Post-quantum Cryptography Survey Maps Foundations to Practice, Enabling ML-KEM, ML-DSA, and SLH-DSA Deployment

The increasing threat posed by quantum computers necessitates a shift towards post-quantum cryptography, and a comprehensive understanding of available solutions is now critical. Gaurab Chhetri, Shriyank Somvanshi, and Pavan Hebli, from Texas State University, along with Shamyo Brotee and Subasish Das, address this urgent need with a detailed survey of the field. Their work maps the landscape of post-quantum cryptographic approaches, from foundational principles to practical deployment strategies, and systematically categorises algorithms based on their underlying mathematical problems. This research is significant because it provides a vital resource for both academics and industry professionals, bridging the gap between emerging standards and the engineering challenges of building truly quantum-safe systems, and offering guidance on transitioning to these new cryptographic methods.

Post-Quantum Cryptography, A Comprehensive Survey

This work presents a comprehensive overview of post-quantum cryptography (PQC) and the transition to quantum-safe security, categorizing research and development in the field. The study identifies key areas of focus, including lattice-based cryptography, quantum key distribution, and quantum random number generation, offering a broad perspective on securing communications against future quantum computer attacks. Successful migration to PQC requires careful planning and standardization to ensure a smooth transition.

Lattice Cryptography Performance on Modern Hardware

Researchers conducted a detailed performance evaluation of post-quantum cryptography (PQC) algorithms, assessing their suitability for various deployment scenarios. Scientists implemented and measured representative algorithms, including ML-KEM, which demonstrated sub-millisecond operation times, highlighting the efficiency of lattice-based cryptography. The team engineered a methodology to compare performance and communication costs, utilizing hardware acceleration techniques like AVX2 and FPGA implementations. For example, FPGA designs of SPHINCSLET on Artix-7 achieved minimal area usage while delivering significantly higher throughput compared to software-assisted approaches. Scientists also optimized SLH-DSA, achieving speedups through improved input processing and memory management.

Post-Quantum Cryptography, Landscape and Lattice Focus

This work details a comprehensive survey of post-quantum cryptography (PQC), mapping its progression from theoretical foundations to practical deployment strategies. Researchers categorized PQC schemes based on six primary families: lattice-based, code-based, hash-based, multivariate, isogeny-based, and MPC-in-the-Head. Lattice-based cryptography currently anchors general-purpose deployment, with the Learning With Errors (LWE) problem serving as its cornerstone. Experiments demonstrate the power of worst-case to average-case reductions, guaranteeing that solving random LWE instances implies the ability to solve the most difficult lattice problems.

The Module-LWE (M-LWE) problem further refines this approach, forming the basis for NIST’s standardized schemes, the module-lattice key encapsulation mechanism (ML-KEM) and the module-lattice digital signature algorithm (ML-DSA). Code-based cryptography offers conservative alternatives with long-established security. Isogeny-based cryptography initially promised sub-kilobyte public keys and signatures, but recent cryptanalysis revealed vulnerabilities. MPC-in-the-Head schemes show meaningful progress, with MiRitH achieving multi-kilobyte signatures and PERK reducing memory footprints.

Post-Quantum Cryptography, Systems and Deployment Strategies

This comprehensive survey demonstrates a clear shift in post-quantum cryptography research, moving beyond algorithm design towards practical system implementation and deployment strategies. The work systematically classifies diverse PQC algorithmic families, analyzes their progress through the NIST standardization process, and examines challenges specific to real-world environments, offering an integrated view of PQC as both a technical and socio-technical field. By highlighting hybrid approaches and crypto-agility frameworks, the research provides guidance for organizations preparing for quantum threats while maintaining current interoperability and performance. Future work should pursue continued algorithmic diversity, particularly exploring code-based and multivariate cryptography, alongside performance optimization, integration into constrained environments, and enhanced resilience against side-channel attacks. Further investigation into policy and governance frameworks will also be crucial as PQC transitions from pilot projects to widespread adoption.

👉 More information
🗞 Post-Quantum Cryptography and Quantum-Safe Security: A Comprehensive Survey
🧠 ArXiv: https://arxiv.org/abs/2510.10436

Rohail T.

Rohail T.

As a quantum scientist exploring the frontiers of physics and technology. My work focuses on uncovering how quantum mechanics, computing, and emerging technologies are transforming our understanding of reality. I share research-driven insights that make complex ideas in quantum science clear, engaging, and relevant to the modern world.

Latest Posts by Rohail T.:

Diffusion LLM Sampling Achieves 70% Latency Reduction with Novel NPU Design

Diffusion LLM Sampling Achieves 70% Latency Reduction with Novel NPU Design

February 2, 2026
GPU Portability Layers: Evaluating Application Characteristics for NVIDIA and Intel Deployments

GPU Portability Layers: Evaluating Application Characteristics for NVIDIA and Intel Deployments

February 2, 2026
The quantum computing investment landscape splits between pure-play specialists like IonQ, Rigetti, and D-Wave, and tech giants such as IBM, Microsoft, and Google. IRID companies focus solely on building quantum computers, while AIMING companies leverage their vast resources for long-term quantum initiatives. Investors must choose between high-risk, high-reward pure-play stocks or stable exposure via tech titans.

IRID + AIMING: The Pure-Play Quantum Computing Stocks vs Tech Giants Defining the Next Computing Era

February 2, 2026