Securing the Quantum Era: A Comprehensive Review of Post-Quantum Cryptography, Threat Models, Algorithmic Foundations, and Standardization Pathways

Main Article Content

Sarthak Sengupta
Anindya Bose

Abstract

The advent of fault-tolerant quantum computing precipitates a foundational threat to the security of global digital infrastructure by rendering obsolete the mathematical assumptions underlying classical public-key cryptography. Widely deployed algorithms, including RSA, ECDSA, and Diffie-Hellman, which rely on the computational intractability of integer factorization and discrete logarithm problems, are vulnerable to polynomial-time attacks via Shor's algorithm. Concurrently, Grover's algorithm imposes a quadratic reduction in the security strength of symmetric primitives. In response, Post-Quantum Cryptography (PQC) has emerged as a critical field of research, dedicated to developing cryptographic systems secure against both classical and quantum attacks, while remaining deployable on existing classical hardware. This paper presents a comprehensive and in-depth examination of PQC, analyzing the five principal families: lattice-based, code-based, multivariate, hash-based, and isogeny-based cryptography. Each family is scrutinized through rigorous mathematical exposition, conceptual analysis, comparative performance evaluations, and contemporary security assessments. The study situates PQC within the evolving global threat landscape, provides a detailed analysis of the National Institute of Standards and Technology (NIST) PQC standardization process, and addresses critical implementation challenges such as constrained environments, migration strategies, hybrid cryptographic modes, and the imperative for cryptographic agility. The paper concludes by delineating essential future research directions vital for constructing a robust, quantum-resilient global cryptographic infrastructure.

Article Details

Section

Articles

How to Cite

Sengupta, S., & Anindya Bose. (2025). Securing the Quantum Era: A Comprehensive Review of Post-Quantum Cryptography, Threat Models, Algorithmic Foundations, and Standardization Pathways. Qubahan Techno Journal, 4(3), 1-10. https://doi.org/10.48161/qtj.v4n3a59

References

R. B. Marqas, S. M. Almufti, and R. Rebar Ihsan, “Comparing Symmetric and Asymmetric cryptography in message encryption and decryption by using AES and RSA algorithms,” Journal of Xi’an University of Architecture & Technology, 2020.

T. saad Mohamed, S. mohammed Khalifah, R. Marqas, S. M. Almufti, and R. R. Asaad, “Evaluation of Information Security through Networks traffic traces for machine learning classification,” Babylonian Journal of Networking, vol. 2025, 2025, doi: 10.58496/bjn/2025/003. DOI: https://doi.org/10.58496/BJN/2025/003

R. Asaad, R. Ismail Ali, and S. Almufti, “Hybrid Big Data Analytics: Integrating Structured and Unstructured Data for Predictive Intelligence,” Qubahan Techno Journal, vol. 1, no. 2, Apr. 2022, doi: 10.48161/qtj.v1n2a14. DOI: https://doi.org/10.48161/qtj.v1n2a14

K. Rustamov, “5G-Enabled Internet of Things: Latency Optimization through AI-Assisted Network Slicing,” Qubahan Techno Journal, vol. 2, no. 1, pp. 1–10, Feb. 2023, doi: 10.48161/qtj.v2n1a18. DOI: https://doi.org/10.48161/qtj.v2n1a18

D. Ghorbanzadeh, J. F. Espinosa-Cristia, N. S. G. Abdelrasheed, S. S. S. Mostafa, S. Askar, and S. M. Almufti, “Role of innovative behaviour as a missing linchpin in artificial intelligence adoption to enhancing job security and job performance,” Syst Res Behav Sci, 2024, doi: 10.1002/sres.3076. DOI: https://doi.org/10.1002/sres.3076

S. A. Islam, M. Mohankumar, and U. Khatuna Jannat, “Enhancing Data Security in Mobile Traffic Networks Through Reverse Engineering,” in Proceedings of the 4th International Conference on Ubiquitous Computing and Intelligent Information Systems, ICUIS 2024, 2024. doi: 10.1109/ICUIS64676.2024.10866267. DOI: https://doi.org/10.1109/ICUIS64676.2024.10866267

K. V. Sheelavathy and V. Udaya Rani, “Detection IoT attacks using Lasso regression algorithm with ensemble classifier,” International Journal of Pervasive Computing and Communications, vol. 21, no. 1, 2025, doi: 10.1108/IJPCC-09-2022-0316. DOI: https://doi.org/10.1108/IJPCC-09-2022-0316

T. Muhammad and H. Ghafory, “SQL Injection Attack Detection Using Machine Learning Algorithm,” Mesopotamian Journal of CyberSecurity, vol. 2022, 2022, doi: 10.58496/MJCS/2022/002. DOI: https://doi.org/10.58496/MJCS/2022/002

X. Ye, T. G. Tan, and J. Zhou, “Towards Discovering Quantum-Threats for Applications Using Open-Source Libraries,” in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2024. doi: 10.1007/978-3-031-61486-6_17. DOI: https://doi.org/10.1007/978-3-031-61486-6_17

V. A. Telsang, M. S. Kakkasageri, and A. D. Devangavi, “BLOCKCHAIN-BASED DEVICE AUTHENTICATION IN EDGE COMPUTING USING QUANTUM APPROACH,” Jordanian Journal of Computers and Information Technology, vol. 11, no. 1, 2025, doi: 10.5455/jjcit.71-1724681080. DOI: https://doi.org/10.5455/jjcit.71-1724681080

P. Shah, P. Prajapati, R. Patel, and D. Patel, “Post Quantum Cryptography: A Gentle Introduction of Lattice-Based Cryptography (Kyber, NTRUCrypto),” in Lecture Notes in Networks and Systems, 2025. doi: 10.1007/978-981-97-8602-2_43. DOI: https://doi.org/10.1007/978-981-97-8602-2_43

S. Ali and F. Anwer, “A secure framework for IoT-based medical sensors data using homomorphic elliptic curve cryptography,” Cluster Comput, vol. 28, no. 14, 2025, doi: 10.1007/s10586-025-05537-0. DOI: https://doi.org/10.1007/s10586-025-05537-0

S. M. Almufti, R. B. Marqas, P. S. Othman, and A. B. Sallow, “Single-based and population-based metaheuristics for solving np-hard problems,” Iraqi Journal of Science, vol. 62, no. 5, pp. 1710–1720, May 2021, doi: 10.24996/ijs.2021.62.5.34. DOI: https://doi.org/10.24996/10.24996/ijs.2021.62.5.34

P. Shah, P. Prajapati, and D. Patel, “Lattice-Based Post Quantum Cryptography Using Variations of Learning with Error (LWE),” in Communications in Computer and Information Science, 2025. doi: 10.1007/978-3-031-88039-1_5. DOI: https://doi.org/10.1007/978-3-031-88039-1_5

M. Elhajj and P. Mulder, “A Comparative Analysis of the Computation Cost and Energy Consumption of Relevant Curves of ECC Presented in Literature,” International Journal of Electrical and Computer Engineering Research, vol. 3, no. 1, 2023, doi: 10.53375/ijecer.2023.318. DOI: https://doi.org/10.53375/ijecer.2023.318

E. Zeydan, Y. Turk, B. Aksoy, and S. B. Ozturk, “Recent Advances in Post-Quantum Cryptography for Networks: A Survey,” in Proceedings of the 2022 7th International Conference on Mobile and Secure Services, MobiSecServ 2022, 2022. doi: 10.1109/MobiSecServ50855.2022.9727214. DOI: https://doi.org/10.1109/MobiSecServ50855.2022.9727214

B. B. Gupta, D. Kalra, and A. Almomani, Innovations in modern cryptography. 2024. doi: 10.4018/979-8-3693-5330-1. DOI: https://doi.org/10.4018/979-8-3693-5330-1

F. Mensah, “Zero Trust Architecture: A Comprehensive Review of Principles, Implementation Strategies, and Future Directions in Enterprise Cybersecurity,” International Journal of Advance Research, 2024.

Prof. S. Joshi, “Cryptography and Cybersecurity: A Symbiotic Relationship,” Int J Res Appl Sci Eng Technol, vol. 13, no. 5, 2025, doi: 10.22214/ijraset.2025.70789. DOI: https://doi.org/10.22214/ijraset.2025.70789

Subhash Bondhala, “Cybersecurity in AI-Driven Data Centers: Reinventing Threat Detection,” International Journal of Advanced Research in Science, Communication and Technology, 2025, doi: 10.48175/ijarsct-24464. DOI: https://doi.org/10.48175/IJARSCT-24464

M. Singirikonda, “Next-Generation Cryptography: Innovations and Challenges in Securing Digital Communication,” J Cybersecur, vol. 1, no. 6, 2023.

S. M. Almufti and S. R. M. Zeebaree, “Leveraging Distributed Systems for Fault-Tolerant Cloud Computing: A Review of Strategies and Frameworks,” Academic Journal of Nawroz University, vol. 13, no. 2, pp. 9–29, May 2024, doi: 10.25007/ajnu.v13n2a2012. DOI: https://doi.org/10.25007/ajnu.v13n2a2012

G. N. Vivekananda et al., “Retracing-efficient IoT model for identifying the skin-related tags using automatic lumen detection,” Intelligent Data Analysis, vol. 27, pp. 161–180, 2023, doi: 10.3233/IDA-237442. DOI: https://doi.org/10.3233/IDA-237442

T. Thirugnanam et al., “PIRAP: Medical Cancer Rehabilitation Healthcare Center Data Maintenance Based on IoT-Based Deep Federated Collaborative Learning,” Int J Coop Inf Syst, Jun. 2023, doi: 10.1142/S0218843023500053. DOI: https://doi.org/10.1142/S0218843023500053

Similar Articles

You may also start an advanced similarity search for this article.