Post-Quantum Cryptography in Future Network Security
DOI:
https://doi.org/10.15662/IJARCST.2020.0301001Keywords:
post-quantum cryptography, PQC, quantum-resistant algorithms, lattice-based cryptography, network security, cryptographic agility, CECPQ1, NIST standardizationAbstract
Post-Quantum Cryptography (PQC) addresses the imminent threat posed by quantum computers to modern cryptographic systems—particularly those based on integer factorization and discrete logarithms. The advent of Shor’s algorithm invalidates widely used schemes like RSA and ECC, mandating a shift to quantum-resistant algorithms. PQC encompasses several mathematical paradigms—including lattice-based, code-based, hash-based, and multivariate polynomial systems—each offering resilience against both classical and quantum attacks. This paper investigates the potential for integrating PQC into future network infrastructures, focusing on wireless and wired communications. We review key standardization efforts, notably NIST's multi-round selection process that commenced in 2016 and considered algorithms such as NewHope, CRYSTALS-Kyber, and SPHINCS+ . We examine practical experiments such as Google’s CECPQ1, combining classical and quantum-safe key exchange in TLS . Challenges related to performance, key sizes, and resource constraints—especially in IoT contexts—are analyzed. Through simulated network evaluations, we explore computational overhead, latency, and ciphertext expansion in PQC deployment. This leads to recommendations for cryptographic agility, including phased migration and hybrid schemes . Results indicate that while PQC introduces overhead, careful design and optimization can mitigate performance penalties. We discuss the trade-offs between security, efficiency, and interoperability. Finally, we propose a workflow for transitioning network systems toward PQC, outline future improvements, and emphasize the necessity of continued research in standardization, implementation security, and agile cryptographic frameworks.
References
1. Regev, O. (2005). On lattice-based cryptography and the LWE problem .
2. Hoffstein, J., Pipher, J., & Silverman, J. (1998). NTRU encryption algorithm.
3. NewHope: ring-LWE key agreement, Google CECPQ1 (2016).
4. NIST PQC standardization rounds (2016–2019).
5. IETF integration of PQC (hybrid TLS, SPHINCS+ in CMS) and ETSI guidance.
6. Workshop on migration challenges & cryptographic agility (2019).
7. PQC types and wireless network constraints (lattice, hash, code, multivariate).
8. Performance evaluation concepts (ciphertext expansion, latency) in network testing.
9. Implementation security considerations (side-channel, key management)


