Post-Quantum Cryptography Preparing for the Quantum Threat to Digital Security

Post-Quantum Cryptography Preparing for the Quantum Threat to Digital Security

Authors

  • Olatunji Olusola Ogundipe

Keywords:

Post-quantum cryptography, ML-KEM (Kyber), ML-DSA (Dilithium), SLH-DSA (SPHINCS+), CNSA 2.0, quantum threat, crypto agility, hybrid key exchange, TLS; code signing

Abstract

The impressively fast development of quantum computing is a serious threat to classical public-key cryptography, and algorithms such as Shor's and Grover's will render RSA and elliptic curve systems essentially useless as soon as a cryptanalytically relevant quantum computer becomes available. Although it is still some way off before such machines are available, the harvest-now-encrypt-later threat highlights the need for proactive defense. In response, the National Institute of Standards and Technology (NIST) published the first post-quantum cryptography standards in 2024, including ML-KEM (Kyber) for key establishment, ML-DSA (Dilithium) for digital signatures and SLH-DSA (SPHINCS+) as a stateless hash-based alternative. This paper is a summary of the evolving post-quantum landscape, starting with the standards and their underlying security and then moving on to migration policies such as CNSA 2.0 and CISA, NSA and NIST guidance. It also looks at integration patterns for important protocols such as TLS, IPsec, SSH, and code signing. A performance, interoperability and overhead evaluation methodology is presented with results showing that hybrid deployment and crypto-agile architectures make PQC adoption a viable option. The paper concludes by providing a governance-oriented roadmap, where inventory, prioritization and pilot deployments are identified as near-term actions, with open questions remaining on performance optimization, implementation security and algorithm resilience over time.

Downloads

Published

2024-09-30

Similar Articles

1-10 of 16

You may also start an advanced similarity search for this article.