Quantum-Resistant Cryptography in Cyber Security

Authors

  • Bhargavgowda A.B Dayananda Sagar Academy of Technology and Management, Bangalore, Karnataka, India
  • Chitra K. Dayananda Sagar Academy of Technology and Management, Bangalore, Karnataka, India

DOI:

https://doi.org/10.61453/joit.v2025no22

Keywords:

Post-Quantum Cryptography, Quantum-Resistant Algorithms, Lattice-Based Cryptography, Cybersecurity Migration

Abstract

The emergence of quantum computing presents both significant opportunities and critical challenges for modern cybersecurity. While quantum systems promise advances in science, engineering, and artificial intelligence, they also pose a substantial threat to classical cryptographic techniques such as RSA, ECC, and other widely deployed public-key mechanisms. Quantum algorithms including Shor’s and Grover’s are expected to compromise these systems, placing sensitive data, financial infrastructures, and national security at risk. This paper examines the growing field of quantum-resistant, or post-quantum, cryptography with a focus on identifying constructions capable of withstanding quantum attacks. It provides a systematic overview of major post-quantum cryptographic families, including lattice-based, hash-based, code-based, multivariate, and isogeny-related schemes, and evaluates their current security assumptions, practical efficiency, and readiness for real-world deployment. Beyond technical considerations, the paper highlights the organizational and workforce implications of transitioning to quantum-safe systems, emphasizing the need for coordinated global standards and sustained cybersecurity training. This study underscores that building a quantum-secure digital future requires not only adopting resilient algorithms but also strengthening collaborative, adaptive, and proactive security practices

References

Cybersecurity and Infrastructure Security Agency, National Security Agency, & National Institute of Standards and Technology. (2023). Quantum-readiness: Migration to post-quantum cryptography (Factsheet). U.S. Department of Defense. https://www.cisa.gov/resources-tools/resources/quantum-readiness-migration-post-quantum-cryptography

National Institute of Standards and Technology. (2020). SP 800-208: Recommendation for stateful hash-based signature schemes. NIST Publications. https://doi.org/10.6028/NIST.SP.800-208

National Institute of Standards and Technology. (2024). FIPS 203: Module-lattice-based key-encapsulation mechanism (ML-KEM). U.S. Department of Commerce. https://doi.org/10.6028/NIST.FIPS.203

National Institute of Standards and Technology. (2024). FIPS 204: Module-lattice-based digital signature algorithm (ML-DSA). National Institute of Standards and Technology, Computer Security Resource Center. https://doi.org/10.6028/NIST.FIPS.204

National Institute of Standards and Technology. (2024). FIPS 205: Stateless hash-based digital signature algorithm (SLH-DSA). National Security Agency. https://doi.org/10.6028/NIST.FIPS.205

National Security Agency. (2022). Commercial national security algorithm suite 2.0 (CNSA 2.0): Fact sheet & guidance. National Institute of Standards and Technology, Computer Security Resource Center. https://media.defense.gov/2022/Sep/07/2003071836/-1/-1/0/CSI_CNSA_2.0_FAQ_.PDF

White House, Office of Management and Budget. (2022). M-23-02: Migrating to post-quantum cryptography. The White House. https://www.whitehouse.gov/wp-content/uploads/2022/11/M-23-02-M-Memo-on-Migrating-to-Post-Quantum-Cryptography.pdf

Downloads

Published

2025-12-12

How to Cite

A.B, B., & K., C. (2025). Quantum-Resistant Cryptography in Cyber Security . Journal of Innovation and Technology, 2025(2). https://doi.org/10.61453/joit.v2025no22