Post-Quantum Encryption Algorithms

The most used asymmetric encryption algorithm nowadays is RSA. It may become insecure regarding advances in the field of quantum computers. It is the reason why the National Institute of Standards and Technologies introduces the challenges of choosing a new post-quantum encryption standard. Initiall...

Celý popis

Uložené v:
Podrobná bibliografia
Vydané v:Acta electrotechnica et informatica Ročník 25; číslo 3; s. 16 - 24
Hlavní autori: Pekarčík, Peter, Chovancová, Eva
Médium: Journal Article
Jazyk:English
Vydavateľské údaje: Kosice Sciendo 01.09.2025
De Gruyter Brill Sp. z o.o., Paradigm Publishing Services
Predmet:
ISSN:1338-3957, 1335-8243, 1338-3957
On-line prístup:Získať plný text
Tagy: Pridať tag
Žiadne tagy, Buďte prvý, kto otaguje tento záznam!
Abstract The most used asymmetric encryption algorithm nowadays is RSA. It may become insecure regarding advances in the field of quantum computers. It is the reason why the National Institute of Standards and Technologies introduces the challenges of choosing a new post-quantum encryption standard. Initially, NIST received 82 submissions comprising key encapsulation mechanisms and digital signature schemes. However, only 69 of them were formally accepted after an initial review. In July 2022, NIST selected some algorithms for standardization. For the key encapsulation mechanism, Kyber was selected, and for digital signatures, Dilithium Falcon and SPHINCS+. After the third round concluded, NIST indicated it would continue to evaluate some of the alternative algorithms that were not selected as finalists in the third round. This ongoing evaluation is informally referred to as a "fourth round." Initially, there were four participants - BIKE, Classic McEliece, SIKE, and HQC. However, the SIKE downfall with the Castryck-Decru attack was introduced in July 2022, and the HQC algorithm was chosen for standardization in March 2025. In our research, we examine all functions of BIKE, Classic McEliece, and the HQC from the point of view of time and memory consumption. The results obtained will help us during the implementation of the BIKE algorithm on ESP32.
AbstractList The most used asymmetric encryption algorithm nowadays is RSA. It may become insecure regarding advances in the field of quantum computers. It is the reason why the National Institute of Standards and Technologies introduces the challenges of choosing a new post-quantum encryption standard. Initially, NIST received 82 submissions comprising key encapsulation mechanisms and digital signature schemes. However, only 69 of them were formally accepted after an initial review. In July 2022, NIST selected some algorithms for standardization. For the key encapsulation mechanism, Kyber was selected, and for digital signatures, Dilithium Falcon and SPHINCS+. After the third round concluded, NIST indicated it would continue to evaluate some of the alternative algorithms that were not selected as finalists in the third round. This ongoing evaluation is informally referred to as a "fourth round." Initially, there were four participants - BIKE, Classic McEliece, SIKE, and HQC. However, the SIKE downfall with the Castryck-Decru attack was introduced in July 2022, and the HQC algorithm was chosen for standardization in March 2025. In our research, we examine all functions of BIKE, Classic McEliece, and the HQC from the point of view of time and memory consumption. The results obtained will help us during the implementation of the BIKE algorithm on ESP32.
Author Pekarčík, Peter
Chovancová, Eva
Author_xml – sequence: 1
  givenname: Peter
  surname: Pekarčík
  fullname: Pekarčík, Peter
  email: peter.pekarcik@tuke.sk
  organization: Department of Computers and Informatics, Faculty of Electrical Engineering and Informatics, Technical University of Košice, Letna 9, 042 00 Košice, Slovak Republic, Tel. +421 55/602 3175
– sequence: 2
  givenname: Eva
  surname: Chovancová
  fullname: Chovancová, Eva
  email: eva.chovancova@tuke.sk
  organization: Department of Computers and Informatics, Faculty of Electrical Engineering and Informatics, Technical University of Košice, Letna 9, 042 00 Košice, Slovak Republic, Tel. +421 55/602 3175
BookMark eNptkMtLAzEQxoNUsNYevRc9R_PabOKtlPqAggp6Dtk86pbtpia7SP97U1fUg3OZ4eObb4bfKRi1oXUAnGN0RVgprrWrIUGkgAhhfATGmFIBqSzK0Z_5BExT2qBcjGNekDG4eAqpg8-9brt-O1u2Ju53XR3a2bxZh1h3b9t0Bo69bpKbfvcJeL1dvizu4erx7mExX0FDJOOwtMQSSZh2FnHvLEdUY5wF7B2SyFSaCCukMBxTaaWXxvNKMF9JiZgziE7Aw5Brg96oXay3Ou5V0LX6EkJcKx272jRO-UJYxhAuiUasIk4L7SVnwnpvMPY4Z10OWbsY3nuXOrUJfWzz-4qSAjOEBOXZBQeXiSGl6PzPVYzUgarKVNWBqjpQzf6bwf-hm85F69ax3-fhN_zfPVJQzOknYcd89A
Cites_doi 10.47363/JMCA/2023(2)140
10.1109/COINS57856.2023.10189268
10.1007/978-3-642-42001-6_16
10.6028/NIST.IR.8105
10.20944/preprints202402.1299.v1
10.6028/NIST.IR.8547.ipd
10.52940/ijici.v2i2.39
10.56155/978-81-955020-3-5-07
10.3390/cryptography7030040
ContentType Journal Article
Copyright 2025. This work is published under http://creativecommons.org/licenses/by/4.0 (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
Copyright_xml – notice: 2025. This work is published under http://creativecommons.org/licenses/by/4.0 (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
DBID AAYXX
CITATION
7SP
8FD
8FE
8FG
ABUWG
AFKRA
ARAPS
AZQEC
BENPR
BGLVJ
BYOGL
CCPQU
DWQXO
GNUQQ
HCIFZ
JQ2
K7-
L7M
P5Z
P62
PHGZM
PHGZT
PKEHL
PQEST
PQGLB
PQQKQ
PQUKI
PRINS
DOA
DOI 10.2478/aei-2025-0011
DatabaseName CrossRef
Electronics & Communications Abstracts
Technology Research Database
ProQuest SciTech Collection
ProQuest Technology Collection
ProQuest Central (Alumni)
ProQuest Central UK/Ireland
Advanced Technologies & Computer Science Collection
ProQuest Central Essentials
ProQuest Central
Technology collection
East Europe, Central Europe Database
ProQuest One Community College
ProQuest Central
ProQuest Central Student
SciTech Premium Collection
ProQuest Computer Science Collection
Computer Science Database
Advanced Technologies Database with Aerospace
ProQuest advanced technologies & aerospace journals
ProQuest Advanced Technologies & Aerospace Collection
ProQuest Central Premium
ProQuest One Academic (New)
ProQuest One Academic Middle East (New)
ProQuest One Academic Eastern Edition (DO NOT USE)
ProQuest One Applied & Life Sciences
ProQuest One Academic (retired)
ProQuest One Academic UKI Edition
ProQuest Central China
DOAJ Directory of Open Access Journals
DatabaseTitle CrossRef
Computer Science Database
ProQuest Central Student
Technology Collection
Technology Research Database
ProQuest One Academic Middle East (New)
ProQuest Advanced Technologies & Aerospace Collection
ProQuest Central Essentials
ProQuest Computer Science Collection
ProQuest Central (Alumni Edition)
SciTech Premium Collection
ProQuest One Community College
ProQuest Central China
ProQuest Central
ProQuest One Applied & Life Sciences
ProQuest Central Korea
ProQuest Central (New)
Advanced Technologies Database with Aerospace
Advanced Technologies & Aerospace Collection
ProQuest One Academic Eastern Edition
Electronics & Communications Abstracts
East Europe, Central Europe Database
ProQuest Technology Collection
ProQuest SciTech Collection
Advanced Technologies & Aerospace Database
ProQuest One Academic UKI Edition
ProQuest One Academic
ProQuest One Academic (New)
DatabaseTitleList Computer Science Database

CrossRef

Database_xml – sequence: 1
  dbid: DOA
  name: DOAJ Directory of Open Access Journals
  url: https://www.doaj.org/
  sourceTypes: Open Website
– sequence: 2
  dbid: BYOGL
  name: East Europe, Central Europe Database
  url: https://search.proquest.com/eastcentraleurope
  sourceTypes: Aggregation Database
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
EISSN 1338-3957
EndPage 24
ExternalDocumentID oai_doaj_org_article_f58d440172a04b2ea8af9648dffc11f1
10_2478_aei_2025_0011
10_2478_aei_2025_001125316
GroupedDBID 9WM
AAKPC
AATOW
ABFKT
ABUWG
ADBBV
AFFHD
AFKRA
AHGSO
ALMA_UNASSIGNED_HOLDINGS
ARAPS
BCNDV
BENPR
BGLVJ
BYOGL
CCPQU
E0C
EBS
GROUPED_DOAJ
HCIFZ
K7-
OK1
PHGZM
PHGZT
PQGLB
QD8
RNS
SA.
SLJYH
AAYXX
CITATION
7SP
8FD
8FE
8FG
AZQEC
DWQXO
GNUQQ
JQ2
L7M
P62
PKEHL
PQEST
PQQKQ
PQUKI
PRINS
ID FETCH-LOGICAL-c2946-7d2d2924aed06fed603a119241fe090cba28d898c6139d9f9cf6b84fb9904ec03
IEDL.DBID K7-
ISSN 1338-3957
1335-8243
IngestDate Mon Oct 13 19:21:34 EDT 2025
Sun Oct 19 01:28:27 EDT 2025
Mon Nov 10 02:37:30 EST 2025
Sat Nov 29 01:26:30 EST 2025
IsDoiOpenAccess true
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Issue 3
Language English
License This work is licensed under the Creative Commons Attribution 4.0 International License.
http://creativecommons.org/licenses/by/4.0
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c2946-7d2d2924aed06fed603a119241fe090cba28d898c6139d9f9cf6b84fb9904ec03
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
OpenAccessLink https://doaj.org/article/f58d440172a04b2ea8af9648dffc11f1
PQID 3251400836
PQPubID 2016346
PageCount 9
ParticipantIDs doaj_primary_oai_doaj_org_article_f58d440172a04b2ea8af9648dffc11f1
proquest_journals_3251400836
crossref_primary_10_2478_aei_2025_0011
walterdegruyter_journals_10_2478_aei_2025_001125316
PublicationCentury 2000
PublicationDate 2025-09-01
PublicationDateYYYYMMDD 2025-09-01
PublicationDate_xml – month: 09
  year: 2025
  text: 2025-09-01
  day: 01
PublicationDecade 2020
PublicationPlace Kosice
PublicationPlace_xml – name: Kosice
PublicationTitle Acta electrotechnica et informatica
PublicationYear 2025
Publisher Sciendo
De Gruyter Brill Sp. z o.o., Paradigm Publishing Services
Publisher_xml – name: Sciendo
– name: De Gruyter Brill Sp. z o.o., Paradigm Publishing Services
References 2025093022583772851_j_aei-2025-0011_ref_003
2025093022583772851_j_aei-2025-0011_ref_014
2025093022583772851_j_aei-2025-0011_ref_002
2025093022583772851_j_aei-2025-0011_ref_013
2025093022583772851_j_aei-2025-0011_ref_001
2025093022583772851_j_aei-2025-0011_ref_012
2025093022583772851_j_aei-2025-0011_ref_011
2025093022583772851_j_aei-2025-0011_ref_007
2025093022583772851_j_aei-2025-0011_ref_018
2025093022583772851_j_aei-2025-0011_ref_006
2025093022583772851_j_aei-2025-0011_ref_017
2025093022583772851_j_aei-2025-0011_ref_005
2025093022583772851_j_aei-2025-0011_ref_016
2025093022583772851_j_aei-2025-0011_ref_004
2025093022583772851_j_aei-2025-0011_ref_015
2025093022583772851_j_aei-2025-0011_ref_009
2025093022583772851_j_aei-2025-0011_ref_008
2025093022583772851_j_aei-2025-0011_ref_019
2025093022583772851_j_aei-2025-0011_ref_010
2025093022583772851_j_aei-2025-0011_ref_020
References_xml – ident: 2025093022583772851_j_aei-2025-0011_ref_004
– ident: 2025093022583772851_j_aei-2025-0011_ref_008
  doi: 10.47363/JMCA/2023(2)140
– ident: 2025093022583772851_j_aei-2025-0011_ref_020
  doi: 10.1109/COINS57856.2023.10189268
– ident: 2025093022583772851_j_aei-2025-0011_ref_005
– ident: 2025093022583772851_j_aei-2025-0011_ref_003
– ident: 2025093022583772851_j_aei-2025-0011_ref_017
– ident: 2025093022583772851_j_aei-2025-0011_ref_011
  doi: 10.1007/978-3-642-42001-6_16
– ident: 2025093022583772851_j_aei-2025-0011_ref_013
  doi: 10.6028/NIST.IR.8105
– ident: 2025093022583772851_j_aei-2025-0011_ref_018
  doi: 10.20944/preprints202402.1299.v1
– ident: 2025093022583772851_j_aei-2025-0011_ref_015
  doi: 10.6028/NIST.IR.8547.ipd
– ident: 2025093022583772851_j_aei-2025-0011_ref_009
– ident: 2025093022583772851_j_aei-2025-0011_ref_010
– ident: 2025093022583772851_j_aei-2025-0011_ref_016
– ident: 2025093022583772851_j_aei-2025-0011_ref_014
– ident: 2025093022583772851_j_aei-2025-0011_ref_002
  doi: 10.52940/ijici.v2i2.39
– ident: 2025093022583772851_j_aei-2025-0011_ref_012
– ident: 2025093022583772851_j_aei-2025-0011_ref_006
– ident: 2025093022583772851_j_aei-2025-0011_ref_007
– ident: 2025093022583772851_j_aei-2025-0011_ref_001
  doi: 10.56155/978-81-955020-3-5-07
– ident: 2025093022583772851_j_aei-2025-0011_ref_019
  doi: 10.3390/cryptography7030040
SSID ssj0000461652
Score 2.4131002
Snippet The most used asymmetric encryption algorithm nowadays is RSA. It may become insecure regarding advances in the field of quantum computers. It is the reason...
SourceID doaj
proquest
crossref
walterdegruyter
SourceType Open Website
Aggregation Database
Index Database
Publisher
StartPage 16
SubjectTerms Algorithms
BIKE
Classic McEliece
Digital signatures
Encapsulation
Encryption
HQC
Post-quantum cryptography
Post-quantum encryption algorithms
Quantum computers
Standardization
SummonAdditionalLinks – databaseName: DOAJ Directory of Open Access Journals
  dbid: DOA
  link: http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV3NS8MwFH_I8KCH4SdOpxQRb2VtmqbJccqGp6GgsFtI8zEHrpNuVfbfm6SdThG8eC2BPn4v7-PHC78HcKVsMNPMuAXEqbYExSgXUiSMlRtLScKIln7ZRDYa0fGY3W-s-nJvwmp54Bq4nkmpwtgxFRHhHGlBhWEEU2WMjGPjiU-UsQ0y5XMwJvbnqBbVRDijPaGn9kagNHRN0Lci5LX6vzWY7Xc_qlZ6Ular5Xo06ivOcA_aTasY9GsT92FLFwewuyEgeAiXbtdu-FBZeKpZMChkufIpIOi_TOaW9j_PFkfwNBw83t6FzdaDUCKGSZgppJBlRUKriBitSJSI2NGk2OiIRTIXiCrKqLSFmClmmDQkp9jktq5gLaPkGFrFvNAnEAivLp8LRoXAqUYiz1TMLCdBluhRnXXgeg0Df63FLbglBQ4vbvHiDi__6K0DNw6kz0NOk9p_sJ7ijaf4X57qQHcNMW8CZcET219h1weSDiQ_YP869atRyKYPcvoflp3BTn013NOxLrSWZaXPYVu-LaeL8sLfrA8gC9Fp
  priority: 102
  providerName: Directory of Open Access Journals
Title Post-Quantum Encryption Algorithms
URI https://reference-global.com/article/10.2478/aei-2025-0011
https://www.proquest.com/docview/3251400836
https://doaj.org/article/f58d440172a04b2ea8af9648dffc11f1
Volume 25
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVAON
  databaseName: DOAJ Directory of Open Access Journals
  customDbUrl:
  eissn: 1338-3957
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0000461652
  issn: 1338-3957
  databaseCode: DOA
  dateStart: 20010101
  isFulltext: true
  titleUrlDefault: https://www.doaj.org/
  providerName: Directory of Open Access Journals
– providerCode: PRVPQU
  databaseName: Computer Science Database
  customDbUrl:
  eissn: 1338-3957
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0000461652
  issn: 1338-3957
  databaseCode: K7-
  dateStart: 20210101
  isFulltext: true
  titleUrlDefault: http://search.proquest.com/compscijour
  providerName: ProQuest
– providerCode: PRVPQU
  databaseName: East Europe, Central Europe Database
  customDbUrl:
  eissn: 1338-3957
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0000461652
  issn: 1338-3957
  databaseCode: BYOGL
  dateStart: 20110101
  isFulltext: true
  titleUrlDefault: https://search.proquest.com/eastcentraleurope
  providerName: ProQuest
– providerCode: PRVPQU
  databaseName: ProQuest advanced technologies & aerospace journals
  customDbUrl:
  eissn: 1338-3957
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0000461652
  issn: 1338-3957
  databaseCode: P5Z
  dateStart: 20210101
  isFulltext: true
  titleUrlDefault: https://search.proquest.com/hightechjournals
  providerName: ProQuest
– providerCode: PRVPQU
  databaseName: ProQuest Central (subscription)
  customDbUrl:
  eissn: 1338-3957
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0000461652
  issn: 1338-3957
  databaseCode: BENPR
  dateStart: 20210101
  isFulltext: true
  titleUrlDefault: https://www.proquest.com/central
  providerName: ProQuest
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV3PT9swFH6CsgMcCoyhdWNVhRA3i8RxHPs0ASriVBUEEuISOf7RIUHL0paJ_37vuSmMCe2ySw5RZFlf3q_Pz3ofwIFDZ1ZFIAHi3CNBCY5cSrLUUVvKSi29jWITxWCgbm70sDlwmzbXKpcxMQZqN7F0Rn6UYSIWVDDI748_GalGUXe1kdBYhbWUYxCmpmzBXs5YaJi4jKI7yMRyprjIFmM2uSjUkfF3aCM8Z1QWvUlLcXr_m5Kz_Ss2r50f1fPn2bJZGnPQ2eb_7n4L2k312TtemMs2rPjxR9j4YybhDuyTfC-7mCPi84def2zr5xhVesf3I1xx9uNh-gmuz_pXp-esEVJglmshWeG440i0jHeJDN7JJDMpMa80-EQntjJcOaWVxdyunQ7aBlkpESpMVcLbJNuF1ngy9p-hZ-LA-spoZYzIPTdV4VKNNAfhT5QvOnC4xLF8XMzLKJFnEOAlAl4S4PEeXQdOCOWXj2jMdXwxqUdl4zVlyJUTgmiqSUTFvVEmaCmUC8GmacBF9pZwl43vTctXrDuQ_fXfXr96d1McI5L88u9Fv8L6wmrontketGb13H-DD_Zpdjetu7B20h8ML7uR23ejOeJzmN_-BpNq5AY
linkProvider ProQuest
linkToHtml http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMw1V1Nb9QwEB2VLRJwKN9iaQsRAm5RE8dx7EOF2rJVq5ZVQUXqLTj-WCrR3ZLdpdo_xW9kxklaihC3HrhGluXkjWfmeZx5AK8tbmZZeBIgzh0SFG9pS4k4tVSWMkIJZ4LYRDEcypMTdbQEP7t_YehaZecTg6O2E0Nn5BsZBmJOCYN4d_49JtUoqq52EhqNWRy4xQVStunm_nvE9w1ju4Pjnb24VRWIDVNcxIVlliHr0M4mwjsrkkynRENS7xKVmEozaaWSBgOdssor40Ulua_Qb3NnkgznvQXLPOMi78Hy9mB49OnyVIfal4sg84PcL48l41nT2JPxQm5od4pWyfKYErFrgTDoBVxLclcuQrnculE9X8y68myIerv3_7fv9QBW2vw62mo2xENYcuNHcO-3rouP4RUJFMcf52hT87NoMDb1IvjNaOvbCN9g9vVs-gQ-38gin0JvPBm7ZxDp0JK_0kpqzXPHdFXYVCGRY8iOpSv68LbDrTxvOoKUyKQI4BIBLgngcFOwD9uE6uUgauQdHkzqUdn6hdLn0nJORFwnvGJOS-2V4NJ6b9LU4yRrHbxl612m5RW2fcj-sJOrUX9dFEOfK57_e9KXcGfv-MNhebg_PFiFu43F0q26NejN6rlbh9vmx-x0Wr9ozT-CLzdtQb8Ajoc-yg
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Post-Quantum+Encryption+Algorithms&rft.jtitle=Acta+electrotechnica+et+informatica&rft.au=Pekar%C4%8D%C3%ADk%2C+Peter&rft.au=Chovancov%C3%A1%2C+Eva&rft.date=2025-09-01&rft.issn=1338-3957&rft.eissn=1338-3957&rft.volume=25&rft.issue=3&rft.spage=16&rft.epage=24&rft_id=info:doi/10.2478%2Faei-2025-0011&rft.externalDBID=n%2Fa&rft.externalDocID=10_2478_aei_2025_0011
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1338-3957&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1338-3957&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1338-3957&client=summon