Quantum-Resistant Cryptography in Cyber Security

Bhargavgowda, A.B. and Chitra, K. (2025) Quantum-Resistant Cryptography in Cyber Security. Journal of Innovation and Technology, 2025 (22). pp. 1-6. ISSN 2805-5179

[img] Text
joit2025_22.pdf - Published Version
Available under License Creative Commons Attribution.

Download (129kB)
[img] Text
806 - Published Version
Available under License Creative Commons Attribution.

Download (27kB)
Official URL: http://ipublishing.intimal.edu.my/joint.html

Abstract

The emergence of quantum computing presents both significant opportunities and critical challenges for modern cybersecurity. While quantum systems promise advances in science, engineering, and artificial intelligence, they also pose a substantial threat to classical cryptographic techniques such as RSA, ECC, and other widely deployed public-key mechanisms. Quantum algorithms including Shor’s and Grover’s are expected to compromise these systems, placing sensitive data, financial infrastructures, and national security at risk. This paper examines the growing field of quantum-resistant, or post-quantum, cryptography with a focus on identifying constructions capable of withstanding quantum attacks. It provides a systematic overview of major post-quantum cryptographic families, including lattice-based, hash-based, code-based, multivariate, and isogeny-related schemes, and evaluates their current security assumptions, practical efficiency, and readiness for real-world deployment. Beyond technical considerations, the paper highlights the organizational and workforce implications of transitioning to quantum-safe systems, emphasizing the need for coordinated global standards and sustained cybersecurity training. This study underscores that building a quantum-secure digital future requires not only adopting resilient algorithms but also strengthening collaborative, adaptive, and proactive security practices.

Item Type: Article
Uncontrolled Keywords: Post-Quantum Cryptography, Quantum-Resistant Algorithms, Lattice-Based Cryptography, Cybersecurity Migration
Subjects: J Political Science > J General legislative and executive papers
Q Science > QA Mathematics > QA76 Computer software
T Technology > T Technology (General)
Depositing User: Unnamed user with email masilah.mansor@newinti.edu.my
Date Deposited: 12 Dec 2025 08:53
Last Modified: 12 Dec 2025 08:53
URI: http://eprints.intimal.edu.my/id/eprint/2254

Actions (login required)

View Item View Item