Securing the Future: A Comprehensive Review of Post-Quantum Cryptography in the Modern Threat Landscape
Main Article Content
Abstract
The accelerating development of quantum computing represents one of the most significant paradigm shifts in the history of information security. Cryptographic systems that currently underpin global digital infrastructure—including RSA, Diffie–Hellman, and Elliptic Curve Cryptography—rely on mathematical assumptions that collapse under quantum algorithms such as Shor’s and Grover’s. Post-Quantum Cryptography (PQC) emerges as the most viable and immediate solution to secure communications in the quantum era, offering cryptographic primitives that can be deployed on today’s classical hardware while resisting both classical and quantum attacks. This review provides a comprehensive, detailed examination of PQC, analyzing its mathematical foundations, algorithmic families, standardization progress, and deployment challenges. Special emphasis is placed on the NIST PQC standardization process, the risk posed by “harvest-now-decrypt-later” adversaries, the complexities of global cryptographic migration, and the implications for critical digital infrastructures such as cloud computing, blockchain systems, long-lifespan data archives, IoT ecosystems, and national cybersecurity. Through standalone equations, tables, and figures—including a conceptual visual provided by the user—this paper offers a complete, cohesive, and rigorous synthesis. The findings underscore that the transition to PQC is not optional but imperative, requiring coordinated scientific, governmental, and industrial effort to safeguard the digital future.
Article Details
Issue
Section

This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
How to Cite
References
S. A. Islam, M. Mohankumar, and U. Khatuna Jannat, “Enhancing Data Security in Mobile Traffic Networks Through Reverse Engineering,” in Proceedings of the 4th International Conference on Ubiquitous Computing and Intelligent Information Systems, ICUIS 2024, 2024. doi: 10.1109/ICUIS64676.2024.10866267. DOI: https://doi.org/10.1109/ICUIS64676.2024.10866267
X. Ye, T. G. Tan, and J. Zhou, “Towards Discovering Quantum-Threats for Applications Using Open-Source Libraries,” in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2024. doi: 10.1007/978-3-031-61486-6_17. DOI: https://doi.org/10.1007/978-3-031-61486-6_17
V. A. Telsang, M. S. Kakkasageri, and A. D. Devangavi, “BLOCKCHAIN-BASED DEVICE AUTHENTICATION IN EDGE COMPUTING USING QUANTUM APPROACH,” Jordanian Journal of Computers and Information Technology, vol. 11, no. 1, 2025, doi: 10.5455/jjcit.71-1724681080. DOI: https://doi.org/10.5455/jjcit.71-1724681080
S. M. Almufti et al., “INTELLIGENT HOME IOT DEVICES: AN EXPLORATION OF MACHINE LEARNING-BASED NETWORKED TRAFFIC INVESTIGATION,” Jurnal Ilmiah Ilmu Terapan Universitas Jambi, vol. 8, no. 1, pp. 1–10, May 2024, doi: 10.22437/jiituj.v8i1.32767. DOI: https://doi.org/10.22437/jiituj.v8i1.32767
P. Shah, P. Prajapati, R. Patel, and D. Patel, “Post Quantum Cryptography: A Gentle Introduction of Lattice-Based Cryptography (Kyber, NTRUCrypto),” in Lecture Notes in Networks and Systems, 2025. doi: 10.1007/978-981-97-8602-2_43. DOI: https://doi.org/10.1007/978-981-97-8602-2_43
S. Ali and F. Anwer, “A secure framework for IoT-based medical sensors data using homomorphic elliptic curve cryptography,” Cluster Comput, vol. 28, no. 14, 2025, doi: 10.1007/s10586-025-05537-0. DOI: https://doi.org/10.1007/s10586-025-05537-0
S. M. Almufti and S. R. M. Zeebaree, “Leveraging Distributed Systems for Fault-Tolerant Cloud Computing: A Review of Strategies and Frameworks,” Academic Journal of Nawroz University, vol. 13, no. 2, pp. 9–29, May 2024, doi: 10.25007/ajnu.v13n2a2012. DOI: https://doi.org/10.25007/ajnu.v13n2a2012
D. A. Majeed et al., “DATA ANALYSIS AND MACHINE LEARNING APPLICATIONS IN ENVIRONMENTAL MANAGEMENT,” Jurnal Ilmiah Ilmu Terapan Universitas Jambi, vol. 8, no. 2, pp. 398–408, Sep. 2024, doi: 10.22437/jiituj.v8i2.32769. DOI: https://doi.org/10.22437/jiituj.v8i2.32769
P. Shah, P. Prajapati, and D. Patel, “Lattice-Based Post Quantum Cryptography Using Variations of Learning with Error (LWE),” in Communications in Computer and Information Science, 2025. doi: 10.1007/978-3-031-88039-1_5. DOI: https://doi.org/10.1007/978-3-031-88039-1_5
S. M. Almufti, B. Wasfi Salim, and R. Rajab Asaad, “Automatic Verification for Handwritten Based on GLCM Properties and Seven Moments,” Academic Journal of Nawroz University, vol. 12, no. 1, pp. 130–136, Feb. 2023, doi: 10.25007/ajnu.v12n1a1651. DOI: https://doi.org/10.25007/ajnu.v12n1a1651
Ç. Sıcakyüz, R. Rajab Asaad, S. Almufti, and N. R. Rustamova, “Adaptive Deep Learning Architectures for Real-Time Data Streams in Edge Computing Environments,” Qubahan Techno Journal, vol. 3, no. 2, pp. 1–14, Jun. 2024, doi: 10.48161/qtj.v3n2a25. DOI: https://doi.org/10.48161/qtj.v3n2a25
M. Elhajj and P. Mulder, “A Comparative Analysis of the Computation Cost and Energy Consumption of Relevant Curves of ECC Presented in Literature,” International Journal of Electrical and Computer Engineering Research, vol. 3, no. 1, 2023, doi: 10.53375/ijecer.2023.318. DOI: https://doi.org/10.53375/ijecer.2023.318
E. Zeydan, Y. Turk, B. Aksoy, and S. B. Ozturk, “Recent Advances in Post-Quantum Cryptography for Networks: A Survey,” in Proceedings of the 2022 7th International Conference on Mobile and Secure Services, MobiSecServ 2022, 2022. doi: 10.1109/MobiSecServ50855.2022.9727214. DOI: https://doi.org/10.1109/MobiSecServ50855.2022.9727214
B. B. Gupta, D. Kalra, and A. Almomani, Innovations in modern cryptography. 2024. doi: 10.4018/979-8-3693-5330-1. DOI: https://doi.org/10.4018/979-8-3693-5330-1
F. Mensah, “Zero Trust Architecture: A Comprehensive Review of Principles, Implementation Strategies, and Future Directions in Enterprise Cybersecurity,” International Journal of Advance Research, 2024.
Prof. S. Joshi, “Cryptography and Cybersecurity: A Symbiotic Relationship,” Int J Res Appl Sci Eng Technol, vol. 13, no. 5, 2025, doi: 10.22214/ijraset.2025.70789. DOI: https://doi.org/10.22214/ijraset.2025.70789
Subhash Bondhala, “Cybersecurity in AI-Driven Data Centers: Reinventing Threat Detection,” International Journal of Advanced Research in Science, Communication and Technology, 2025, doi: 10.48175/ijarsct-24464. DOI: https://doi.org/10.48175/IJARSCT-24464
M. Singirikonda, “Next-Generation Cryptography: Innovations and Challenges in Securing Digital Communication,” J Cybersecur, vol. 1, no. 6, 2023.
R. Wahlang and K. Chandrasekaran, “Dimensionality reduction using neural networks for lattice-based cryptographic keys,” International Journal of Computers and Applications, vol. 46, no. 10, 2024, doi: 10.1080/1206212X.2024.2396328. DOI: https://doi.org/10.1080/1206212X.2024.2396328
S. Hoque, A. Aydeger, and E. Zeydan, “Exploring Post Quantum Cryptography with Quantum Key Distribution for Sustainable Mobile Network Architecture Design,” in PECS 2024 - Proceedings of the 2024 Workshop on Performance and Energy Efficiency in Concurrent and Distributed Systems, Part of: HPDC 2024 - 33rd International Symposium on High-Performance Parallel and Distributed Computing, 2024. doi: 10.1145/3659997.3660033. DOI: https://doi.org/10.1145/3659997.3660033
G. Seiler, “Quantum Computing and the Future of Encryption,” Scholarly Review Journal, vol. SR Online: Showcase, no. Winter 2024/2025, 2024, doi: 10.70121/001c.127168. DOI: https://doi.org/10.70121/001c.127168
H. A. Sharath, J. Vrindavanam, S. Dana, and S. N. Prasad, “Quantum-Resilient Cryptography: A Survey on Classical and Quantum Algorithms,” IEEE Access, vol. 13, 2025, doi: 10.1109/ACCESS.2025.3612982. DOI: https://doi.org/10.1109/ACCESS.2025.3612982
A. Astarloa, J. Lázaro, and J. I. Gárate, “CRYSTALS-Dilithium post-quantum cyber-secure SoC for wired communications in critical systems,” Internet of Things (The Netherlands), vol. 33, 2025, doi: 10.1016/j.iot.2025.101656. DOI: https://doi.org/10.1016/j.iot.2025.101656
A. Shaheen, “Cybersecurity in the Modern Era: An Overview of Recent Trends,” Journal of Engineering and Computational Intelligence Review, vol. 1, no. 1, 2023.
M. Meenakshi, “Quantum-Resilient Blockchain: Securing Digital Transactions in a Post-Quantum World,” International Journal of Research Advancements and Future Innovations (IJRAFI), vol. 1, no. 1, 2025.
N. Rustamova, R. Rajab Asaad, and D. Fayzieva, “Blockchain-Driven Security Models for Privacy Preservation in IoT-Based Smart Cities,” Qubahan Techno Journal, pp. 1–17, Dec. 2023, doi: 10.48161/qtj.v2n4a22. DOI: https://doi.org/10.48161/qtj.v2n4a22
T. Thirugnanam et al., “PIRAP: Medical Cancer Rehabilitation Healthcare Center Data Maintenance Based on IoT-Based Deep Federated Collaborative Learning,” Int J Coop Inf Syst, Jun. 2023, doi: 10.1142/S0218843023500053. DOI: https://doi.org/10.1142/S0218843023500053
V. Hassija et al., “Interpreting Black-Box Models: A Review on Explainable Artificial Intelligence,” Cognit Comput, vol. 16, no. 1, pp. 45–74, Jan. 2024, doi: 10.1007/s12559-023-10179-8. DOI: https://doi.org/10.1007/s12559-023-10179-8
M. M. Ahmed, S. Letchmunan, and A. S. Baharudin, “Service network security management (SNSM) framework, a solution to SOSE security challenge,” in Proceedings - 6th IEEE International Conference on Control System, Computing and Engineering, ICCSCE 2016, 2017. doi: 10.1109/ICCSCE.2016.7893576. DOI: https://doi.org/10.1109/ICCSCE.2016.7893576
A. Mohtasebi, Z. Ismail, and B. Shanmugam, “Analysis of applying enterprise service bus architecture as a cloud interoperability and resource sharing platform,” in Advances in Intelligent Systems and Computing, 2013. doi: 10.1007/978-3-642-30867-3_52. DOI: https://doi.org/10.1007/978-3-642-30867-3_52
H. Singh, R. Mallaiah, G. Yadav, N. Verma, A. Sawhney, and S. K. Brahmachari, “iCHRCloud: Web & Mobile based Child Health Imprints for Smart Healthcare,” J Med Syst, vol. 42, no. 1, 2018, doi: 10.1007/s10916-017-0866-5. DOI: https://doi.org/10.1007/s10916-017-0866-5
T. saad Mohamed, S. mohammed Khalifah, R. Marqas, S. M. Almufti, and R. R. Asaad, “Evaluation of Information Security through Networks traffic traces for machine learning classification,” Babylonian Journal of Networking, vol. 2025, 2025, doi: 10.58496/bjn/2025/003. DOI: https://doi.org/10.58496/BJN/2025/003
D. Ghorbanzadeh, J. F. Espinosa-Cristia, N. S. G. Abdelrasheed, S. S. S. Mostafa, S. Askar, and S. M. Almufti, “Role of innovative behaviour as a missing linchpin in artificial intelligence adoption to enhancing job security and job performance,” Syst Res Behav Sci, 2024, doi: 10.1002/sres.3076. DOI: https://doi.org/10.1002/sres.3076