Quantum Crptography Tables
Quantum Crptography Tables
Name
The authors focus on two 1. BB84 and E91 The paper is based on Future research is to
main methods for secure protocols show strong theoretical research focus on making
data sharing using quantum security by detecting if and does not use quantum systems
key distribution (QKD), which anyone tries to intercept specific data from more affordable and
uses the unique properties the data. experiments or compatible with
Gourav Nagar
of quantum mechanics to datasets. It’s today’s technology.
(Texas A&M
keep data safe: 2. These protocols have references are old
University,
• BB84 Protocol: Uses many applications in studies based on
College
the unpredictable secure communication, quantum
Station)
nature of quantum banking, government, cryptography.
Ashok
particles. If anyone healthcare, and IoT
Manoharan
tries to intercept (Internet of Things)
(New Jersey
data, it will show up security.
Institute of
as an error.
Technology)
• E91 Protocol: Uses 3. However, challenges
pairs of entangled include high costs, the
particles (particles need for reliable
that are linked) to quantum particles
detect eavesdropping (qubits), and
because any infrastructure
interference breaks limitations.
the link, alerting the
users.
Tao Liu, Gowri The authors reviewed recent The review found that PQC This paper is a review The authors highlight
Ramachandran, research on Post-Quantum could be used to secure based on other studies the need for more
and Raja Jurdak Cryptography (PQC) to see how some IoT devices, but the and didn’t use any research to create
it performs and can be available improvements specific dataset. The standard PQC
improved for use with Internet aren’t standardized, authors gathered improvements that can
of Things (IoT) devices. They making it hard to use information from various work efficiently on
looked at different PQC these methods across academic sources different types of IoT
methods and evaluated how different devices. The focused on PQC and IoT. devices. They
well they could work for small, authors noted that PQC recommend focusing
low-power IoT devices that offers strong protection on making PQC
have limited computing power but can still be too methods simpler and
and memory. demanding for smaller IoT more efficient for
devices. widespread use in IoT
security.
Jakub Sowa, The authors created a network The results showed that Data was collected from The study highlights a
Bach Hoang, tool to measure how much very few systems are using network logs at the need for more research
Advaith Yeluru, Post-Quantum Cryptography PQC. For instance, only National Center for and standardization to
Steven Qie, (PQC) is used. This tool was set 0.029% of SSH Supercomputing make PQC widely
Anita Nikolich, up at a major supercomputing connections used PQC in Applications (NCSA) usable and consistent
Ravishankar Iyer, center and linked to the FABRIC OpenSSH, and a small between January 2023 across different devices
and Phuong Cao. testbed network. The study number of large networks and April 2024. and protocols. Future
looked at how well PQC is being in the U.S. and Europe Approximately 13 TB of work is recommended
adopted by different protocols have started using it. data was gathered from to improve adoption
(like SSH and TLS) and checked Adoption is increasing different network and address the
if any popular applications, slowly, but many protocols protocols like SSH and challenges of
such as Google Chrome and still lack PQC support. TLS, tracking PQC usage. integrating PQC into
OpenSSH, have implemented various network
PQC. protocols.
Alex The authors studied the The main result is a proof No specific dataset is The authors identified
Lombardi problem of unitary synthesis of a one-query lower used. The study is a lack of understanding
(how to implement any bound for unitary theoretical, relying on about the number of
(Princeton quantum operation efficiently) synthesis. This means they mathematical queries required to
University), and aimed to show that this demonstrated that some formulations and existing synthesize general
Fermi Ma cannot be achieved with only quantum transformations theoretical frameworks unitaries efficiently.
(Simons one query to an oracle. They cannot be created (even in quantum complexity
Institute for developed a framework using a approximately) with just and cryptography.
the Theory "challenger-adversary" game to one query to an oracle
of analyze the difficulty of this function. This finding
Computing, problem. Additionally, they suggests that secure
UC employed techniques from quantum cryptographic
Berkeley), random matrix theory to systems can withstand
John Wright explore the limits of single- attacks by one-query
(University query quantum algorithms in algorithms, even if these
of California, synthesizing unitaries and algorithms are powerful in
Berkeley) breaking cryptographic other contexts.
systems.
Bharat S. Rawal The authors conducted a The survey highlights that No specific experimental The authors identified
(Grambling State comprehensive survey of post- PQC methods like Crystals- dataset was used in this that while PQC shows
University) quantum cryptography (PQC) Dilithium and Kyber are survey. The authors potential, it is still in
Anjan Biswas by reviewing recent promising candidates for based their findings on a early stages for
(Grambling State advancements, challenges, and future encryption and review of existing mainstream adoption.
University, King implications of various signature needs. These literature and previously They note the need for
Abdulaziz cryptographic methods. They methods show high conducted studies in the further research in
University, focused on lattice-based resistance to quantum field of cryptography. standardizing PQC
Dunarea de Jos cryptography and other attacks due to their algorithms and
University of methods like hash-based, code- reliance on complex addressing
Galati, Sefako based algebraic problems that compatibility with
Makgatho quantum computers current systems.
Health Sciences struggle to solve
University) efficiently.
Petar Radanliev The study employs a qualitative The study found that Data sources include The study highlights
research approach within an integrating AI with standards and guidelines the need for further
interpretive paradigm. It quantum cryptography from institutions like research on
involves gathering data from holds great promise for NIST (National Institute overcoming technical
industry standards, case enhancing digital security of Standards and challenges in AI and
studies, and scholarly literature, against emerging threats. Technology), as well as quantum cryptography
followed by thematic analysis AI can help improve case studies and integration, particularly
to identify patterns and themes quantum cryptographic scholarly articles on in terms of real-time
related to AI and quantum processes, making them quantum computing, AI, applications and
cryptography integration. more efficient and robust. and cybersecurity. addressing the
However, challenges quantum threat to
remain in scalability, existing cryptographic
latency, and regulatory methods.
compliance.
Ritik Bavdekar, This study provides a review of The study highlights The research uses data There is a need for
Eashan Jayant current cryptographic methods several promising from the NIST post- more research in
Chopde, Ankit and potential post-quantum cryptographic approaches, quantum cryptography developing lightweight
Agrawal, algorithms. It analyzes the like lattice-based, code- standardization process, and efficient PQC
vulnerabilities of traditional based, hash-based, and which has reviewed algorithms, especially
Ashutosh Bhatia, cryptosystems when faced with multivariate cryptography, multiple algorithms to for IoT devices, as
Kamlesh Tiwari quantum computing and which are seen as more find quantum-resistant these algorithms need
examines post-quantum resistant to quantum cryptographic standards. to be secure yet
cryptography (PQC) options, attacks. It identifies compatible with low-
comparing the performance of finalists from the NIST power hardware.
different PQC algorithms on standardization process, Further analysis is also
various platforms. comparing them in terms needed to ensure that
of speed, security level, these algorithms can
and practical usage. withstand future
advancements in
quantum technology.
Yi-Kai Liu and This paper reviews the status of The study emphasizes the Data sources include The research identifies
Dustin Moody post-quantum cryptography need for new prior studies on PQC gaps in deploying PQC
(PQC), discussing its role in cryptographic methods algorithms and protocols across systems and the
securing the Internet against that resist quantum from organizations like need for more secure,
future quantum computer threats and highlights NIST, which are working cost-effective quantum
threats. It analyzes the recent developments in to standardize quantum- technology for practical
limitations of current PQC. It also discusses resistant encryption use. Additionally, there
cryptography with respect to experimental quantum methods. is a need for improved
quantum attacks and considers technologies that may quantum devices that
potential quantum secure cryptographic can provide
technologies to enhance hardware, like device- uncloneable, secure
cybersecurity, such as quantum independent random cryptographic keys and
key distribution and verification number generators and ensure the integrity of
techniques. uncloneable encryption quantum
computations.
Vatsal Vasani, The authors use a literature The paper highlights the The paper primarily The paper identifies
Kumar Prateek, review and analysis potential of quantum relies on existing several research gaps
Ruhul Amin, methodology to explore the technology to research papers, articles, in the field of quantum
Soumyadev field of quantum revolutionize and reports on quantum communication and
Maity communication and communication security technology, cryptography. Some of
cryptography. They delve into by offering unconditional communication, and these gaps include:
the fundamental principles, security. It explores cryptography. • Developing
potential applications, and various quantum practical and
future directions of this communication protocols, scalable
emerging field. including quantum key quantum
distribution, quantum communication
teleportation, and networks.
quantum-resistant • Improving the
cryptography. Additionally, security and
it discusses the potential efficiency of
applications of quantum. quantum key
distribution
protocols.
C. Bagath Basha, The study utilizes quantum Quantum cryptography The authors did not Current research on
K. Murugan, T. cryptography to enhance outperforms traditional specify a unique dataset symmetric and
Suresh, V. healthcare data security. The Advanced Encryption but simulated key homomorphic
Srirenga approach involves creating Standard (AES) encryption generation times using encryption highlights
Nachiyar, S. secure quantum states for data, in efficiency and security various bit sizes to assess performance issues,
Athimoolam, establishing quantum for healthcare data. For performance. especially in healthcare
and C. Kanmani entanglement between sender example, with a 150-bit applications. The paper
Pappa. and receiver, and using key, quantum identifies a gap in
Quantum Key Distribution cryptography’s encryption applying quantum-
(QKD) for encryption keys. A was completed in 352,237 resistant encryption
quantum simulator with milliseconds versus AES’s techniques to
Python’s Cirq library was used 310,285 milliseconds. This safeguard healthcare
to test this method's model shows enhanced data from emerging
effectiveness, measuring key speed and scalability over quantum computing
generation times across AES in key generation and threats, which the
different bit lengths. data encryption. authors suggest as an
area for future
research.
Vaishnavi • The paper explores Quantum cryptography is The paper primarily There is still a need to
Ganeshkar and quantum cryptography found to provide stronger reviews previous studies address practical
Mayura Kulkarni. to improve secure security than traditional on quantum challenges like the high
communication using methods, as it uses the cryptography and cost of implementing
the principles of physics of quantum doesn't rely on a specific quantum cryptography,
quantum mechanics, particles. This approach dataset. the need for
like quantum key can detect any specialized channels
distribution (QKD). It unauthorized access (like optical fibers), and
highlights two main attempts and is seen as a adapting existing
protocols, BB84 and more secure option for systems to use
E91, which help detect future communication quantum technologies.
any attempts to networks, especially with
intercept messages by the rise of quantum
creating secure computers that can break
cryptographic keys. traditional encryption.
Dr. G. S. This paper discusses PQC algorithms offer a The paper does not use Challenges include the
Mamatha, Rasha Post-Quantum promising solution to specific datasets but high computational
Sinha, and Cryptography (PQC), counteract quantum reviews existing cost and integration
Namya Dimri which is designed to threats, especially as they cryptographic techniques difficulties of PQC
from R.V. College protect digital are resistant to quantum and compares various algorithms with current
of Engineering, communication from attacks. For instance, PQC algorithms. systems.
Bengaluru, India. quantum computing lattice-based and code-
threats. It introduces based cryptography are
several PQC algorithms, found to be particularly
such as lattice-based, secure against quantum
code-based, hash- algorithms like Shor’s
based. algorithm.
AUTHOR NAME Methodology Result Source Research GAP