ABSTRACT

In today’s world more and more electronic devices are connected through the channel “internet”. To secure these devices, designers rely on cryptographic standards that provide encryption, authentication and data-integrity. However, future advances in quantum computing threaten the security of these standards as they are predicted to break the underlying hard mathematical problems. It is therefore of the utmost importance to find new standards that are safe against quantum computers. The design and analysis of such quantum-safe algorithms is studied in the field of many post-quantum encryption schemes are subject to decryption failures. This means that even after a proper execution of the algorithm, there is a (very small) chance that the message or key is not transmitted correctly. It simply led like that decryption failures lead to a new attack vector in which failing cipher texts are assembled and used to reconstruct the secret key. To secure the connected devices and data the method of Post Quantum Cryptography will plays a vital role. Post Quantum Cryptography improves the security proof bound on decryption failure attacks.