Information is divided into two types: classical and quantum. Quantum computing, quantum cryptography, and quantum teleportation are just a few of the miracles they can do when working together. Some of the uses range from assisting in the prevention of spies reading private messages to assisting in the prevention of spies reading private communications. Quantum purification and quantum error correction are examples of techniques that will make their implementation easier. Although some of these concepts are still beyond present technological capabilities, quantum cryptography has been established. The possibilities for small-scale quantum computer device prototypes by the end of the millennium are promising. This paper is focusing on addressing the depended approaches which deal with implementation cryptography based on quantumcomputing. Remembering that cryptography is a method of encryption that uses the naturally occurring propertiesof quantum mechanics to secure and transmit data in a way that cannot be hacked. Cryptography is the process ofencrypting and protecting data so that only the person who has the right secret key can decrypt it. For decades now, quantum computing has been hailed as one of the next big revolutions. Quantum computing is not just fasterthan traditional computing methods, but a fundamentally different approach to solve seemingly intractable problems. The mathematical operations that most traditional cryptographic algorithms rely on could be cracked with a sufficiently strong quantum computer. This paper aims to explain how quantum computing affects currentcryptography and expose readers to fundamental post-quantum methods. Quantum computing’s influence on IT professionals is becoming increasingly important. As a result, we provide a straightforward introduction to post-quantum cryptography, including quantum-resistant algorithms and quantum key distribution.

1.
Z.
Ageed
,
M. R.
Mahmood
,
M.
Sadeeq
,
M. B.
Abdulrazzaq
, and
H.
Dino
, "
Cloud computing resources impacts on heavy-load parallel processing approaches
,"
IOSR Journal of Computer Engineering (IOSR-JCE)
, vol.
22
, pp.
30
41
,
2020
.
2.
J. F.
Fitzsimons
, "
Private quantum computation: an introduction to blind quantum computing and related protocols
,"
npj Quantum Information
, vol.
3
, pp.
1
11
,
2017
.
3.
E.
Kashefi
and
A.
Pappa
, "
Multiparty delegated quantum computing
,"
Cryptography
, vol.
1
, p.
12
,
2017
.
4.
T.
Lange
and
R.
Steinwandt
,
Post-Quantum Cryptography: 9th International Conference, PQCrypto 2018, FortLauderdale, FL, USA, April 9-11, 2018, Proceedings
vol.
10786
:
Springer
,
2018
.
5.
D. J.
Bernstein
,
N.
Heninger
,
P.
Lou
, and
L.
Valenta
, "
Post-quantum RSA
," in
International Workshop on Post-Quantum Cryptography
,
2017
, pp.
311
329
.
6.
A.
Huang
,
S.
Barz
,
E.
Andersson
, and
V.
Makarov
, "
Implementation vulnerabilities in general quantum cryptography
,"
New Journal of Physics
, vol.
20
, p.
103016
,
2018
.
7.
V.
Hassija
,
V.
Chamola
,
V.
Saxena
,
V.
Chanana
,
P.
Parashari
,
S.
Mumtaz
, et al, "
Present landscape of quantum computing
,"
IET Quantum Communication
, vol.
1
, pp.
42
48
,
2020
.
8.
S. S.
Gill
,
A.
Kumar
,
H.
Singh
,
M.
Singh
,
K.
Kaur
,
M.
Usman
, et al, "
Quantum computing: A taxonomy, systematic review and future directions
,"
arXiv preprint
arXiv:2010.15559,
2020
.
9.
B. M.
Boghosian
and
W.
Taylor
IV
, "
Simulating quantum mechanics on a quantum computer
,"
Physica D: Nonlinear Phenomena
, vol.
120
, pp.
30
42
,
1998
.
10.
K.
Bertels
,
A.
Sarkar
,
T.
Hubregtsen
,
M.
Serrao
,
A. A.
Mouedenne
,
A.
Yadav
, et al, "
Quantum computer architecture: Towards full-stack quantum accelerators
," in
2020 Design, Automation & Test in Europe Conference & Exhibition (DATE)
,
2020
, pp.
1
6
.
11.
R.
Feynman
, "
Simulating Physics with Computers, 1982, reprinted in: Feynman and Computation
," ed:
Perseus Books
,
1999
.
12.
U.
Alvarez-Rodriguez
,
M.
Sanz
,
L.
Lamata
, and
E.
Solano
, "
Quantum artificial life in an IBM quantum computer
,"
Scientific reports
, vol.
8
, pp.
1
9
,
2018
.
13.
V.
Mavroeidis
,
K.
Vishi
,
M. D.
Zych
, and
A.
Jøsang
, "
The impact of quantum computing on present cryptography
,"
arXiv preprint
arXiv:1804.00200,
2018
.
14.
L.
Chen
,
L.
Chen
,
S.
Jordan
,
Y.-K.
Liu
,
D.
Moody
,
R.
Peralta
, et al,
Report on post-quantum cryptography
vol.
12
:
USDepartment of Commerce, National Institute of Standards and Technology
,
2016
.
15.
A.
Nanda
,
D.
Puthal
,
S. P.
Mohanty
, and
U.
Choppali
, "
A Computing Perspective of Quantum Cryptography [Energy and Security]
,"
IEEE Consumer Electronics Magazine
, vol.
7
, pp.
57
59
,
2018
.
16.
K.
Nagata
,
T.
Nakamura
, and
A.
Farouk
, "Quantum Cryptography, Quantum Communication, and Quantum Computingin a Noisy Environment," in
Quantum Computing: An Environment for Intelligent Large Scale Real Application
, ed:
Springer
,
2018
, pp.
185
205
.
17.
M.
Roetteler
and
K. M.
Svore
, "
Quantum computing: Codebreaking and beyond
,"
IEEE Security & Privacy
, vol.
16
, pp.
22
36
,
2018
.
18.
M.
Mosca
, "
Cybersecurity in an era with quantum computers: Will we be ready?
,"
IEEE Security & Privacy
, vol.
16
, pp.
38
41
,
2018
.
K.
Petrenko
,
A.
Mashatan
, and
F.
Shirazi
, "
Assessing the quantum-resistant cryptographic agility of routing and switching IT network infrastructure in a large-size financial organization
,"
Journal of Information Security and Applications
, vol.
46
, pp.
151
163
,
2019
.
19.
W.
Barker
,
W.
Polk
, and
M.
Souppaya
, "
Getting Ready for Post-Quantum Cryptography: Explore Challenges Associatedwith Adoption and Use of Post-Quantum Cryptographic Algorithms
,"
the publications of NIST Cyber Security White Paper (DRAFT), CSRC. NIST. GOV
, vol.
26
,
2020
.
20.
C.
Cheng
,
R.
Lu
,
A.
Petzoldt
, and
T.
Takagi
, "
Securing the Internet of Things in a quantum world
,"
IEEE Communications Magazine
, vol.
55
, pp.
116
120
,
2017
.
21.
A.
Steane
, "
Quantum computing
,"
Reports on Progress in Physics
, vol.
61
, p.
117
,
1998
.
22.
E. Y.-Z.
Tan
,
R.
Schwonnek
,
K. T.
Goh
,
I. W.
Primaatmaja
, and
C. C.-W.
Lim
, "
Computing secure key rates for quantum cryptography with untrusted devices
,"
npj Quantum Information
, vol.
7
, pp.
1
6
,
2021
.
23.
L.-J.
Wang
,
K.-Y.
Zhang
,
J.-Y.
Wang
,
J.
Cheng
,
Y.-H.
Yang
,
S.-B.
Tang
, et al, "
Experimental authentication of quantumkey distribution with post-quantum cryptography
,"
npj Quantum Information
, vol.
7
, pp.
1
7
,
2021
.
24.
V. Anusuya
Devi
and
V.
Kalaivani
, "
Enhanced BB84 quantum cryptography protocol for secure communication in wireless body sensor networks for medical applications
,"
Personal and Ubiquitous Computing
, p.
1
,
2021
.
25.
J.
Howe
,
T.
Prest
, and
D.
Apon
, "
SoK: How (not) to Design and Implement Post-Quantum Cryptography
,"
IACR Cryptol.ePrint Arch.
, vol.
2021
, p.
462
,
2021
.
26.
K.
Xagawa
,
A.
Ito
,
R.
Ueno
,
J.
Takahashi
, and
N.
Homma
, "
Fault-injection attacks against NIST's post-quantum cryptography round 3 KEM candidates
," in
International Conference on the Theory and Application of Cryptology andInformation Security
,
2021
, pp.
33
61
.
27.
A.
Weber
,
O.
Nikiforov
,
A.
Sauer
,
J.
Schickel
,
G.
Alber
,
H.
Mantel
, et al, "
Cache-Side-Channel Quantification and Mitigation for Quantum Cryptography
," in
European Symposium on Research in Computer Security
,
2021
, pp.
235
256
.
28.
S.
Paul
,
F.
Schick
, and
J.
Seedorf
, "
TPM-Based Post-Quantum Cryptography: A Case Study on Quantum-Resistant andMutually Authenticated TLS for IoT Environments
," in
The 16th International Conference on Availability, Reliability and Security
,
2021
, pp.
1
10
.
29.
A.
Cohen
,
R. G.
D'Oliveira
,
S.
Salamatian
, and
M.
Médard
, "
Network Coding-Based Post-Quantum Cryptography
,"
IEEE Journal on Selected Areas in Information Theory
, vol.
2
, pp.
49
64
,
2021
.
30.
S.
Abidin
,
A.
Swami
,
E.
Ramirez-Asís
,
J.
Alvarado-Tolentino
,
R. K.
Maurya
, and
N.
Hussain
, "
Quantum cryptographytechnique: A way to improve security challenges in mobile cloud computing (MCC
),"
Materials Today: Proceedings
,
2021
.
31.
M.
Bisheh-Niasar
,
R.
Azarderakhsh
, and
M.
Mozaffari-Kermani
, "
High-Speed NTT-based Polynomial Multiplication Accelerator for CRYSTALS-Kyber Post-Quantum Cryptography
,"
Cryptol. ePrint Arch., Tech. Rep
, vol.
563
, p.
2021
,
2021
.
32.
P.
Papanastasiou
and
S.
Pirandola
, "
Continuous-variable quantum cryptography with discrete alphabets: Composable security under collective gaussian attacks
,"
Physical Review Research
, vol.
3
, p.
013047
,
2021
.
33.
P.
Nannipieri
,
S.
Di Matteo
,
L.
Zulberti
,
F.
Albicocchi
,
S.
Saponara
, and
L.
Fanucci
, "
A RISC-V Post Quantum Cryptography Instruction Set Extension for Number Theoretic Transform to Speed-Up CRYSTALS Algorithms
,"
IEEEAccess
, vol.
9
, pp.
150798
150808
,
2021
.
34.
T.
Fritzmann
,
M.
Van Beirendonck
,
D. B.
Roy
,
P.
Karl
,
T.
Schamberger
,
I.
Verbauwhede
, et al, "
Masked Accelerators and Instruction Set Extensions for Post-Quantum Cryptography
,"
IACR Cryptol. ePrint Arch.
, vol.
2021
, p.
479
,
2021
.
35.
L.
Malina
,
P.
Dzurenda
,
S.
Ricci
,
J.
Hajny
,
G.
Srivastava
,
R.
Matulevičius
, et al, "
Post-Quantum Era Privacy Protection for Intelligent Infrastructures
,"
IEEE Access
, vol.
9
, pp.
36038
36077
,
2021
.
36.
Z.
Lin
and
G.
Chen
, "
Implementation of the NewHope Protocol for Post-Quantum Cryptography
," in
Journal of Physics:Conference Series
,
2021
, p.
042108
.
This content is only available via PDF.
You do not currently have access to this content.