AG-2024.02-1740·quant-ph·cross-listed: cs.CR
Cryptography: Classical versus Post-Quantum
Authors
- Abhinav Awasthi
- Atul Chaturvedi
Abstract
The advantages of post-quantum cryptography over classical cryptography are covered in this survey. We address several post-quantum cryptography techniques. We conclude that the deployment of quantum-safe cryptographic systems is anticipated to be the future of secure communication, and that the development of post-quantum cryptography is essential to guarantee the security of sensitive information in the post quantum era.
Submitted
16 February 20242 years ago
Version
v1
License
CC-BY-4.0
DOI
10.48550/arXiv.2402.10988
Summary
This survey compares classical cryptography with post-quantum alternatives, arguing that quantum-safe systems will be necessary to protect data once quantum computers become powerful enough to break current encryption methods.
- Post-quantum cryptography uses mathematical problems thought to be hard even for quantum computers, unlike RSA encryption which quantum computers could crack.
- The survey covers multiple post-quantum approaches (lattice-based, hash-based, and others), showing there's no single solution but rather a toolkit for different applications.
- Organizations should begin transitioning to quantum-safe encryption now because sensitive data encrypted today with classical methods could be decrypted by future quantum computers—a threat called 'harvest now, decrypt later.'
curious · generated by claude-haiku-4-5
Chat with this PDF
Ask questions, probe assumptions, request a plain-English summary. Answers cite sections from the preprint itself.
Community
Questions and answers about this paper from other readers. No formal peer review — just a place to think out loud.