Securing the future: exploring post-quantum cryptography for authentication and user privacy in IoT devices
With the emergence of quantum computers, traditional cryptographic methods are vulnerable to attacks, emphasizing the need for post-quantum cryptography to secure devices and networks. This review paper critically analyzes the challenges and future directions of post-quantum cryptography for Interne...
Saved in:
Published in | Cluster computing Vol. 28; no. 2; p. 93 |
---|---|
Main Authors | , , , |
Format | Journal Article |
Language | English |
Published |
New York
Springer US
01.04.2025
Springer Nature B.V |
Subjects | |
Online Access | Get full text |
Cover
Loading…
Summary: | With the emergence of quantum computers, traditional cryptographic methods are vulnerable to attacks, emphasizing the need for post-quantum cryptography to secure devices and networks. This review paper critically analyzes the challenges and future directions of post-quantum cryptography for Internet of Things (IoT). It provides an overview of various post-quantum cryptographic algorithms and protocols and evaluates their suitability for securing IoT devices. The paper also examines implementation challenges, such as limited computing resources and the need for lightweight post-quantum algorithms. Additionally, the paper discusses future directions of post-quantum cryptography, such as the development of hybrid quantum-classical algorithms and integration with other security measures like secure key exchange and device authentication. The study provides a comprehensive analysis of post-quantum cryptography for IoT, highlighting key issues and challenges to ensure secure deployment of IoT devices in a post-quantum world. This paper’s conclusions and recommendations will be valuable to researchers, practitioners, and policymakers working in the subject of IoT security and cryptography. |
---|---|
Bibliography: | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
ISSN: | 1386-7857 1573-7543 |
DOI: | 10.1007/s10586-024-04799-4 |