Understanding Post-Quantum Cryptography: Standards & Performance Insights π
Explore the latest developments in post-quantum cryptography, including standardization efforts and performance analysis, to stay ahead in cybersecurity.

Aljazari Foundation
42 views β’ Oct 30, 2025

About this video
Post-quantum cryptography Algorithmβs standardization and
performance analysis
Manish Kumar
Department of Master of Computer Applications, M S Ramaiah Institute of Technology, Bangalore, 54, India
-Quantum computer is no longer a hypothetical idea. It is the worldβs most important technology and there is a race among countries to get supremacy in quantum technology. It is the technology that will reduce the computing time from years to hours or even minutes. The power of quantum computing will be a great support for the scientific community. However, it raises serious threats to cybersecurity. Theoretically, all the cryptography algorithms are vulnerable to attack. The practical quantum computers, when available with millions of qubits capacity, will be able to break nearly all modern public-key cryptographic systems. Before the quantum computers arrive with sufficient βqubitβ capacity, we must be ready with quantum-safe cryptographic algorithms, tools, techniques, and deployment strategies to protect the ICT infrastructure. This paper discusses in detail the global effort for the design, development, and standardization of various quantum-safe cryptography algorithms along with the performance analysis of some of the potential quantum-safe algorithms. Most quantum-safe algorithms need more CPU cycles, higher runtime memory, and a large key size. The objective of the paper is to analyze the feasibility of the various quantum-safe cryptography algorithms.
#postquantumcryptography #postquantum #cryptography
performance analysis
Manish Kumar
Department of Master of Computer Applications, M S Ramaiah Institute of Technology, Bangalore, 54, India
-Quantum computer is no longer a hypothetical idea. It is the worldβs most important technology and there is a race among countries to get supremacy in quantum technology. It is the technology that will reduce the computing time from years to hours or even minutes. The power of quantum computing will be a great support for the scientific community. However, it raises serious threats to cybersecurity. Theoretically, all the cryptography algorithms are vulnerable to attack. The practical quantum computers, when available with millions of qubits capacity, will be able to break nearly all modern public-key cryptographic systems. Before the quantum computers arrive with sufficient βqubitβ capacity, we must be ready with quantum-safe cryptographic algorithms, tools, techniques, and deployment strategies to protect the ICT infrastructure. This paper discusses in detail the global effort for the design, development, and standardization of various quantum-safe cryptography algorithms along with the performance analysis of some of the potential quantum-safe algorithms. Most quantum-safe algorithms need more CPU cycles, higher runtime memory, and a large key size. The objective of the paper is to analyze the feasibility of the various quantum-safe cryptography algorithms.
#postquantumcryptography #postquantum #cryptography
Tags and Topics
Browse our collection to discover more content in these categories.
Video Information
Views
42
Duration
02:03:35
Published
Oct 30, 2025
Related Trending Topics
LIVE TRENDSRelated trending topics. Click any trend to explore more videos.