A Survey of Post-Quantum Cryptography Support in Cryptographic Libraries
- URL: http://arxiv.org/abs/2508.16078v1
- Date: Fri, 22 Aug 2025 04:13:18 GMT
- Title: A Survey of Post-Quantum Cryptography Support in Cryptographic Libraries
- Authors: Nadeem Ahmed, Lei Zhang, Aryya Gangopadhyay,
- Abstract summary: The rapid advancement of quantum computing poses a significant threat to modern cryptographic systems.<n>This study evaluates the support for Post-Quantum Cryptography algorithms within nine widely used open-source cryptographic libraries.
- Score: 7.61838652683662
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: The rapid advancement of quantum computing poses a significant threat to modern cryptographic systems, necessitating the transition to Post-Quantum Cryptography (PQC). This study evaluates the support for PQC algorithms within nine widely used open-source cryptographic libraries -- OpenSSL, wolfSSL, BoringSSL, LibreSSL, Bouncy Castle, libsodium, Crypto++, Botan, and MbedTLS -- focusing on their implementation of the NIST-selected PQC finalists: CRYSTALS-Kyber, CRYSTALS-Dilithium, FALCON, and SPHINCS+. Our analysis, based on the latest available documentation, release notes, and industry reports as of early 2025, reveals a varied state of readiness across these libraries. While some libraries have integrated PQC support or have clear implementation roadmaps, others lag behind, creating potential security risks as quantum threats become more imminent. We discuss key challenges, including performance trade-offs, implementation security, and adoption hurdles in real-world cryptographic applications. Our findings highlight the urgent need for continued research, standardization efforts, and coordinated adoption strategies to ensure a secure transition to the quantum-resistant cryptographic landscape.
Related papers
- QoeSiGN: Towards Qualified Collaborative eSignatures [42.138439537056954]
EU's eIDAS regulation specifies, e.g., advanced and qualified (QES) eSignatures.<n>QESs are based on a qualified certificate issued by a qualified trust service provider (QTSP)<n>We perform a threat analysis on the QES-creation process of Austria's national eID.<n>We present QoeSiGN, utilizing novel P2C2 technologies.
arXiv Detail & Related papers (2025-12-15T18:07:17Z) - Literature Review of the Effect of Quantum Computing on Cryptocurrencies using Blockchain Technology [0.0]
This paper presents a literature review evaluating how quantum algorithms, specifically Shors and Grovers, could disrupt the foundational security mechanisms of cryptocurrencies.<n>This review identifies specific vulnerabilities in transaction and consensus processes in Bitcoin, Litecoin, Monero, and Zcash.<n>In anticipation, it investigates countermeasures including Post-Quantum Cryptography (PQC), Quantum Key Distribution (QKD), and protocol-level modifications such as memory-intensive proof-of-work algorithms and multi-signature schemes.
arXiv Detail & Related papers (2025-08-24T10:53:41Z) - Performance and Storage Analysis of CRYSTALS Kyber as a Post Quantum Replacement for RSA and ECC [49.1574468325115]
CRYSTALS-Kyber is a post-quantum cryptographic solution standardized by NIST in 2022.<n>This study evaluates Kyber's practical viability through performance testing across various implementation schemes.
arXiv Detail & Related papers (2025-08-03T09:53:45Z) - Post-Quantum Cryptography: An Analysis of Code-Based and Lattice-Based Cryptosystems [55.49917140500002]
Quantum computers will be able to break modern cryptographic systems using Shor's Algorithm.<n>We first examine the McEliece cryptosystem, a code-based scheme believed to be secure against quantum attacks.<n>We then explore NTRU, a lattice-based system grounded in the difficulty of solving the Shortest Vector Problem.
arXiv Detail & Related papers (2025-05-06T03:42:38Z) - Quantum-Safe integration of TLS in SDN networks [0.0]
transition to quantum-safe cryptography within the next decade is critical.<n>We have selected Transport Layer Security as the foundation to hybridize classical, quantum, and post-quantum cryptography.<n>The performance of this approach has been demonstrated using a deployed production infrastructure.
arXiv Detail & Related papers (2025-02-24T14:35:56Z) - Evaluating the Potential of Quantum Machine Learning in Cybersecurity: A Case-Study on PCA-based Intrusion Detection Systems [42.184783937646806]
We investigate the potential impact of quantum computing and machine learning (QML) on cybersecurity applications of traditional ML.<n>First, we explore the potential advantages of quantum computing in machine learning problems specifically related to cybersecurity.<n>Then, we describe a methodology to quantify the future impact of fault-tolerant QML algorithms on real-world problems.
arXiv Detail & Related papers (2025-02-16T15:49:25Z) - The Impact of Quantum-Safe Cryptography (QSC) on Website Response [0.0]
In 2024, the National Institute of Standards and Technology published Quantum-Safe Cryptography (QSC) standards.
This study aims to evaluate the impact of NIST's Quantum-Resistant Cryptographic Algorithms on website response times.
It was found that the QSC algorithms outperformed the classical algorithm under normal and congested network conditions.
arXiv Detail & Related papers (2024-10-30T03:44:46Z) - Enhancing Quantum Security over Federated Learning via Post-Quantum Cryptography [38.77135346831741]
Federated learning (FL) has become one of the standard approaches for deploying machine learning models on edge devices.
Current digital signature algorithms can protect these communicated model updates, but they fail to ensure quantum security in the era of large-scale quantum computing.
In this work, we empirically investigate the impact of these three NIST-standardized PQC algorithms for digital signatures within the FL procedure.
arXiv Detail & Related papers (2024-09-06T22:02:08Z) - Post-Quantum Cryptography [0.0]
We talk about the various cryptographic methods that are being practiced to safeguard our information.
The future of secure communication is expected to be the implementation of quantum-safe cryptographic systems.
arXiv Detail & Related papers (2024-02-16T11:04:36Z) - Cryptography: Classical versus Post-Quantum [0.0]
We discuss the advantages of post-quantum cryptography over classical cryptography.
We conclude that the development of post-quantum cryptography is essential to guarantee the security of sensitive information in the post quantum era.
arXiv Detail & Related papers (2024-02-16T10:56:45Z) - The Evolution of Quantum Secure Direct Communication: On the Road to the Qinternet [49.8449750761258]
Quantum secure direct communication (QSDC) is provably secure and overcomes the threat of quantum computing.<n>We will detail the associated point-to-point communication protocols and show how information is protected and transmitted.
arXiv Detail & Related papers (2023-11-23T12:40:47Z) - A Survey on Code-Based Cryptography [0.40964539027092917]
A capable quantum computer can break all currently employed asymmetric cryptosystems.
NIST has initiated in 2016 a standardization process for public-key encryption (PKE) schemes, key-encapsulation mechanisms (KEM) and digital signature schemes.
In 2023, NIST made an additional call for post-quantum signatures.
arXiv Detail & Related papers (2022-01-18T16:46:42Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.