10.25673/122130">


Proceedings of International Conference on Applied Innovation in IT
2025/08/29, Volume 13, Issue 4, pp.307-314

Challenges and Advancements in Quantum Cryptography: Standardization, Security Risks, and Practical Implementations


Yasmin Makki Mohialden, Muhanad Tahrir Younis, Saba Abdulbaqi Salman, Ethar Abdul Wahhab Hachim and Muthana S. Mahdi


Abstract: The advancement of quantum computing poses a direct threat to classical cryptographic systems, necessitating the adoption of quantum-resistant encryption techniques to maintain data integrity, confidentiality, and trust in digital communications. This study presents a comprehensive evaluation of Quantum Key Distribution (QKD) protocols - specifically BB84, E91, and B92 - alongside post-quantum cryptographic algorithms, including lattice-based, hash-based, and multivariate-quadratic systems. These techniques represent two complementary approaches: QKD leverages quantum mechanical principles for secure key exchange, while PQC reinforces classical cryptography against quantum threats using novel mathematical constructs. A comparative analysis is conducted focusing on security robustness, computational efficiency, and deployment scalability. Real-world constraints such as infrastructure limitations, key management complexity, and algorithmic overhead are also critically examined. The paper also investigates the standardization efforts led by NIST, ISO, and ETSI, highlighting current challenges to global adoption, including the lack of interoperability frameworks and varying readiness levels across industries. The findings underscore the need for hybrid cryptographic models that integrate classical and quantum-resistant mechanisms, offering a pragmatic path forward as quantum capabilities mature. Future directions include integrating quantum cryptography with cloud security, advancing homomorphic encryption, and developing quantum-safe blockchain technologies. These innovations are crucial for building resilient cybersecurity infrastructures capable of supporting next-generation applications such as secure edge computing, confidential AI model sharing, and tamper-proof digital ledgers. This research provides timely insights into the evolving cryptographic landscape and emphasizes the urgency of preparing for the quantum future through interdisciplinary collaboration and proactive technological adaptation.

Keywords: Communication Security, Cryptographic Algorithms, Post-Quantum Cryptography (PQC), Quantum Computing Threats, Quantum Cryptography, Quantum Key Distribution (QKD), Quantum-Resistant Encryption.

DOI: 10.25673/122130

Download: PDF

References:

  1. S. Sharma, K. Ramkumar, A. Kaur, T. Hasija, S. Mittal, and B. Singh, “Post-quantum cryptography: A solution to the challenges of classical encryption algorithms,” in Modern Electronics Devices and Communication Systems. Singapore: Springer, 2023, pp. 23–38, doi: 10.1007/978-981-19-6383-4_3.
  2. S. Ullah, J. Zheng, N. Din, M. T. Hussain, F. Ullah, and M. Yousaf, “Elliptic curve cryptography: Applications, challenges, recent advances, and future trends: A comprehensive survey,” Computer Science Review, vol. 47, p. 100530, 2023, doi: 10.1016/j.cosrev.2022.100530.
  3. C. Easttom, “Quantum computing and cryptography,” in Modern Cryptography: Applied Mathematics for Encryption and Information Security. Cham, Switzerland: Springer, 2022, pp. 397–407.
  4. Y. Baseri, V. Chouhan, and A. Hafid, “Navigating quantum security risks in networked environments: A comprehensive study of quantum-safe network protocols,” Computers & Security, vol. 142, p. 103883, 2024, doi: 10.1016/j.cose.2024.103883.
  5. F. Opiłka, M. Niemiec, M. Gagliardi, and M. A. Kourtis, “Performance analysis of post-quantum cryptography algorithms for digital signature,” Applied Sciences, vol. 14, no. 12, p. 4994, 2024, doi: 10.3390/app14124994.
  6. Y. Baseri, V. Chouhan, and A. Ghorbani, “Cybersecurity in the quantum era: Assessing the impact of quantum computing on infrastructure,” arXiv, 2024, Art. no. 2404.10659, doi: 10.48550/arXiv.2404.10659.
  7. R. Cyriac, S. Eswaran, S. Selvarajan, and D. Yuvaraj, “Quantum computing in cryptographic systems,” International Journal of Advanced IT Research and Development, vol. 1, no. 1, pp. 18–24, 2024.
  8. C.-Y. Lai and K.-M. Chung, “Quantum encryption and generalized Shannon impossibility,” Designs, Codes and Cryptography, vol. 87, pp. 1961–1972, 2019, doi: 10.1007/s10623-018-00597-3.
  9. B. Langenberg, H. Pham, and R. Steinwandt, “Reducing the cost of implementing the advanced encryption standard as a quantum circuit,” IEEE Transactions on Quantum Engineering, vol. 1, pp. 1–12, 2020, doi: 10.1109/TQE.2020.2965697.
  10. K. Kan and M. Une, “Recent trends on research and development of quantum computers and standardization of post-quantum cryptography,” Monetary and Economic Studies, pp. 77–108, 2021.
  11. Z. Li et al., “Novel quantum circuit implementation of advanced encryption standard with low costs,” Science China Physics, Mechanics & Astronomy, vol. 65, p. 290311, 2022, doi: 10.1007/s11433-022-1921-y.
  12. Z. Wang, S. Wei, G.-L. Long, and L. Hanzo, “Variational quantum attacks threaten advanced encryption standard based symmetric cryptography,” Science China Information Sciences, vol. 65, p. 200503, 2022, doi: 10.1007/s11432-022-3511-5.
  13. K. Barooti et al., “Public-key encryption with quantum keys,” in Theory of Cryptography Conference. Cham, Switzerland: Springer, 2023, pp. 198–227, doi: 10.1007/978-3-031-48624-1_8.
  14. S. Subramani and S. K. Svn, “Review of security methods based on classical cryptography and quantum cryptography,” Cybernetics and Systems, vol. 56, no. 3, pp. 302–320, 2025, doi: 10.1080/01969722.2023.2166261.
  15. S. Pirandola et al., “Advances in quantum cryptography,” Advances in Optics and Photonics, vol. 12, no. 4, pp. 1012–1236, 2020, doi: 10.1364/AOP.361502.
  16. X. Tan, “Introduction to quantum cryptography,” in Theory and Practice of Cryptography and Network Security Protocols and Technologies. Norderstedt, Germany: BoD – Books on Demand, 2013, pp. 111–145.
  17. F. Grasselli, Quantum Cryptography: From Key Distribution to Conference Key Agreement. Cham, Switzerland: Springer, 2021.
  18. S. Mitra, B. Jana, S. Bhattacharya, P. Pal, and J. Poray, “Quantum cryptography: Overview, security issues and future challenges,” in Proc. 4th Int. Conf. on Opto-Electronics and Applied Optics (OPTRONIX), Kolkata, India, 2017, pp. 1–7, doi: 10.1109/OPTRONIX.2017.8350006.
  19. M. S. Sharbaf, “Quantum cryptography: An emerging technology in network security,” in Proc. IEEE Int. Conf. on Technologies for Homeland Security (HST), Waltham, MA, USA, 2011, pp. 13–19, doi: 10.1109/THS.2011.6107841.
  20. P. W. Shor and J. Preskill, “Simple proof of security of the BB84 quantum key distribution protocol,” Physical Review Letters, vol. 85, p. 441, 2000, doi: 10.1103/PhysRevLett.85.441.
  21. L.-J. Wang et al., “Experimental authentication of quantum key distribution with post-quantum cryptography,” npj Quantum Information, vol. 7, p. 67, 2021, doi: 10.1038/s41534-021-00400-7.
  22. Q. Zhang, F. Xu, Y.-A. Chen, C.-Z. Peng, and J.-W. Pan, “Large scale quantum key distribution: Challenges and solutions,” Optics Express, vol. 26, no. 18, pp. 24260–24273, 2018, doi: 10.1364/OE.26.024260.
  23. Y. Cao, Y. Zhao, Q. Wang, J. Zhang, S. X. Ng, and L. Hanzo, “The evolution of quantum key distribution networks: On the road to the qinternet,” IEEE Communications Surveys & Tutorials, vol. 24, no. 2, pp. 839–894, 2022, doi: 10.1109/COMST.2022.3144219.
  24. A. I. Nurhadi and N. R. Syambas, “Quantum key distribution protocols: A survey,” in Proc. 4th Int. Conf. on Wireless and Telematics (ICWT), Nusa Dua, Bali, Indonesia, 2018, pp. 1–5, doi: 10.1109/ICWT.2018.8527822.
  25. N. Yang, Y. Tian, Z. Zhou, and Q. Zhang, “A provably secure collusion-resistant identity-based proxy re-encryption scheme based on NTRU,” Journal of Information Security and Applications, vol. 78, p. 103604, 2023, doi: 10.1016/j.jisa.2023.103604.
  26. L. C. Alvarez and P. C. Caiconte, “Comparison and analysis of BB84 and E91 quantum cryptography protocols security strengths,” International Journal of Modern Communication Technologies and Research, vol. 4, no. 9, pp. 12–21, 2016.
  27. S. Salman, Y. M. Mohialden, A. Abdulhameed, and N. M. Hussien, “A novel method for Hill cipher encryption and decryption using Gaussian integers implemented in banking systems,” Iraqi Journal for Computer Science and Mathematics, vol. 5, no. 1, pp. 277–284, 2024, doi: 10.52866/ijcsm.2024.05.01.019.
  28. H. R. Shakir, “Secure selective image encryption based on wavelet domain, 3D-chaotic map, and discrete fractional random transform,” International Journal of Intelligent Engineering & Systems, vol. 16, no. 6, pp. 965–980, 2023, doi: 10.22266/ijies2023.1231.80.
  29. S. A. Yassir and H. R. Shakir, “Hybrid image encryption technique for securing color images transmitted over cloud networks,” International Journal of Intelligent Engineering & Systems, vol. 16, no. 6, pp. 850–862, 2023, doi: 10.22266/ijies2023.1231.70.
  30. C. Portmann and R. Renner, “Security in quantum cryptography,” Reviews of Modern Physics, vol. 94, p. 025008, 2022, doi: 10.1103/RevModPhys.94.025008.


    HOME

       - Conference
       - Journal
       - Paper Submission to Journal
       - Paper Submission to Conference
       - For Authors
       - For Reviewers
       - Important Dates
       - Conference Committee
       - Editorial Board
       - Reviewers
       - Last Proceedings


    PROCEEDINGS

       - Volume 13, Issue 4 (ICAIIT 2025)
       - Volume 13, Issue 3 (ICAIIT 2025)
       - Volume 13, Issue 2 (ICAIIT 2025)
       - Volume 13, Issue 1 (ICAIIT 2025)
       - Volume 12, Issue 2 (ICAIIT 2024)
       - Volume 12, Issue 1 (ICAIIT 2024)
       - Volume 11, Issue 2 (ICAIIT 2023)
       - Volume 11, Issue 1 (ICAIIT 2023)
       - Volume 10, Issue 1 (ICAIIT 2022)
       - Volume 9, Issue 1 (ICAIIT 2021)
       - Volume 8, Issue 1 (ICAIIT 2020)
       - Volume 7, Issue 1 (ICAIIT 2019)
       - Volume 7, Issue 2 (ICAIIT 2019)
       - Volume 6, Issue 1 (ICAIIT 2018)
       - Volume 5, Issue 1 (ICAIIT 2017)
       - Volume 4, Issue 1 (ICAIIT 2016)
       - Volume 3, Issue 1 (ICAIIT 2015)
       - Volume 2, Issue 1 (ICAIIT 2014)
       - Volume 1, Issue 1 (ICAIIT 2013)


    PAST CONFERENCES

       ICAIIT 2025
         - Photos
         - Reports

       ICAIIT 2024
         - Photos
         - Reports

       ICAIIT 2023
         - Photos
         - Reports

       ICAIIT 2021
         - Photos
         - Reports

       ICAIIT 2020
         - Photos
         - Reports

       ICAIIT 2019
         - Photos
         - Reports

       ICAIIT 2018
         - Photos
         - Reports

    ETHICS IN PUBLICATIONS

    ACCOMODATION

    CONTACT US

 

        

         Proceedings of the International Conference on Applied Innovations in IT by Anhalt University of Applied Sciences is licensed under CC BY-SA 4.0


                                                   This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License


           ISSN 2199-8876
           Publisher: Edition Hochschule Anhalt
           Location: Anhalt University of Applied Sciences
           Email: leiterin.hsb@hs-anhalt.de
           Phone: +49 (0) 3496 67 5611
           Address: Building 01 - Red Building, Top floor, Room 425, Bernburger Str. 55, D-06366 Köthen, Germany

        site traffic counter

Creative Commons License
Except where otherwise noted, all works and proceedings on this site is licensed under Creative Commons Attribution-ShareAlike 4.0 International License.