Post-Quantum Cryptography in Future Network Security

Authors

  • Bankim Chandra Chattopadhyay Sat Kabir Institute of Technology and Management, Ladrawan, Haryana, India Author

DOI:

https://doi.org/10.15662/IJARCST.2020.0301001

Keywords:

post-quantum cryptography, PQC, quantum-resistant algorithms, lattice-based cryptography, network security, cryptographic agility, CECPQ1, NIST standardization

Abstract

Post-Quantum Cryptography (PQC) addresses the imminent threat posed by quantum computers to modern cryptographic systems—particularly those based on integer factorization and discrete logarithms. The advent of Shor’s algorithm invalidates widely used schemes like RSA and ECC, mandating a shift to quantum-resistant algorithms. PQC encompasses several mathematical paradigms—including lattice-based, code-based, hash-based, and multivariate polynomial systems—each offering resilience against both classical and quantum attacks. This paper investigates the potential for integrating PQC into future network infrastructures, focusing on wireless and wired communications. We review key standardization efforts, notably NIST's multi-round selection process that commenced in 2016 and considered algorithms such as NewHope, CRYSTALS-Kyber, and SPHINCS+ . We examine practical experiments such as Google’s CECPQ1, combining classical and quantum-safe key exchange in TLS . Challenges related to performance, key sizes, and resource constraints—especially in IoT contexts—are analyzed. Through simulated network evaluations, we explore computational overhead, latency, and ciphertext expansion in PQC deployment. This leads to recommendations for cryptographic agility, including phased migration and hybrid schemes . Results indicate that while PQC introduces overhead, careful design and optimization can mitigate performance penalties. We discuss the trade-offs between security, efficiency, and interoperability. Finally, we propose a workflow for transitioning network systems toward PQC, outline future improvements, and emphasize the necessity of continued research in standardization, implementation security, and agile cryptographic frameworks.

References

1. Regev, O. (2005). On lattice-based cryptography and the LWE problem .

2. Hoffstein, J., Pipher, J., & Silverman, J. (1998). NTRU encryption algorithm.

3. NewHope: ring-LWE key agreement, Google CECPQ1 (2016).

4. NIST PQC standardization rounds (2016–2019).

5. IETF integration of PQC (hybrid TLS, SPHINCS+ in CMS) and ETSI guidance.

6. Workshop on migration challenges & cryptographic agility (2019).

7. PQC types and wireless network constraints (lattice, hash, code, multivariate).

8. Performance evaluation concepts (ciphertext expansion, latency) in network testing.

9. Implementation security considerations (side-channel, key management)

Downloads

Published

2020-01-01

How to Cite

Post-Quantum Cryptography in Future Network Security. (2020). International Journal of Advanced Research in Computer Science & Technology(IJARCST), 3(1), 2244-2247. https://doi.org/10.15662/IJARCST.2020.0301001