Quantum-Resistant Cryptography in Cyber Security
DOI:
https://doi.org/10.61453/joit.v2025no22Keywords:
Post-Quantum Cryptography, Quantum-Resistant Algorithms, Lattice-Based Cryptography, Cybersecurity MigrationAbstract
The emergence of quantum computing presents both significant opportunities and critical challenges for modern cybersecurity. While quantum systems promise advances in science, engineering, and artificial intelligence, they also pose a substantial threat to classical cryptographic techniques such as RSA, ECC, and other widely deployed public-key mechanisms. Quantum algorithms including Shor’s and Grover’s are expected to compromise these systems, placing sensitive data, financial infrastructures, and national security at risk. This paper examines the growing field of quantum-resistant, or post-quantum, cryptography with a focus on identifying constructions capable of withstanding quantum attacks. It provides a systematic overview of major post-quantum cryptographic families, including lattice-based, hash-based, code-based, multivariate, and isogeny-related schemes, and evaluates their current security assumptions, practical efficiency, and readiness for real-world deployment. Beyond technical considerations, the paper highlights the organizational and workforce implications of transitioning to quantum-safe systems, emphasizing the need for coordinated global standards and sustained cybersecurity training. This study underscores that building a quantum-secure digital future requires not only adopting resilient algorithms but also strengthening collaborative, adaptive, and proactive security practices
References
Cybersecurity and Infrastructure Security Agency, National Security Agency, & National Institute of Standards and Technology. (2023). Quantum-readiness: Migration to post-quantum cryptography (Factsheet). U.S. Department of Defense. https://www.cisa.gov/resources-tools/resources/quantum-readiness-migration-post-quantum-cryptography
National Institute of Standards and Technology. (2020). SP 800-208: Recommendation for stateful hash-based signature schemes. NIST Publications. https://doi.org/10.6028/NIST.SP.800-208
National Institute of Standards and Technology. (2024). FIPS 203: Module-lattice-based key-encapsulation mechanism (ML-KEM). U.S. Department of Commerce. https://doi.org/10.6028/NIST.FIPS.203
National Institute of Standards and Technology. (2024). FIPS 204: Module-lattice-based digital signature algorithm (ML-DSA). National Institute of Standards and Technology, Computer Security Resource Center. https://doi.org/10.6028/NIST.FIPS.204
National Institute of Standards and Technology. (2024). FIPS 205: Stateless hash-based digital signature algorithm (SLH-DSA). National Security Agency. https://doi.org/10.6028/NIST.FIPS.205
National Security Agency. (2022). Commercial national security algorithm suite 2.0 (CNSA 2.0): Fact sheet & guidance. National Institute of Standards and Technology, Computer Security Resource Center. https://media.defense.gov/2022/Sep/07/2003071836/-1/-1/0/CSI_CNSA_2.0_FAQ_.PDF
White House, Office of Management and Budget. (2022). M-23-02: Migrating to post-quantum cryptography. The White House. https://www.whitehouse.gov/wp-content/uploads/2022/11/M-23-02-M-Memo-on-Migrating-to-Post-Quantum-Cryptography.pdf
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2025 Journal of Innovation and Technology

This work is licensed under a Creative Commons Attribution 4.0 International License.