Analysis of existing approaches and algorithms of post-quantum cryptography
Kerimbayeva A.
June 2023International Information and Engineering Technology Association
Revue dIntelligence Artificielle
2023#37Issue 3655 - 664 pp.
The rapidly evolving field of post-quantum cryptography necessitates a comprehensive analysis of existing technologies to determine their efficiency and reliability. This study aims to identify the strengths and weaknesses of contemporary approaches and algorithms in post-quantum cryptography, ultimately pinpointing the most effective solutions. To achieve this objective, an analytical comparison of practical post-quantum cryptography systems was conducted, considering key metrics such as security against quantum attacks, computational efficiency, compatibility with existing systems, resistance to various cyber threats, ease of implementation, potential for standardization, and compliance with regulatory requirements. The findings reveal that while numerous approaches and algorithms exist in post-quantum cryptography, the NTRU and SIKE algorithms demonstrate superior efficacy. Additionally, WOTS+, Dilithium, and SABER exhibit promising potential, each possessing unique advantages and disadvantages concerning key size, computation speed, attack resistance, and implementation feasibility. This study offers practical value by providing guidance in the selection and adoption of post-quantum cryptography technologies, thereby contributing to the fields advancement and ensuring robust security in a post-quantum era.
Data protection , Electronic digital signature , Encryption , Information security , Key exchange protocols , Post-quantum cryptography
Text of the article Перейти на текст статьи
Department of Cyber Security, Information Processing and Storage, Satbayev University, 22A Satpaev Str. 050013, Almaty, Kazakhstan
Department of Cyber Security
10 лет помогаем публиковать статьи Международный издатель
Книга Публикация научной статьи Волощук 2026 Book Publication of a scientific article 2026