Post-Quantum Cryptography

Cryptographic algorithms believed to be secure against an attack by a quantum computer.

Aevum AI Key Takeaways
  • PQC aims to replace vulnerable public-key schemes (RSA, ECC) with quantum-resistant algorithms.
  • NIST has standardized CRYSTALS-Kyber (KEM) and CRYSTALS-Dilithium (Signatures) as primary choices.
  • Migration requires significant infrastructure updates due to larger key and signature sizes.
  • Hybrid schemes are recommended for transitional security during deployment.

Post-quantum cryptography (PQC), also known as quantum-resistant cryptography, refers to cryptographic algorithms that are believed to be secure against an attack by both a classical computer and a quantum computer. The emergence of quantum computing threatens widely used public-key cryptographic systems, such as RSA and elliptic curve cryptography, which underpin much of modern digital security.

Unlike quantum cryptography (which uses quantum mechanics to perform cryptographic tasks), post-quantum cryptography relies on classical computational problems that are assumed to be hard even for quantum computers.

Field Cryptography
Primary Threat Shor's Algorithm
Status Standardization (NIST 2024)
Key Types Lattice, Code-based, Hash-based, Isogeny
Related Quantum Computing, RSA, ECC

The Quantum Threat

Current public-key cryptosystems rely on mathematical problems that are hard for classical computers to solve, such as integer factorization (RSA) and the discrete logarithm problem (ECC). However, Shor's algorithm, published in 1994, demonstrates that a sufficiently powerful quantum computer could solve these problems in polynomial time, effectively breaking these systems.

"The transition to post-quantum cryptography is not a matter of if, but when. Organizations must begin cryptanalysis and inventory today."
— Dr. Elena Rossi, Quantum Security Initiative

Symmetric-key cryptography is less affected. Grover's algorithm provides a quadratic speedup for search problems, meaning AES-128 would have security equivalent to AES-64 against a quantum attacker. Doubling the key size (e.g., to AES-256) mitigates this risk.

NIST Standardization

In 2024, the National Institute of Standards and Technology (NIST) finalized its first set of post-quantum cryptographic standards following a multi-year competition:

  • CRYSTALS-Kyber (ML-KEM): For general encryption and key establishment.
  • CRYSTALS-Dilithium (ML-DSA): For digital signatures.
  • FALCON (SLH-DSA): For compact digital signatures.
  • SPHINCS+ (SLH-DSA): For stateless hash-based signatures.

Algorithm Categories

PQC algorithms are classified based on the underlying mathematical hardness assumption.

Lattice-Based Cryptography

Lattice-based schemes rely on the hardness of problems in high-dimensional lattices, such as the Learning With Errors (LWE) problem and the Shortest Vector Problem (SVP). These schemes are favored for their efficiency, small signatures, and resistance to both classical and quantum attacks.

// Pseudocode: LWE Sample Generation
function generate_lwe_secret(n, q):
    s = random_vector(n, q)  // Secret lattice vector
    A = random_matrix(n, n, q)
    e = sample_error(n)      // Small error vector
    b = A * s + e mod q
    return (A, b)  // Public: (A, b), Private: s

Code-Based Cryptography

Based on error-correcting codes, notably the McEliece cryptosystem proposed in 1978. Security relies on the difficulty of decoding a general linear code. While secure, McEliece suffers from large public key sizes (hundreds of kilobytes).

Hash-Based Signatures

Hash-based schemes, such as SPHINCS+, rely solely on the security of cryptographic hash functions. They are considered the most conservative and well-understood PQC candidates but typically produce larger signatures and are slower to generate.

Migration Challenges

Transitioning to PQC involves significant challenges:

  • Performance Overhead: Larger keys and signatures increase bandwidth and storage requirements.
  • Legacy Systems: Embedded devices and IoT systems may lack the computational resources for PQC.
  • Interoperability: Hybrid modes (combining classical and PQC) are recommended during transition periods.
  • Harvest Now, Decrypt Later: Adversaries may collect encrypted data now to decrypt it once quantum computers become viable.

Timeline

1994 Peter Shor publishes Shor's Algorithm
2016 NIST launches PQC standardization process
2022 Round 3 finalists announced
2024 FIPS 203, 204, 205 published

References

  1. Shor, P. W. (1994). "Algorithms for quantum computation: Discrete logarithms and factoring". Proceedings 35th Annual Symposium on Foundations of Computer Science.
  2. NIST. (2024). FIPS 203: Module-Lattice-Based Key-Encapsulation Mechanism Standard.
  3. Bernstein, D. J., et al. (2022). "Post-Quantum Cryptography". Springer.
  4. Alagic, G., et al. (2023). "Status Report on the Third Round of the NIST PQC Standardization Process".