ABSTRACT

The advent of potential scalable and reliable quantum computing poses a serious threat to traditional integer factorization-based security protocols. An entirely new field of post-quantum cryptography has been developed to account for challenges of quantum computing that includes new approaches and algorithms to avoid susceptibility from quantum computers of sufficient capacity. As a sufficiently powerful quantum computer can put up a serious challenge to conventional encryption methods based on the difficulty of integer factorization or discrete logarithms, post-quantum cryptography involves several novel approaches such as Lattice-based cryptography, Multivariate cryptography, Hash-based cryptography, Code-based cryptography, Supersingular elliptic curve isogeny cryptography, and Symmetric key quantum resistance. In this chapter we present a wide survey of post-quantum methods as applied to image security. As the challenges offered by the post-quantum cryptography are an opportunity for the code breakers, the survey presented here includes an appraisal of the challenges and the opportunities offered by the emerging field of post-quantum cryptography from the perspective of image security. Current trends and future directions will also be referenced.