Post-Quantum Encryption Algorithms

The most used asymmetric encryption algorithm nowadays is RSA. It may become insecure regarding advances in the field of quantum computers. It is the reason why the National Institute of Standards and Technologies introduces the challenges of choosing a new post-quantum encryption standard. Initiall...

Celý popis

Uloženo v:
Podrobná bibliografie
Vydáno v:Acta electrotechnica et informatica Ročník 25; číslo 3; s. 16 - 24
Hlavní autoři: Pekarčík, Peter, Chovancová, Eva
Médium: Journal Article
Jazyk:angličtina
Vydáno: Kosice Sciendo 01.09.2025
De Gruyter Brill Sp. z o.o., Paradigm Publishing Services
Témata:
ISSN:1338-3957, 1335-8243, 1338-3957
On-line přístup:Získat plný text
Tagy: Přidat tag
Žádné tagy, Buďte první, kdo vytvoří štítek k tomuto záznamu!
Popis
Shrnutí:The most used asymmetric encryption algorithm nowadays is RSA. It may become insecure regarding advances in the field of quantum computers. It is the reason why the National Institute of Standards and Technologies introduces the challenges of choosing a new post-quantum encryption standard. Initially, NIST received 82 submissions comprising key encapsulation mechanisms and digital signature schemes. However, only 69 of them were formally accepted after an initial review. In July 2022, NIST selected some algorithms for standardization. For the key encapsulation mechanism, Kyber was selected, and for digital signatures, Dilithium Falcon and SPHINCS+. After the third round concluded, NIST indicated it would continue to evaluate some of the alternative algorithms that were not selected as finalists in the third round. This ongoing evaluation is informally referred to as a "fourth round." Initially, there were four participants - BIKE, Classic McEliece, SIKE, and HQC. However, the SIKE downfall with the Castryck-Decru attack was introduced in July 2022, and the HQC algorithm was chosen for standardization in March 2025. In our research, we examine all functions of BIKE, Classic McEliece, and the HQC from the point of view of time and memory consumption. The results obtained will help us during the implementation of the BIKE algorithm on ESP32.
Bibliografie:ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ISSN:1338-3957
1335-8243
1338-3957
DOI:10.2478/aei-2025-0011