-DSA
Used for digital certificates, electronic voting, authentication.
PQC relies on mathematical problems hard for quantum computers, such as lattice-based, code-based, and hash-based cryptography.
Cloud Computing & Data Storage
Google Cloud, AWS, and Kubernetes adopt PQC to secure storage and communication channels.
Finance
Secures banking transactions, ledgers, and digital signatures. Early adoption by banks increases trust and regulatory compliance.
Healthcare
Protects telemedicine, electronic health records, and ensures compliance with regulations like HIPAA.
Government & Defense
Federal agencies moving toward full PQC adoption by 2035 to secure classified data.
IoT & Networks
Lightweight PQC algorithms secure resource-constrained devices, networks, and TLS connections.
Blockchain & Emerging Tech
PQC secures blockchains, crypto wallets, and hybrid TLS for data centers.
Global PQC market: $0.42B (2025) → $2.84B (2030), potentially $29.95B by 2034.
Major players: AWS, Google Cloud, IBM (cloud PQC); PQShield, QuSecure, Thales (tools); NXP, Palo Alto Networks (hardware/networks); Zscaler (cloud-native).
PQC adoption is still limited: only 5% of top websites and low uptake in finance, healthcare, and government sectors.
India’s GCC Impact
India’s Global Capability Centers (GCCs) are poised to adopt PQC for finance, pharma, supply chain, and cybersecurity.
Opportunities include revenue growth, hybrid testing, and talent upskilling.
Q-Day (Quantum threat milestone): as early as 2029.
Only 5% of CISOs prioritize PQC.
Global PQC readiness: 57%, heavily influenced by browser support (Chrome 93%, Firefox 85%, Safari 0%).
Adoption varies by website rank and sector:
Top 100 sites: 42%
Banking: 3%
Healthcare/Government: low
Leading regions: Australia (.au), Canada (.ca), UK; US leads by company HQ.
As quantum computing edges closer to reality, with Q-Day potentially arriving by 2029, the imperative for Post-Quantum Cryptography (PQC) adoption has never been more urgent. This review has traced cryptography\'s millennia-long evolution from ancient hieroglyphs to NIST\'s 2025 standards, underscoring PQC\'s quantum-resistant algorithms like ML-KEM, ML-DSA, and SLH-DSA as foundational defenses against vulnerabilities in legacy systems. Through diverse applications in cloud computing, finance, healthcare, government, IoT, and blockchain, PQC not only secures sensitive data but also fosters innovation in emerging technologies, ensuring resilience amid performance trade-offs. The market\'s explosive growth—from $0.42 billion in 2025 to projections of $29.95 billion by 2034, while Data Center market projected to top $100 B by 2027[63]—signals a transformative shift, driven by regulatory mandates and the need to mitigate trillion-dollar breach risks. In India, GCCs stand at the forefront, leveraging the National Quantum Mission to evolve into innovation powerhouses, unlocking economic value through PQC pilots and upskilling while navigating talent and cost challenges via strategic collaborations. Ultimately, embracing PQC is not merely a technological upgrade but a strategic necessity for safeguarding the digital future. In PQC era, GCC and cloud companies will boldly rebrand themselves as quantum-resilient powerhouses, touting PQC compliance certifications—such as the emerging PQCC standard, mirroring like ISO 27001—to assure clients that their data stands to quantum threats, fostering unbreakable trust and a competitive edge. Organizations and nations that act decisively will thrive in a quantum-secure world, preserving trust, privacy and competitiveness against inevitable threats.
[1] Montanaro, A. Quantum Algorithms: An Overview. npj Quantum Inf 2, 15023 (2016). https://doi.org/10.1038/npjqi.2015.23 [2] Syeda Kawsar, An Overview of Quantum Computing\'s Potential to Solve Complex Problems, December 2022, Journal of Mathematical & Computer Applications, DOI: 10.47363/JMCA/2022(1)E163, [3] Manish Kumar, Post-quantum cryptography Algorithm\'s standardization and performance analysis, Array, Volume 15,2022,100242, https://doi.org/10.1016/j.array.2022.100242 [4] ibm, https://www.ibm.com/think/topics/cryptography-history [5] Al-Amin Mohammed, Abdulrahman Olaniyan, Vigenere Cipher: Trends, Review and Possible Modifications, Feb 2016, International Journal of Computer Applications 135(11):46-50, DOI: 10.5120/ijca2016908549, [6] https://www.sciencedirect.com/topics/computer-science/enigma-machine [7] M.E. Hellman, An overview of public key cryptography, June 2002, IEEE Communications Magazine 40(5):42-49, DOI: 10.1109/MCOM.2002.1006971, IEEE Xplore, [8] Dan Boneh, Twenty Years of Attacks on the RSA Cryptosystem, https://crypto.stanford.edu/~dabo/papers/RSA-survey.pdf [9] Badukuri Hemalatha, Badukuri Premalatha, Buduri Reddaiah, Advanced Secure Communication: Exploring Quantum Key Distribution, the BB84 Method, April 2024, International Journal of Engineering and Advanced Technology 13(4):29-33, DOI: 10.35940/ijeat.D4434.13040424, [10] https://postquantum.com/post-quantum/shors-algorithm-a-quantum-threat/ [11] Charles Gitonga Kinyua, European Journal of Information Technologies and Computer Science, The Impact of Quantum Computing on Cryptographic Systems: Urgency of Quantum-Resistant Algorithms and Practical Applications in Cryptography, DOI: 10.24018/ejcompute.2025.5.1.146 [12] Yong Wang, Eddie Shahril Ismail , A Review on the Advances, Applications, and Future Prospects of Post-Quantum Cryptography in Blockchain and IoT, Digital Object Identifier 10.1109/ACCESS.2025.3584473, VOLUME 13, 2025, IEEE Access [13] https://thequantuminsider.com/2025/05/21/microsoft-brings-post-quantum-cryptography-to-windows-and-linux-in-early-access-rollout/ [14] Freyer, O., Ostermann, M., Minssen, T. et al. Quantum cryptography and data protection for medical devices before and after they meet Q-Day. npj Digit. Med. 8, 620 (2025). https://doi.org/10.1038/s41746-025-02082-3 [15] https://thequantuminsider.com/2025/05/24/google-researcher-lowers-quantum-bar-to-crack-rsa-encryption [16] https://research.ibm.com/blog/nist-pqc-standards [17] www.seventhsense.ai [18] NIST, https://www.nist.gov/cybersecurity/what-post-quantum-cryptography [19] Swati Dixit, Dr. Ujwal Ramesh Shirode, Santoshkumar Vaman Chobe, Swati Nikam, Yogita D. Bhise, The Impact of Quantum Computing on Cryptographic Security Protocols, Journal Advances in Nonlinear Variational Inequalities, Vol 27 No. 3 (2024), [20] NIST, Module-Lattice-Based Key-Encapsulation Mechanism Standard, https://nvlpubs.nist.gov/nistpubs/fips/nist.fips.203.pdf [21] Naya Nagy, Sarah Alnemer, Lama Mohammed Alshuhail, Haifa Alobiad, Tala Almulla, Fatima Ahmed Alrumaihi, Najd Ghadra, Marius Nagy, Module-Lattice-Based Key-Encapsulation Mechanism Performance Measurements, Sci 2025, 7(3), 91; https://doi.org/10.3390/sci7030091 [22] https://medium.com/@adnanmasood/quantum-sundays-21-federal-transition-to-post-quantum-cryptography-kyber-key-exchange-and-bb1d3137e264 [23] https://www.ipfire.org/blog/ipfire-2-29-core-update-193-released [24] https://cloud.google.com/blog/products/identity-security/announcing-quantum-safe-key-encapsulation-mechanisms-in-cloud-kms [25] https://aws.amazon.com/blogs/security/aws-lc-fips-3-0-first-cryptographic-library-to-include-ml-kem-in-fips-140-3-validation/ [26] https://www.encryptionconsulting.com/how-ml-dsa-replaces-ecc-and-rsa-for-digital-signatures/ [27] https://media.defense.gov/2022/Sep/07/2003071836/-1/-1/0/CSI_CNSA_2.0_FAQ_.PDF [28] Homer A. Riva-Cambrin, Rahul Singh, Sanju Lama Garnette R. Sutherland, Extensible Post Quantum Cryptography Based Authentication, https://arxiv.org/html/2505.16112v1 [29] https://csrc.nist.gov/pubs/fips/205/final [30] https://www.ietf.org/archive/id/draft-tls-reddy-slhdsa-00.html [31] https://cloud.google.com/security/resources/post-quantum-cryptography [32] https://aws.amazon.com/security/post-quantum-cryptography/ [33] Naveen Kannegundla, Quantum-Resilient Cloud Networking: Designing Post-Quantum Secure Communication Protocols For Federated Cloud Environments In 2025, International Journal of Advanced Research in Education and Technology, Volume 12, Issue 1, January-February 2025, DOI:10.15680/IJARETY.2025.1201035, [34] Ramesh Reddy Turpu, Fortifying Banking Transactions: Harnessing Post-Quantum Cryptography for Next-Generation Security, International Journal of Cyber Security (IJCS), 1(1), 2023, 1-9. [35] https://www.thestack.technology/post-quantum-digital-signature-breakthrough-jp-morgan/ [36] https://eviden.com/publications/digital-security-magazine/cybersecurity-predictions-2025/post-quantum-cryptography-market-trends/ [37] SEC, Post-Quantum Financial Infrastructure Framework (PQFIF) A Roadmap for the Quantum-Safe Transition of Global Financial Infrastructure, U.S. Crypto Assets Task Force – SEC, September 03, 2025 [38] WEF, Quantum Technologies: Key Strategies and Opportunities for Financial Services Leaders WHITE PAPER JULY 2025 [39] Adebayo Yusuf Balogun, Post-Quantum Cryptography and Encryption Standards: Safeguarding Patient Data Against Emerging Cyber Threats in Telemedicine, February 2025, Asian Journal of Research in Computer Science 18(3):345-367, DOI: 10.9734/ajrcos/2025/v18i3598, [40] Saberi Kamarposhti M, Ng KW, Chua FF, Abdullah J, Yadollahi M, Moradi M, Ahmadpour S., Post-quantum healthcare: A roadmap for cybersecurity resilience in medical data. Heliyon. 2024 May 16;10(10):e31406. doi: 10.1016/j.heliyon.2024.e31406. [41] https://hoop.dev/blog/hipaa-quantum-safe-cryptography-a-practical-guide-for-secure-compliance [42] Don Roosan, Rubayat Khan, Saif Nirzhor, Fahmida Hai, Blockchain in Healthcare Today: Post-Quantum Cryptography Resilience in Telehealth Using Quantum Key Distribution, Apr 2025, DOI: 10.30953/bhty.v8.379 [43] https://thequantuminsider.com/2025/05/15/u-s-presses-federal-agencies-to-adopt-post-quantum-cryptography-in-government-acquisitions/?__cf_chl_tk=aAMFBSCPSRFkDM5dP6avjyg5A9PMIq3OCWxh98QzGLM-1761649221-1.0.1.1-LORjbXvrFQw72mMuLDr3_IunwR.2Xy07XOWfUc3hlmc [44] GSA, 2025, Post Quantum Cryptography Buyer\'s Guide [45] Kubernetes, 2025, Post-Quantum Cryptography in Kubernetes. [46] www.finacle.com/recent reports [47] NIST, https://www.nist.gov/news-events/news/2025/08/nist-finalizes-lightweight-cryptography-standard-protect-small-devices [48] A. Sharma, S. Rani, Post-Quantum Cryptography (PQC) for IoT-Consumer Electronics Devices Integrated With Deep Learning, in IEEE Transactions on Consumer Electronics, vol. 71, no. 2, pp. 4925-4933, May 2025, doi: 10.1109/TCE.2025.3569904 [49] https://medium.com/be-tech-with-santander/how-to-configure-post-quantum-cryptography-in-your-web-server-fcf79e05e526 [50] Chen, Y., et al., Quantum Computing Empowering Blockchain, Journal of Cloud Computing, 2025, 14(25). [51] https://thequantuminsider.com/2025/01/04/solana-takes-a-step-toward-pqc-era-with-quantum-resistant-vault/ [52] Batta, P., Wasson, V., Sardar, S., Securing Blockchain with Quantum-Inspired Protocols. In: Kumar, A., Batta, P., Le, DN. (eds) Quantum Protocols in Blockchain Security. Blockchain Technologies. Springer 2025, Singapore. https://doi.org/10.1007/978-981-96-9148-7_1 [53] Nadeem Ahmed, Lei Zhang, Aryya Gangopadhyay, A Survey of Post-Quantum Cryptography Support in Cryptographic Libraries, , https://arxiv.org/html/2508.16078v1 [54] https://www.imarcgroup.com › post-quantum-cryptography [55] https://www.marketsandmarkets.com/Market-Reports/post-quantum-cryptography-market-126986626.html [56] https://inductusgcc.com › how-the-best-gccs-in-india-ar [57] www.ibef.com [58] https://etedge-insights.com › GCC [59] https://inductusgcc.com/quantum-ready-gccs-preparing-for-tomorrows-computing-powerhouses/ [60] Medium, Top 10 Post-Quantum Cryptography Vendors, 2025 [61] F5 Labs, 2025, The State of Post-Quantum Cryptography on the Web, https://www.f5.com/labs/articles/the-state-of-pqc-on-the-web [62] https://nvlpubs.nist.gov/nistpubs/fips/nist.fips.204.pdf [63] Times of India, 3rd Nov, 2025, Pune Edition
Copyright © 2025 Vivek Gujar. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Paper Id : IJRASET75045
Publish Date : 2025-11-04
ISSN : 2321-9653
Publisher Name : IJRASET
DOI Link : Click Here
Submit Paper Online
