A Systematic Review: Post Quantum Cryptography to Secure Data Transmission

Authors

  • Asma Ibrahim Hussein Ministry of Higher Education and Scientific Research, Bagdad, Iraq https://orcid.org/0000-0001-7512-4794
  • Abeer Tariq MaoLood Computer Science, University of Technology, Bagdad, Iraq
  • Ekhlas Khalaf Gbash Computer Science, University of Technology, Bagdad, Iraq

DOI:

https://doi.org/10.24996/ijs.2024.65.7.35

Keywords:

Post-quantum cryptography, public key, cryptographic, quantum-attacks

Abstract

      A significant topic of contemporary cryptography research and standardization is the development of public key crypto systems that resist attacks from quantum computers. Protocols and applications should start investigating the use of quantum-resistant key exchange and encryption to protect the confidentiality of current communications against future quantum computers utilizing post-quantum cryptography for a particular key exchange. Since they operate harder and need fewer steps compared to conventional computers, quantum algorithms are more secure and robust. Attackers who use quantum computers have powerful computing capabilities, and a quantum allows for simple cryptographic system breaking. Security algorithms that are quantum secure are resistant to attacks from conventional, as well as quantum computers. This work has surveyed, summarized, and analysed previous research to provide readers of this study an integrated understanding of quantum cryptography. It also discusses quantum attacks, which could be used in place of more conventional cryptography techniques, such as quantum key distribution, which takes advantage of quantum mechanics' properties to ensure secure exchanges of the secret keys, and various quantum algorithms. With quantum computation becoming a very real threat, this should motivate more people to show an early interest in the future of cryptography.

Downloads

Published

2024-07-30

Issue

Section

Computer Science

How to Cite

A Systematic Review: Post Quantum Cryptography to Secure Data Transmission. (2024). Iraqi Journal of Science, 65(7), 3975-3992. https://doi.org/10.24996/ijs.2024.65.7.35

Similar Articles

1-10 of 375

You may also start an advanced similarity search for this article.