Powered by OpenAIRE graph
Found an issue? Give us feedback
ZENODOarrow_drop_down
ZENODO
Article . 2025
License: CC BY
Data sources: Datacite
ZENODO
Article . 2025
License: CC BY
Data sources: Datacite
versions View all 2 versions
addClaim

This Research product is the result of merged Research products in OpenAIRE.

You have already added 0 works in your ORCID record related to the merged Research product.

Quantum Computing in Cryptography: Challenges and Post-Quantum Solutions

Authors: Ritesh K. Malhotra1 Shalini P. Deshmukh2, Pranav R. Chatterjee3;

Quantum Computing in Cryptography: Challenges and Post-Quantum Solutions

Abstract

The rapid advancement of quantum computing threatens to undermine the security foundations of modern cryptographic systems, particularly those based on integer factorization and discrete logarithm problems. Algorithms such as Shor’s and Grover’s promise exponential or quadratic speedups, rendering RSA, ECC, and certain symmetric schemes vulnerable within the next decade. This paper presents a simulated evaluation of classical cryptographic algorithms against quantum attacks, followed by a performance assessment of post-quantum cryptographic (PQC) schemes—specifically lattice-based, hash-based, and code-based algorithms. A testing framework was developed using a quantum simulator (Qiskit) and a classical benchmarking environment to model potential attack timelines and measure computational efficiency. Results demonstrate that RSA-2048 can be theoretically broken within 8 hours on a 4000-qubit fault-tolerant quantum processor, while ECC-P256 succumbs in less than 4 hours. In contrast, lattice-based schemes such as CRYSTALS-Kyber resisted quantum simulation attacks, maintaining equivalent classical security levels with only a 27% performance overhead. The study also analyzes the trade-offs between key size, encryption/decryption speed, and resistance to quantum attacks. Our findings emphasize the urgent need for migration to NIST-recommended PQC algorithms and provide a decision-support matrix for selecting suitable replacements in government and enterprise systems.

Keywords

Quantum computing, post-quantum cryptography, Shor's algorithm, lattice-based cryptography, CRYSTALS-Kyber, quantum attack simulation

  • BIP!
    Impact byBIP!
    selected citations
    These citations are derived from selected sources.
    This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
    0
    popularity
    This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network.
    Average
    influence
    This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
    Average
    impulse
    This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network.
    Average
Powered by OpenAIRE graph
Found an issue? Give us feedback
selected citations
These citations are derived from selected sources.
This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
BIP!Citations provided by BIP!
popularity
This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network.
BIP!Popularity provided by BIP!
influence
This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
BIP!Influence provided by BIP!
impulse
This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network.
BIP!Impulse provided by BIP!
0
Average
Average
Average
Upload OA version
Are you the author of this publication? Upload your Open Access version to Zenodo!
It’s fast and easy, just two clicks!