Cyber Security and Applications (Jan 2024)
Quantum vs post‐quantum security for future networks: Survey
Abstract
Classical cryptography (crypt) schemes (sche) have been compromised by the practical results on quantum (q) computers in recent years. Nowadays these sche ‘s can be compromised by using the Shor's methodology. This paper provides a detailed survey of the work on so called post‐ q crypt (PQC) sche ‘s, which are based on different principles, minimizing the threats coming from advances of q- computers. Even so, post- q- sche ‘s do not completely solve the problem (prblm) but rather represent (rprs) a temporary solution. On the other hand, q- crypt (QC) and q- key distribution (distr) (QKD), discussed in this paper, offer the ultimate solution: by relying on entanglement (Egle) between q- states (Stat’s). At least in the beginning, a competition is anticipated between the two approaches to security (S) sche ‘s, so the paper provides comprehensive survey of both QC and PQC algorithms (Algrt’s), enabling full understanding of pros and cons when choosing implementation (Jmpl) options in future networks (net’s).To further encourage the net designers to consider q- solutions for future net ‘s, the paper presents original, fundamental research work on LEO satellite net optimization (Optmz) Algrt ‘s for global QKD. The solutions using exclusively LEO orbits instead the combinations of LEO and GEO orbits, considered so far, enable up to two orders of magnitude power savings which is of importance when it comes to Jmpl of the net using power constrained terminals. The Algrt ‘s are designed for using q- Search Algrt ‘s (QSA), like Grover Algrt, and q- Approximate (aprx) Optmz -Algrt ‘s (QAOA), especially powerful for solving combinatorial Optmz -prblm ‘s. Index Terms: PQC, QC, QKD.
Keywords