The increasing prevalence of interconnected devices in the Internet of Things (IoT) presents significant challenges to data security and privacy, as conventional encryption methods become increasingly vulnerable to advanced computational attacks. Jaydip Sen from Praxis Business School and colleagues investigate how emerging quantum technologies can address these weaknesses and build more resilient IoT systems. Their work explores the potential of post-cryptographic techniques, such as lattice-based and code-based encryption, to safeguard data in resource-limited devices. Furthermore, the research examines quantum methods like Key Distribution and Random Number Generation, which offer enhanced security through the fundamental laws of physics, ultimately paving the way for a new generation of secure and trustworthy intelligent networks.
Quantum Security, Post-Quantum Cryptography and Networks
This collection of research comprehensively examines Quantum Key Distribution (QKD), Post-Quantum Cryptography (PQC), and their application in securing communication networks, particularly within the Internet of Things, smart grids, and future internet infrastructure. The work covers the theoretical foundations, practical implementations, and standardization efforts needed to address the threat quantum computers pose to current cryptographic systems, focusing on integrating these technologies to create robust security solutions. Research in this area concentrates on QKD, detailing the principles behind secure key exchange and the hardware used in QKD systems. Implementations range from point-to-point links to complex QKD networks, including terrestrial and satellite-based systems, with satellite QKD receiving particular attention.
PQC also receives substantial attention, with researchers exploring algorithms from families including lattice-based, code-based, and hash-based cryptography, as standardized by organizations like NIST. Secure Multi-Party Computation (MPC) and Homomorphic Encryption (HE) are also investigated, offering methods for privacy-preserving data analysis and secure cloud computing. Finally, research extends to the development of quantum networks and crucial components like quantum repeaters and entanglement distribution techniques. The research underscores the urgent need to transition to quantum-resistant cryptography to protect against quantum computers.
QKD and PQC are presented as complementary approaches, with QKD providing information-theoretic security for key distribution and PQC offering long-term security for data encryption and digital signatures. Standardization efforts are crucial for widespread adoption and interoperability, and integrating these technologies into existing infrastructure presents a significant challenge. Ongoing research and development are essential to improve the performance, scalability, and security of QKD, PQC, and related technologies.
Quantum Threat to IoT Cryptography Assessed
Researchers are investigating how to secure the Internet of Things (IoT) against emerging threats from computing. The study recognizes the vulnerability of current cryptographic standards like RSA and Elliptic Curve Cryptography (ECC) given the increasing prevalence of IoT devices. To assess these risks, the work focuses on the potential of quantum algorithms, specifically Shor’s and Grover’s, to compromise existing encryption methods. Scientists detail how Shor’s algorithm threatens to break RSA and ECC encryption, regardless of key size, while Grover’s algorithm effectively halves the strength of symmetric encryption like Advanced Encryption Standard (AES).
This means that AES-256 would offer only approximately 128-bit security against a quantum attack. Recognizing the longevity of deployed IoT devices, the study highlights the “store now, decrypt later” attack scenario. To counter these threats, researchers explore Post-Quantum Cryptography (PQC), focusing on algorithmic families including lattice-based, code-based, and hash-based schemes. The work analyzes the suitability of these PQC approaches for resource-constrained IoT deployments, considering computational efficiency and scalability. Research focuses on building cryptographically robust systems for the future, exploring Post-Quantum Cryptography (PQC) families including lattice-based, code-based, hash-based, and multivariate approaches for resource-constrained devices, and leveraging quantum-based methods like Quantum Key Distribution (QKD) to guarantee secure key exchange. Experiments demonstrate the feasibility of satellite-to-ground QKD, achieving secure key distribution over distances exceeding those possible with traditional methods. Researchers recorded successful entanglement-based QKD implementations, paving the way for long-distance secure communication networks.
Further studies explore frequency-bin entanglement-based QKD, demonstrating potential for enhanced performance in space applications. Microsatellite-based QKD systems have been developed, achieving real-time quantum key distribution with reported rates of up to 47 to 54 keys per second. Beyond QKD, investigations into quantum homomorphic encryption show promise for performing computations on encrypted data without decryption, enhancing privacy and security. Studies also explore quantum delegated and federated learning, enabling secure collaborative machine learning, and secure multi-party computation techniques, allowing multiple parties to jointly compute a function on their private inputs without revealing those inputs to each other. These advancements are driving standardization efforts, with organizations like NIST and ISO/IEC actively working to define and implement post-quantum cryptographic algorithms and protocols.
Post-Quantum Security for Resource-Constrained IoT
This work comprehensively examines the evolving landscape of Internet of Things (IoT) security in light of advances in computing. The research details how currently prevalent cryptographic techniques, such as RSA, ECC, and AES, underpin much of IoT communication but face potential vulnerabilities from emerging quantum algorithms. To address these challenges, the study surveys families of Post-Quantum Cryptography (PQC), including lattice-based, code-based, hash-based, and multivariate schemes, assessing their suitability for resource-constrained IoT devices. While acknowledging progress towards standardization of PQC algorithms, the authors note the need for further optimization to achieve lightweight, energy-efficient implementations suitable for widespread IoT deployment. Future research directions identified include improving cryptographic agility to allow seamless transitions between algorithms and enhancing the scalability and cost-effectiveness of quantum cryptographic solutions like QKD.
👉 More information
🗞 Security and Privacy Management of IoT Using Quantum Computing
🧠 ArXiv: https://arxiv.org/abs/2511.03538
