Literature Review on NIST Standardized PQC-Algorithms

This project aims to analyze and summarize the post-quantum cryptographic (PQC) algorithms that NIST standardized in 2024. It will examine their parameterization options, application areas, and available implementations, providing a comprehensive overview of libraries and tools. The goal is to equip software engineers with the knowledge needed to effectively integrate these algorithms into diverse ecosystems.

Thumb

Context

Shor’s algorithm, a groundbreaking quantum algorithm, demonstrated that quantum computers could efficiently break widely used cryptographic systems, such as RSA and ECC, by factoring large integers and solving discrete logarithms much faster than classical computers. What used to be a theoretical threat has rapidly become a practical concern, as advancements in quantum computing continue to accelerate, posing serious risks to the security of modern cryptography.

In response to this emerging reality, the National Institute of Standards and Technology (NIST), a global authority on cryptographic standards, launched a competition to identify new cryptographic algorithms capable of resisting quantum attacks. This initiative was aimed at addressing the vulnerabilities posed by quantum computing. After years of rigorous evaluation, NIST finalized three post-quantum cryptographic standards in August 2024, marking a major step forward in ensuring secure communications in the quantum era.

To safeguard systems long-term, NIST also emphasizes the need for Cryptographic Agility — the ability to seamlessly switch between cryptographic algorithms (or primitives) as new standards emerge or vulnerabilities are discovered. Implementing this agility requires robust tools, libraries, and frameworks to help software engineers efficiently integrate these new cryptographic standards into their systems.

Motivation

With the recent release of new post-quantum cryptographic standards, organizations face the growing need to transition to secure systems that can withstand quantum computing threats. Regulatory bodies and government agencies are expected to mandate this migration in the near future, prompting institutions to prepare for the shift sooner rather than later.

For decision-makers, understanding the strengths and limitations of these new cryptographic standards is essential for making informed choices. This includes evaluating the various options available, their specific applications, and the implications of each algorithm. The migration process begins with two critical steps: identifying the cryptographic methods currently in use and determining the most suitable post-quantum alternatives to replace them.

The urgency to migrate is driven by the need for secure, future-proof systems. Early preparation ensures organizations can avoid risks associated with outdated cryptography and keep pace with evolving security standards.

Goal

This project has three primary objectives:

  1. Summarize the new post-quantum cryptographic standards: This includes providing a high-level overview of their inner workings, exploring their parameterization options, and recommending best practices for various use cases.
  2. Survey available libraries and tools for deploying these standards: Map out the ecosystems in which these libraries are available (e.g., Windows, Linux, embedded systems) and assess their maintenance, reliability, and verification status.
  3. Support practitioners in achieving cryptographic agility: Guide software engineers in adopting new standards to enhance cryptographic agility. This includes compiling a cryptographic inventory and outlining initial steps for transitioning to post-quantum cryptographic methods.

Requirements

Students interested in this project should have:

Pointers

Others: