Rate the Article: Quantum-Safe Cryptography: Navigating the Future of Cybersecurity in the Post-Quantum Era, IJSR, Call for Papers, Online Journal
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064

Downloads: 7 | Views: 156 | Weekly Hits: ⮙1 | Monthly Hits: ⮙3

Research Paper | Computer Science and Information Technology | United States of America | Volume 14 Issue 2, February 2025 | Rating: 5.5 / 10


Quantum-Safe Cryptography: Navigating the Future of Cybersecurity in the Post-Quantum Era

Jayasudha Yedalla


Abstract: The paper proposes strategic steps that organizations can take to future-proof their security architecture against quantum threats for the security of data integrity and confidentiality in the post-quantum era. it is a very threat that quantum computing is advancing too fast, and the classical cryptographic systems will be in danger. Therefore, we need to modify the methods of cryptography in Quantum-Safe Cryptography. In this paper, we focus on exposing the vulnerabilities of existing public-key cryptosystems faced with quantum attacks and the direction of the post-quantum cryptographic (PQC) algorithm in securing the underlain infrastructure. The paper discusses ongoing efforts to standardize cryptosystems led by the National Institute of Standards and Technology (NIST). It overviews several quantum-resistant cryptographic techniques: lattice-based, hash-based, and code-based examples. Moreover, the paper also outlines difficulties in implementing quantum-safe cryptography solutions into currently in-place cybersecurity frameworks, especially in the finance, healthcare, and critical infrastructure industries.


Keywords: Post-quantum cryptography (PQC), Quantum-Safe Cryptography, Shor?s Algorithm, Quantum Key Distribution (QKD)


Edition: Volume 14 Issue 2, February 2025,


Pages: 249 - 253



Rate this Article


Select Rating (Lowest: 1, Highest: 10)

5

Your Comments (Only high quality comments will be accepted.)

Characters: 0

Your Full Name:


Your Valid Email Address:


Verification Code will appear in 2 Seconds ... Wait

Top