Selection of Post-Quantum Cryptography Algorithms for Standardization and Assessment of Their Security
https://doi.org/10.35596/1729-7648-2025-23-6-65-70
Abstract
The process of selecting post-quantum cryptography algorithms for standardization based on parameters proposed by the National Institute of Standards and Technology (NIST) is described. The resistance of post-quantum cryptography algorithms to attacks by classical and quantum computers is assessed, taking into account their specific features. The different numbers of operations for attacks by quantum and classical computers are substantiated. The parallelization potential of post-quantum cryptography algorithms is analyzed. It is noted that, despite the proposed use of quantum computers, the primary goal of cryptography is the application of algorithms based on problems that are not reducible to problems of P-class complexity.
About the Authors
S. Yu. MikhnevichBelarus
Mikhnevich Svetlana Yurievna, Cand. Sci. (Phys. and Math.), Associate Professor, Head of the Department of Infocommunication Technologies; Associate Professor at the Department of Information Radiotechlogies
220076, Minsk, F. Skoryna St., 8/2
Tel.: +375 44 701-15-67
P. I. Hladun
Belarus
Lecturer at the Department of Infocommunication Technologies
220076, Minsk, F. Skoryna St., 8/2
Tel.: +375 44 701-15-67
References
1. Duc-Thuan Dam, Thai-Ha Tran, Van-Phuc Hoang (2023) A Survey of Post-Quantum Cryptography: Start of a New Race. Cryptography. (7). https://doi.org/10.3390/ryptography7030040.
2. Niederhagen R., Waidner M. (2017) Practical Post–Quantum Cryptography. Darmstadt, Fraunhofer Institute for Secure Information Technology.
3. Google Announces New Algorithm That Makes FIDO Encryption Safe From Quantum Computers. Аrs Technica. Available: https://arstechnica.com/security/2023/08/passkeys-are-great-but-not-safe-from-quantum-computersdilithium-could-change-that/ (Аccessed 20 March 2025).
4. Yashchenko V. V. (1998) Basic Concepts of Cryptography. Mathematical Education. 3 (2), 53–70 (in Russian).
5. Grassl M., Langenberg B., Roetteler M., Steinwandt R. (2025) Applying Grover’s Algorithm to AES: Quantum Resource Estimates. arXiv:1512.04965v1. Available: https://doi.org/10.48550/arXiv.1512.04965 (Аccessed 20 March 2025).
Review
For citations:
Mikhnevich S.Yu., Hladun P.I. Selection of Post-Quantum Cryptography Algorithms for Standardization and Assessment of Their Security. Doklady BGUIR. 2025;23(6):65-70. (In Russ.) https://doi.org/10.35596/1729-7648-2025-23-6-65-70























