Post-Quantum Encryption Algorithms
The most used asymmetric encryption algorithm nowadays is RSA. It may become insecure regarding advances in the field of quantum computers. It is the reason why the National Institute of Standards and Technologies introduces the challenges of choosing a new post-quantum encryption standard. Initiall...
Uložené v:
| Vydané v: | Acta electrotechnica et informatica Ročník 25; číslo 3; s. 16 - 24 |
|---|---|
| Hlavní autori: | , |
| Médium: | Journal Article |
| Jazyk: | English |
| Vydavateľské údaje: |
Kosice
Sciendo
01.09.2025
De Gruyter Brill Sp. z o.o., Paradigm Publishing Services |
| Predmet: | |
| ISSN: | 1338-3957, 1335-8243, 1338-3957 |
| On-line prístup: | Získať plný text |
| Tagy: |
Pridať tag
Žiadne tagy, Buďte prvý, kto otaguje tento záznam!
|
| Abstract | The most used asymmetric encryption algorithm nowadays is RSA. It may become insecure regarding advances in the field of quantum computers. It is the reason why the National Institute of Standards and Technologies introduces the challenges of choosing a new post-quantum encryption standard. Initially, NIST received 82 submissions comprising key encapsulation mechanisms and digital signature schemes. However, only 69 of them were formally accepted after an initial review. In July 2022, NIST selected some algorithms for standardization. For the key encapsulation mechanism, Kyber was selected, and for digital signatures, Dilithium Falcon and SPHINCS+. After the third round concluded, NIST indicated it would continue to evaluate some of the alternative algorithms that were not selected as finalists in the third round. This ongoing evaluation is informally referred to as a "fourth round." Initially, there were four participants - BIKE, Classic McEliece, SIKE, and HQC. However, the SIKE downfall with the Castryck-Decru attack was introduced in July 2022, and the HQC algorithm was chosen for standardization in March 2025. In our research, we examine all functions of BIKE, Classic McEliece, and the HQC from the point of view of time and memory consumption. The results obtained will help us during the implementation of the BIKE algorithm on ESP32. |
|---|---|
| AbstractList | The most used asymmetric encryption algorithm nowadays is RSA. It may become insecure regarding advances in the field of quantum computers. It is the reason why the National Institute of Standards and Technologies introduces the challenges of choosing a new post-quantum encryption standard. Initially, NIST received 82 submissions comprising key encapsulation mechanisms and digital signature schemes. However, only 69 of them were formally accepted after an initial review. In July 2022, NIST selected some algorithms for standardization. For the key encapsulation mechanism, Kyber was selected, and for digital signatures, Dilithium Falcon and SPHINCS+. After the third round concluded, NIST indicated it would continue to evaluate some of the alternative algorithms that were not selected as finalists in the third round. This ongoing evaluation is informally referred to as a "fourth round." Initially, there were four participants - BIKE, Classic McEliece, SIKE, and HQC. However, the SIKE downfall with the Castryck-Decru attack was introduced in July 2022, and the HQC algorithm was chosen for standardization in March 2025. In our research, we examine all functions of BIKE, Classic McEliece, and the HQC from the point of view of time and memory consumption. The results obtained will help us during the implementation of the BIKE algorithm on ESP32. |
| Author | Pekarčík, Peter Chovancová, Eva |
| Author_xml | – sequence: 1 givenname: Peter surname: Pekarčík fullname: Pekarčík, Peter email: peter.pekarcik@tuke.sk organization: Department of Computers and Informatics, Faculty of Electrical Engineering and Informatics, Technical University of Košice, Letna 9, 042 00 Košice, Slovak Republic, Tel. +421 55/602 3175 – sequence: 2 givenname: Eva surname: Chovancová fullname: Chovancová, Eva email: eva.chovancova@tuke.sk organization: Department of Computers and Informatics, Faculty of Electrical Engineering and Informatics, Technical University of Košice, Letna 9, 042 00 Košice, Slovak Republic, Tel. +421 55/602 3175 |
| BookMark | eNptkMtLAzEQxoNUsNYevRc9R_PabOKtlPqAggp6Dtk86pbtpia7SP97U1fUg3OZ4eObb4bfKRi1oXUAnGN0RVgprrWrIUGkgAhhfATGmFIBqSzK0Z_5BExT2qBcjGNekDG4eAqpg8-9brt-O1u2Ju53XR3a2bxZh1h3b9t0Bo69bpKbfvcJeL1dvizu4erx7mExX0FDJOOwtMQSSZh2FnHvLEdUY5wF7B2SyFSaCCukMBxTaaWXxvNKMF9JiZgziE7Aw5Brg96oXay3Ou5V0LX6EkJcKx272jRO-UJYxhAuiUasIk4L7SVnwnpvMPY4Z10OWbsY3nuXOrUJfWzz-4qSAjOEBOXZBQeXiSGl6PzPVYzUgarKVNWBqjpQzf6bwf-hm85F69ax3-fhN_zfPVJQzOknYcd89A |
| Cites_doi | 10.47363/JMCA/2023(2)140 10.1109/COINS57856.2023.10189268 10.1007/978-3-642-42001-6_16 10.6028/NIST.IR.8105 10.20944/preprints202402.1299.v1 10.6028/NIST.IR.8547.ipd 10.52940/ijici.v2i2.39 10.56155/978-81-955020-3-5-07 10.3390/cryptography7030040 |
| ContentType | Journal Article |
| Copyright | 2025. This work is published under http://creativecommons.org/licenses/by/4.0 (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. |
| Copyright_xml | – notice: 2025. This work is published under http://creativecommons.org/licenses/by/4.0 (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. |
| DBID | AAYXX CITATION 7SP 8FD 8FE 8FG ABUWG AFKRA ARAPS AZQEC BENPR BGLVJ BYOGL CCPQU DWQXO GNUQQ HCIFZ JQ2 K7- L7M P5Z P62 PHGZM PHGZT PKEHL PQEST PQGLB PQQKQ PQUKI PRINS DOA |
| DOI | 10.2478/aei-2025-0011 |
| DatabaseName | CrossRef Electronics & Communications Abstracts Technology Research Database ProQuest SciTech Collection ProQuest Technology Collection ProQuest Central (Alumni) ProQuest Central UK/Ireland Advanced Technologies & Computer Science Collection ProQuest Central Essentials ProQuest Central Technology collection East Europe, Central Europe Database ProQuest One Community College ProQuest Central ProQuest Central Student SciTech Premium Collection ProQuest Computer Science Collection Computer Science Database Advanced Technologies Database with Aerospace ProQuest advanced technologies & aerospace journals ProQuest Advanced Technologies & Aerospace Collection ProQuest Central Premium ProQuest One Academic (New) ProQuest One Academic Middle East (New) ProQuest One Academic Eastern Edition (DO NOT USE) ProQuest One Applied & Life Sciences ProQuest One Academic (retired) ProQuest One Academic UKI Edition ProQuest Central China DOAJ Directory of Open Access Journals |
| DatabaseTitle | CrossRef Computer Science Database ProQuest Central Student Technology Collection Technology Research Database ProQuest One Academic Middle East (New) ProQuest Advanced Technologies & Aerospace Collection ProQuest Central Essentials ProQuest Computer Science Collection ProQuest Central (Alumni Edition) SciTech Premium Collection ProQuest One Community College ProQuest Central China ProQuest Central ProQuest One Applied & Life Sciences ProQuest Central Korea ProQuest Central (New) Advanced Technologies Database with Aerospace Advanced Technologies & Aerospace Collection ProQuest One Academic Eastern Edition Electronics & Communications Abstracts East Europe, Central Europe Database ProQuest Technology Collection ProQuest SciTech Collection Advanced Technologies & Aerospace Database ProQuest One Academic UKI Edition ProQuest One Academic ProQuest One Academic (New) |
| DatabaseTitleList | Computer Science Database CrossRef |
| Database_xml | – sequence: 1 dbid: DOA name: DOAJ Directory of Open Access Journals url: https://www.doaj.org/ sourceTypes: Open Website – sequence: 2 dbid: BYOGL name: East Europe, Central Europe Database url: https://search.proquest.com/eastcentraleurope sourceTypes: Aggregation Database |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Engineering |
| EISSN | 1338-3957 |
| EndPage | 24 |
| ExternalDocumentID | oai_doaj_org_article_f58d440172a04b2ea8af9648dffc11f1 10_2478_aei_2025_0011 10_2478_aei_2025_001125316 |
| GroupedDBID | 9WM AAKPC AATOW ABFKT ABUWG ADBBV AFFHD AFKRA AHGSO ALMA_UNASSIGNED_HOLDINGS ARAPS BCNDV BENPR BGLVJ BYOGL CCPQU E0C EBS GROUPED_DOAJ HCIFZ K7- OK1 PHGZM PHGZT PQGLB QD8 RNS SA. SLJYH AAYXX CITATION 7SP 8FD 8FE 8FG AZQEC DWQXO GNUQQ JQ2 L7M P62 PKEHL PQEST PQQKQ PQUKI PRINS |
| ID | FETCH-LOGICAL-c2946-7d2d2924aed06fed603a119241fe090cba28d898c6139d9f9cf6b84fb9904ec03 |
| IEDL.DBID | K7- |
| ISSN | 1338-3957 1335-8243 |
| IngestDate | Mon Oct 13 19:21:34 EDT 2025 Sun Oct 19 01:28:27 EDT 2025 Mon Nov 10 02:37:30 EST 2025 Sat Nov 29 01:26:30 EST 2025 |
| IsDoiOpenAccess | true |
| IsOpenAccess | true |
| IsPeerReviewed | true |
| IsScholarly | true |
| Issue | 3 |
| Language | English |
| License | This work is licensed under the Creative Commons Attribution 4.0 International License. http://creativecommons.org/licenses/by/4.0 |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c2946-7d2d2924aed06fed603a119241fe090cba28d898c6139d9f9cf6b84fb9904ec03 |
| Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
| OpenAccessLink | https://doaj.org/article/f58d440172a04b2ea8af9648dffc11f1 |
| PQID | 3251400836 |
| PQPubID | 2016346 |
| PageCount | 9 |
| ParticipantIDs | doaj_primary_oai_doaj_org_article_f58d440172a04b2ea8af9648dffc11f1 proquest_journals_3251400836 crossref_primary_10_2478_aei_2025_0011 walterdegruyter_journals_10_2478_aei_2025_001125316 |
| PublicationCentury | 2000 |
| PublicationDate | 2025-09-01 |
| PublicationDateYYYYMMDD | 2025-09-01 |
| PublicationDate_xml | – month: 09 year: 2025 text: 2025-09-01 day: 01 |
| PublicationDecade | 2020 |
| PublicationPlace | Kosice |
| PublicationPlace_xml | – name: Kosice |
| PublicationTitle | Acta electrotechnica et informatica |
| PublicationYear | 2025 |
| Publisher | Sciendo De Gruyter Brill Sp. z o.o., Paradigm Publishing Services |
| Publisher_xml | – name: Sciendo – name: De Gruyter Brill Sp. z o.o., Paradigm Publishing Services |
| References | 2025093022583772851_j_aei-2025-0011_ref_003 2025093022583772851_j_aei-2025-0011_ref_014 2025093022583772851_j_aei-2025-0011_ref_002 2025093022583772851_j_aei-2025-0011_ref_013 2025093022583772851_j_aei-2025-0011_ref_001 2025093022583772851_j_aei-2025-0011_ref_012 2025093022583772851_j_aei-2025-0011_ref_011 2025093022583772851_j_aei-2025-0011_ref_007 2025093022583772851_j_aei-2025-0011_ref_018 2025093022583772851_j_aei-2025-0011_ref_006 2025093022583772851_j_aei-2025-0011_ref_017 2025093022583772851_j_aei-2025-0011_ref_005 2025093022583772851_j_aei-2025-0011_ref_016 2025093022583772851_j_aei-2025-0011_ref_004 2025093022583772851_j_aei-2025-0011_ref_015 2025093022583772851_j_aei-2025-0011_ref_009 2025093022583772851_j_aei-2025-0011_ref_008 2025093022583772851_j_aei-2025-0011_ref_019 2025093022583772851_j_aei-2025-0011_ref_010 2025093022583772851_j_aei-2025-0011_ref_020 |
| References_xml | – ident: 2025093022583772851_j_aei-2025-0011_ref_004 – ident: 2025093022583772851_j_aei-2025-0011_ref_008 doi: 10.47363/JMCA/2023(2)140 – ident: 2025093022583772851_j_aei-2025-0011_ref_020 doi: 10.1109/COINS57856.2023.10189268 – ident: 2025093022583772851_j_aei-2025-0011_ref_005 – ident: 2025093022583772851_j_aei-2025-0011_ref_003 – ident: 2025093022583772851_j_aei-2025-0011_ref_017 – ident: 2025093022583772851_j_aei-2025-0011_ref_011 doi: 10.1007/978-3-642-42001-6_16 – ident: 2025093022583772851_j_aei-2025-0011_ref_013 doi: 10.6028/NIST.IR.8105 – ident: 2025093022583772851_j_aei-2025-0011_ref_018 doi: 10.20944/preprints202402.1299.v1 – ident: 2025093022583772851_j_aei-2025-0011_ref_015 doi: 10.6028/NIST.IR.8547.ipd – ident: 2025093022583772851_j_aei-2025-0011_ref_009 – ident: 2025093022583772851_j_aei-2025-0011_ref_010 – ident: 2025093022583772851_j_aei-2025-0011_ref_016 – ident: 2025093022583772851_j_aei-2025-0011_ref_014 – ident: 2025093022583772851_j_aei-2025-0011_ref_002 doi: 10.52940/ijici.v2i2.39 – ident: 2025093022583772851_j_aei-2025-0011_ref_012 – ident: 2025093022583772851_j_aei-2025-0011_ref_006 – ident: 2025093022583772851_j_aei-2025-0011_ref_007 – ident: 2025093022583772851_j_aei-2025-0011_ref_001 doi: 10.56155/978-81-955020-3-5-07 – ident: 2025093022583772851_j_aei-2025-0011_ref_019 doi: 10.3390/cryptography7030040 |
| SSID | ssj0000461652 |
| Score | 2.4131002 |
| Snippet | The most used asymmetric encryption algorithm nowadays is RSA. It may become insecure regarding advances in the field of quantum computers. It is the reason... |
| SourceID | doaj proquest crossref walterdegruyter |
| SourceType | Open Website Aggregation Database Index Database Publisher |
| StartPage | 16 |
| SubjectTerms | Algorithms BIKE Classic McEliece Digital signatures Encapsulation Encryption HQC Post-quantum cryptography Post-quantum encryption algorithms Quantum computers Standardization |
| SummonAdditionalLinks | – databaseName: DOAJ Directory of Open Access Journals dbid: DOA link: http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV3NS8MwFH_I8KCH4SdOpxQRb2VtmqbJccqGp6GgsFtI8zEHrpNuVfbfm6SdThG8eC2BPn4v7-PHC78HcKVsMNPMuAXEqbYExSgXUiSMlRtLScKIln7ZRDYa0fGY3W-s-nJvwmp54Bq4nkmpwtgxFRHhHGlBhWEEU2WMjGPjiU-UsQ0y5XMwJvbnqBbVRDijPaGn9kagNHRN0Lci5LX6vzWY7Xc_qlZ6Ular5Xo06ivOcA_aTasY9GsT92FLFwewuyEgeAiXbtdu-FBZeKpZMChkufIpIOi_TOaW9j_PFkfwNBw83t6FzdaDUCKGSZgppJBlRUKriBitSJSI2NGk2OiIRTIXiCrKqLSFmClmmDQkp9jktq5gLaPkGFrFvNAnEAivLp8LRoXAqUYiz1TMLCdBluhRnXXgeg0Df63FLbglBQ4vbvHiDi__6K0DNw6kz0NOk9p_sJ7ijaf4X57qQHcNMW8CZcET219h1weSDiQ_YP869atRyKYPcvoflp3BTn013NOxLrSWZaXPYVu-LaeL8sLfrA8gC9Fp priority: 102 providerName: Directory of Open Access Journals |
| Title | Post-Quantum Encryption Algorithms |
| URI | https://reference-global.com/article/10.2478/aei-2025-0011 https://www.proquest.com/docview/3251400836 https://doaj.org/article/f58d440172a04b2ea8af9648dffc11f1 |
| Volume | 25 |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVAON databaseName: DOAJ Directory of Open Access Journals customDbUrl: eissn: 1338-3957 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0000461652 issn: 1338-3957 databaseCode: DOA dateStart: 20010101 isFulltext: true titleUrlDefault: https://www.doaj.org/ providerName: Directory of Open Access Journals – providerCode: PRVPQU databaseName: Computer Science Database customDbUrl: eissn: 1338-3957 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0000461652 issn: 1338-3957 databaseCode: K7- dateStart: 20210101 isFulltext: true titleUrlDefault: http://search.proquest.com/compscijour providerName: ProQuest – providerCode: PRVPQU databaseName: East Europe, Central Europe Database customDbUrl: eissn: 1338-3957 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0000461652 issn: 1338-3957 databaseCode: BYOGL dateStart: 20110101 isFulltext: true titleUrlDefault: https://search.proquest.com/eastcentraleurope providerName: ProQuest – providerCode: PRVPQU databaseName: ProQuest advanced technologies & aerospace journals customDbUrl: eissn: 1338-3957 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0000461652 issn: 1338-3957 databaseCode: P5Z dateStart: 20210101 isFulltext: true titleUrlDefault: https://search.proquest.com/hightechjournals providerName: ProQuest – providerCode: PRVPQU databaseName: ProQuest Central (subscription) customDbUrl: eissn: 1338-3957 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0000461652 issn: 1338-3957 databaseCode: BENPR dateStart: 20210101 isFulltext: true titleUrlDefault: https://www.proquest.com/central providerName: ProQuest |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV3PT9swFH6CsgMcCoyhdWNVhRA3i8RxHPs0ASriVBUEEuISOf7RIUHL0paJ_37vuSmMCe2ySw5RZFlf3q_Pz3ofwIFDZ1ZFIAHi3CNBCY5cSrLUUVvKSi29jWITxWCgbm70sDlwmzbXKpcxMQZqN7F0Rn6UYSIWVDDI748_GalGUXe1kdBYhbWUYxCmpmzBXs5YaJi4jKI7yMRyprjIFmM2uSjUkfF3aCM8Z1QWvUlLcXr_m5Kz_Ss2r50f1fPn2bJZGnPQ2eb_7n4L2k312TtemMs2rPjxR9j4YybhDuyTfC-7mCPi84def2zr5xhVesf3I1xx9uNh-gmuz_pXp-esEVJglmshWeG440i0jHeJDN7JJDMpMa80-EQntjJcOaWVxdyunQ7aBlkpESpMVcLbJNuF1ngy9p-hZ-LA-spoZYzIPTdV4VKNNAfhT5QvOnC4xLF8XMzLKJFnEOAlAl4S4PEeXQdOCOWXj2jMdXwxqUdl4zVlyJUTgmiqSUTFvVEmaCmUC8GmacBF9pZwl43vTctXrDuQ_fXfXr96d1McI5L88u9Fv8L6wmrontketGb13H-DD_Zpdjetu7B20h8ML7uR23ejOeJzmN_-BpNq5AY |
| linkProvider | ProQuest |
| linkToHtml | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMw1V1Nb9QwEB2VLRJwKN9iaQsRAm5RE8dx7EOF2rJVq5ZVQUXqLTj-WCrR3ZLdpdo_xW9kxklaihC3HrhGluXkjWfmeZx5AK8tbmZZeBIgzh0SFG9pS4k4tVSWMkIJZ4LYRDEcypMTdbQEP7t_YehaZecTg6O2E0Nn5BsZBmJOCYN4d_49JtUoqq52EhqNWRy4xQVStunm_nvE9w1ju4Pjnb24VRWIDVNcxIVlliHr0M4mwjsrkkynRENS7xKVmEozaaWSBgOdssor40Ulua_Qb3NnkgznvQXLPOMi78Hy9mB49OnyVIfal4sg84PcL48l41nT2JPxQm5od4pWyfKYErFrgTDoBVxLclcuQrnculE9X8y68myIerv3_7fv9QBW2vw62mo2xENYcuNHcO-3rouP4RUJFMcf52hT87NoMDb1IvjNaOvbCN9g9vVs-gQ-38gin0JvPBm7ZxDp0JK_0kpqzXPHdFXYVCGRY8iOpSv68LbDrTxvOoKUyKQI4BIBLgngcFOwD9uE6uUgauQdHkzqUdn6hdLn0nJORFwnvGJOS-2V4NJ6b9LU4yRrHbxl612m5RW2fcj-sJOrUX9dFEOfK57_e9KXcGfv-MNhebg_PFiFu43F0q26NejN6rlbh9vmx-x0Wr9ozT-CLzdtQb8Ajoc-yg |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Post-Quantum+Encryption+Algorithms&rft.jtitle=Acta+electrotechnica+et+informatica&rft.au=Pekar%C4%8D%C3%ADk%2C+Peter&rft.au=Chovancov%C3%A1%2C+Eva&rft.date=2025-09-01&rft.issn=1338-3957&rft.eissn=1338-3957&rft.volume=25&rft.issue=3&rft.spage=16&rft.epage=24&rft_id=info:doi/10.2478%2Faei-2025-0011&rft.externalDBID=n%2Fa&rft.externalDocID=10_2478_aei_2025_0011 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1338-3957&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1338-3957&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1338-3957&client=summon |