ISSN : 2349-3917
Statement of the Problem: Nearby future holds the unfolding of quantum computers, making classical computers obsolete. To highlight this breakthrough, a classical computer takes around 300 trillion years to break RSA-2048-bit encryption, whereas quantum computers will require just 8 hours (Ekera M. & Gidney C., 2019), as per ongoing advancements in quantum computing. Preparing for such shift, researchers within cyber security domain have been working on post-quantum cryptographic techniques that could resist classical and quantum attacks. This new focused research on Post-Quantum Cryptography (PQC) has gained widespread recognition. The purpose of this study is to identify future cryptographic techniques for standardization process in quantum-crypto world. Methodology & Theoretical Orientation: The National Institute of Standards and Technology (NIST) has been regulating a project to assess quantum cryptographic algorithms for quantum-future standardization. Alongside, companies such as Google and Microsoft have already started experimenting with PQC’s deployment. At this moment, Isogeny-based cryptography has established itself as a promising PQC scheme candidate, that has small signature and key sizes amongst all. Findings: Best known protocol backing this isogeny-based quantum secure approach is Supersingular Isogeny Diffie-Hellman (SIDH) key exchange protocol. The quantum secure scheme is based on presumed difficulties in finding isogenies between super singular elliptical curves. Although considered as the most promising scheme, SIDH algorithm reveals additional information, that holds potential to be exploited and SIDH be broken in polynomial time by quantum computers. Conclusion & Significance: Due to current technological limitations, the above-mentioned findings are theoretical and couldn’t be confirmed in practice. Rise of quantum computing will result into present cryptographic techniques being broken, thus exposing the security of our digitized world to malicious actors around the globe. It is imperative to identify and establish post-quantum cryptographic techniques for standardization process that could hold down attacks from advanced computers, aka quantum computers.