Preview

Doklady BGUIR

Advanced search

Selection of Post-Quantum Cryptography Algorithms for Standardization and Assessment of Their Security

https://doi.org/10.35596/1729-7648-2025-23-6-65-70

Abstract

The process of selecting post-quantum cryptography algorithms for standardization based on parameters proposed by the National Institute of Standards and Technology (NIST) is described. The resistance of post-quantum cryptography algorithms to attacks by classical and quantum computers is assessed, taking into account their specific features. The different numbers of operations for attacks by quantum and classical computers are substantiated. The parallelization potential of post-quantum cryptography algorithms is analyzed. It is noted that, despite the proposed use of quantum computers, the primary goal of cryptography is the application of algorithms based on problems that are not reducible to problems of P-class complexity.

About the Authors

S. Yu. Mikhnevich
Belarusian State Academy of Communications; Belarusian State University of Informatics and Radioelectronics
Belarus

Mikhnevich Svetlana Yurievna, Cand. Sci. (Phys. and Math.), Associate Professor, Head of the Department of Infocommunication Technologies; Associate Professor at the Department of Information Radiotechlogies

220076, Minsk, F. Skoryna St., 8/2

Tel.: +375 44 701-15-67



P. I. Hladun
Belarusian State Academy of Communications
Belarus

Lecturer at the Department of Infocommunication Technologies

220076, Minsk, F. Skoryna St., 8/2

Tel.: +375 44 701-15-67



References

1. Duc-Thuan Dam, Thai-Ha Tran, Van-Phuc Hoang (2023) A Survey of Post-Quantum Cryptography: Start of a New Race. Cryptography. (7). https://doi.org/10.3390/ryptography7030040.

2. Niederhagen R., Waidner M. (2017) Practical Post–Quantum Cryptography. Darmstadt, Fraunhofer Institute for Secure Information Technology.

3. Google Announces New Algorithm That Makes FIDO Encryption Safe From Quantum Computers. Аrs Technica. Available: https://arstechnica.com/security/2023/08/passkeys-are-great-but-not-safe-from-quantum-computersdilithium-could-change-that/ (Аccessed 20 March 2025).

4. Yashchenko V. V. (1998) Basic Concepts of Cryptography. Mathematical Education. 3 (2), 53–70 (in Russian).

5. Grassl M., Langenberg B., Roetteler M., Steinwandt R. (2025) Applying Grover’s Algorithm to AES: Quantum Resource Estimates. arXiv:1512.04965v1. Available: https://doi.org/10.48550/arXiv.1512.04965 (Аccessed 20 March 2025).


Review

For citations:


Mikhnevich S.Yu., Hladun P.I. Selection of Post-Quantum Cryptography Algorithms for Standardization and Assessment of Their Security. Doklady BGUIR. 2025;23(6):65-70. (In Russ.) https://doi.org/10.35596/1729-7648-2025-23-6-65-70

Views: 25


Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 License.


ISSN 1729-7648 (Print)
ISSN 2708-0382 (Online)