Generated by GPT-5-mini| PQCrypto | |
|---|---|
| Name | PQCrypto |
| Type | Field of study |
| Focus | Cryptanalysis, cryptography, information security |
| Related | National Institute of Standards and Technology, European Union Agency for Cybersecurity, Internet Engineering Task Force, Quantum computing, Public-key cryptography |
PQCrypto
PQCrypto is the broad research, development, and deployment effort addressing cryptographic primitives and protocols designed to resist attacks by quantum computers and related models such as quantum annealers and topological quantum computers. It spans theoretical work in mathematics and computer science as well as engineering in hardware security modules, smart cards, and cloud computing infrastructures overseen by institutions such as National Institute of Standards and Technology, European Union Agency for Cybersecurity, and Internet Engineering Task Force. Major participants include academic groups at Massachusetts Institute of Technology, University of Cambridge, ETH Zurich, University of Waterloo, industry teams at IBM, Google, Microsoft Research, and standards organizations like International Organization for Standardization and Internet Engineering Task Force.
The PQCrypto movement responds to advances in quantum computing that threaten widely used public-key algorithms like RSA (cryptosystem), Diffie–Hellman key exchange, and Elliptic-curve cryptography. Research draws on problems in lattice-based cryptography such as the Learning with Errors problem, algebraic structures like code-based cryptography exemplified by the McEliece cryptosystem, multivariate approaches derived from Multivariate quadratic equations, and hash-based schemes related to Merkle tree constructions. Stakeholders include governmental agencies such as National Institute of Standards and Technology, standards bodies like Internet Engineering Task Force, and consortia including Crypto Forum Research Group and industry laboratories at Amazon Web Services and Google.
Post-quantum work traces to cryptanalysis of classical schemes after breakthroughs by Peter Shor and Lov Grover at Bell Labs-era theory workshops; Shor's algorithm for integer factorization and discrete logarithms accelerated interest across Academia and Industry. Early practical impetus came from initiatives at National Security Agency and programs at Defense Advanced Research Projects Agency and European Commission funding projects like Horizon 2020 consortia. Scientific meetings and conferences—CRYPTO (conference), EUROCRYPT, Asiacrypt, PQCrypto Workshop—helped coordinate efforts among researchers at Princeton University, Stanford University, California Institute of Technology, Harvard University, University of Oxford, Imperial College London, Tsinghua University, and Peking University.
Algorithm families under PQCrypto include lattice-based cryptography (e.g., schemes by researchers at NTRU Laboratories, constructions inspired by Ajtai–Dwork results), code-based cryptography such as the McEliece cryptosystem and variants from Niederreiter, multivariate public-key cryptography like Hidden Field Equations, hash-based signatures exemplified by Lamport signature and extensions using Merkle tree, and isogeny-based cryptography anchored in work on Elliptic curve isogenies. Concrete submissions and proposals emerged from groups at University of Waterloo (e.g., NTRU lineage), Darmstadt University of Technology, Technische Universität Darmstadt, Nanjing University, and companies including PQShield and ISARA Corporation. Candidate families evaluated in public competitions often reference hardness assumptions from Shortest Vector Problem, Decoding Problem, and the Ring Learning with Errors variant.
Standardization has been driven by National Institute of Standards and Technology's multi-round selection process and similar calls by European Telecommunications Standards Institute, coordinated workshops at World Economic Forum meetings, and working groups within Internet Engineering Task Force. Competitions and calls for proposals attracted submissions from teams at MIT, ETH Zurich, University of Michigan, University of California, Berkeley, Boston University, Brown University, University of Maryland, University of Illinois Urbana–Champaign, KAIST, Seoul National University, and private firms such as Intel, Qualcomm, and ARM Holdings. Outcomes influenced standards by ISO/IEC JTC 1/SC 27 and led to RFCs and interoperability efforts among OpenSSL maintainers and Mozilla.
Security analyses involve classical cryptanalysis from groups at University of Tokyo, Sorbonne University, University of Edinburgh, Weizmann Institute of Science, and adversarial evaluation by labs at Google Quantum AI and IBM Research. Attack models consider quantum algorithms like those developed by Peter Shor and Lov Grover, side-channel analyses from researchers at University of Cambridge and Radboud University, chosen-ciphertext scenarios studied by teams at Cisco Systems and Microsoft Research, and implementation attacks targeting Trusted Platform Modules and secure enclaves employed by vendors such as Apple and Intel. New cryptanalytic techniques have been demonstrated at RSA Conference, Black Hat, and DEF CON.
Implementations have been benchmarked on platforms from ARM Holdings microcontrollers to Xilinx and Intel FPGA boards, cloud instances at Amazon Web Services and Google Cloud Platform, and secure elements from Infineon Technologies. Optimizations involve assembly tuning by groups at RISC-V International, algorithm-specific hardware acceleration researched at IBM and Intel Labs, and constant-time engineering at Linus Torvalds-led projects integrating with OpenSSL and LibreSSL. Performance trade-offs—key size, signature throughput, latency—are evaluated in testbeds maintained by National Institute of Standards and Technology, European Telecommunications Standards Institute, and academic groups at University College London.
Adoption is being driven by industries such as Financial Services Authority-regulated banks, telecommunications companies like Nokia and Ericsson, and critical infrastructure operators influenced by guidance from National Institute of Standards and Technology and European Union Agency for Cybersecurity. Policy discussions occur in forums of G7, NATO, United Nations, and national legislatures where regulators like Office of the Director of National Intelligence and Department of Homeland Security advise migration timelines. Transition planning integrates with standards bodies Internet Engineering Task Force and ISO and affects products shipped by Cisco Systems, Juniper Networks, Huawei, and Samsung Electronics.