ABSTRACT

The boom of quantum computing has brought both benefits and threats to cyber-physical systems. The primary purpose of the paper is to highlight the possible threats by quantum computers, and to provide a comparative study of the on-going quantum-resistant post-quantum cryptography suitable for current network infrastructure. Asymmetric key cryptography, mainly the widely adopted RSA and ECC algorithms, has been compromised by quantum algorithms such as the Shor’s algorithm. Moreover, symmetric algorithms such as AES are weakened by brute force attacks using Grover’s algorithm. Thus, researchers are developing public key algorithms based on hard mathematical models that provide resistance against quantum attacks and can be deployed in classical hardware. We categorize the well-known post-quantum schemes based on (1) their security goals: confidentiality and integrity, and (2) their mathematical problems: code-based, lattice-based, super-singular elliptic curve isogeny based, multivariate and hash-based algorithm. Hash-based post- quantum cryptography is further categorized into two: stateless and stateful signature scheme. Furthermore, the chapter compares the algorithms based on the key sizes, ciphertext sizes, signature sizes, computation, and time cost. The paper also presents the challenges faced by the post-quantum algorithms, and it outlines directions for further research to improve the algorithms. Moreover, various cyber-physical fields, including industrial control systems, mainly nuclear power plants, water management plants, and even space stations and their infrastructure, rely on classical cryptography. Thus, the paper presents a generic hybrid cryptosystem based on classical and post-quantum cryptography to enhance resistance against classical and quantum attacks.