Post-Quantum Cryptography in Embedded Systems, Future Trends, and Research Directions

Amer Mosally, Ibrahim Kabir, Mohammad Hammoudeh

Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

Abstract

The quantum computer will likely become one of the world's most important technologies because of its potential to shorten the years of computing time needed to break cryptography to mere hours. The race among countries to have the edge in quantum technology is improving intelligence, information, and scientific research in this field. This report focuses on the imperative transition to post-quantum cryptography (PQC) to safeguard systems, particularly against quantum computing threats. It explores the major types of PQC algorithms, including lattice-based, codebased, and hash-based systems. It emphasizes the National Institute of Standards and Technology's (NIST) efforts and the process for algorithm standardization. The report will also discuss implementation challenges, such as balancing security with resource constraints in embedded devices. Future trends point towards the necessity of developing specialized hardware and software optimizations to ensure the efficient implementation of quantum-safe protocols.

Original languageEnglish
Title of host publicationQuantum Computing
Subtitle of host publicationA Journey into the Next Frontier of Information and Communication Security
PublisherCRC Press
Pages159-173
Number of pages15
ISBN (Electronic)9781040272220
ISBN (Print)9781032757049
DOIs
StatePublished - 1 Jan 2024

Bibliographical note

Publisher Copyright:
© 2025 selection and editorial matter, Mohammad Hammoudeh, Abdullah T. Alessa, Amro M. Sher- beeni, Clinton M. Firth, and Abdullah S. Alessa; individual chapters, the contributors.

ASJC Scopus subject areas

  • General Computer Science
  • General Mathematics

Fingerprint

Dive into the research topics of 'Post-Quantum Cryptography in Embedded Systems, Future Trends, and Research Directions'. Together they form a unique fingerprint.

Cite this