{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T18:22:45Z","timestamp":1775067765273,"version":"3.50.1"},"reference-count":38,"publisher":"MDPI AG","issue":"12","license":[{"start":{"date-parts":[[2023,6,6]],"date-time":"2023-06-06T00:00:00Z","timestamp":1686009600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"the European University of Atlantics"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>Recent developments in quantum computing have shed light on the shortcomings of the conventional public cryptosystem. Even while Shor\u2019s algorithm cannot yet be implemented on quantum computers, it indicates that asymmetric key encryption will not be practicable or secure in the near future. The NIST has started looking for a post-quantum encryption algorithm that is resistant to the development of future quantum computers as a response to this security concern. The current focus is on standardizing asymmetric cryptography that should be impenetrable by a quantum computer. This has become increasingly important in recent years. Currently, the process of standardizing asymmetric cryptography is coming very close to being finished. This study evaluated the performance of two PQC algorithms, both of which were selected as NIST fourth-round finalists. The research assessed the key generation, encapsulation, and decapsulation operations, providing insights into their efficiency and suitability for real-world applications. Further research and standardization efforts are required to enable secure and efficient post-quantum encryption. When selecting appropriate post-quantum encryption algorithms for specific applications, factors such as security levels, performance requirements, key sizes, and platform compatibility should be taken into account. This paper provides helpful insight for post-quantum cryptography researchers and practitioners, assisting in the decision-making process for selecting appropriate algorithms to protect confidential data in the age of quantum computing.<\/jats:p>","DOI":"10.3390\/s23125379","type":"journal-article","created":{"date-parts":[[2023,6,7]],"date-time":"2023-06-07T02:02:15Z","timestamp":1686103335000},"page":"5379","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":25,"title":["Resilience Optimization of Post-Quantum Cryptography Key Encapsulation Algorithms"],"prefix":"10.3390","volume":"23","author":[{"given":"Sana","family":"Farooq","sequence":"first","affiliation":[{"name":"Department of Computer Science, University of Engineering & Technology (UET), Lahore 54890, Pakistan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6446-4945","authenticated-orcid":false,"given":"Ayesha","family":"Altaf","sequence":"additional","affiliation":[{"name":"Department of Computer Science, University of Engineering & Technology (UET), Lahore 54890, Pakistan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5536-8764","authenticated-orcid":false,"given":"Faiza","family":"Iqbal","sequence":"additional","affiliation":[{"name":"Department of Computer Science, University of Engineering & Technology (UET), Lahore 54890, Pakistan"}]},{"given":"Ernesto Bautista","family":"Thompson","sequence":"additional","affiliation":[{"name":"Higher Polytechnic School, Universidad Europea del Atl\u00e1ntico, Isabel Torres 21, 39011 Santander, Spain"},{"name":"Department of Project Management, Universidad Internacional Iberoamericana, Campeche 24560, Mexico"},{"name":"Project Management, Universidad Internacional Iberoamericana, Arecibo, PR 00613, USA"}]},{"given":"Debora Libertad Ram\u00edrez","family":"Vargas","sequence":"additional","affiliation":[{"name":"Higher Polytechnic School, Universidad Europea del Atl\u00e1ntico, Isabel Torres 21, 39011 Santander, Spain"},{"name":"Department of Project Management, Universidad Internacional Iberoamericana, Campeche 24560, Mexico"},{"name":"Universidade Internacional do Cuanza, Estrada Nacional 250, Bairro Kaluapanda, Cuito EN250, Angola"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3134-7720","authenticated-orcid":false,"given":"Isabel de la Torre","family":"D\u00edez","sequence":"additional","affiliation":[{"name":"Department of Signal Theory, Communications and Telematics Engineering, Unviersity of Valladolid, Paseo de Bel\u00e9n, 15, 47011 Valladolid, Spain"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8271-6496","authenticated-orcid":false,"given":"Imran","family":"Ashraf","sequence":"additional","affiliation":[{"name":"Department of Information and Communication Engineering, Yeungnam University, Gyeongsan 38541, Republic of Korea"}]}],"member":"1968","published-online":{"date-parts":[[2023,6,6]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","unstructured":"Lakshmi, P.S., and Murali, G. (2017, January 1\u20132). Comparison of classical and quantum cryptography using QKD simulator. Proceedings of the 2017 International Conference on Energy, Communication, Data Analytics and Soft Computing (ICECDS), Chennai, India.","DOI":"10.1109\/ICECDS.2017.8390120"},{"key":"ref_2","first-page":"1372","article-title":"Analysis of cryptography: Classical verses quantum cryptography","volume":"3","author":"Patil","year":"2016","journal-title":"Int. Res. J. Eng. Technol."},{"key":"ref_3","unstructured":"Roush, W. (2023, February 07). The Google-IBM Quantum Supremacy Fued. Available online: https:\/\/www.technologyreview.com\/2020\/02\/26\/905777\/google-ibm-quantum-supremacy-computing-feud\/."},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"505","DOI":"10.1038\/s41586-019-1666-5","article-title":"Quantum supremacy using a programmable superconducting processor","volume":"574","author":"Arute","year":"2019","journal-title":"Nature"},{"key":"ref_5","doi-asserted-by":"crossref","unstructured":"Prantl, T., Prantl, D., Bauer, A., Iffl\u00e4nder, L., Dmitrienko, A., Kounev, S., and Krupitzer, C. (2021, January 29\u201331). Benchmarking of pre-and post-quantum group encryption schemes with focus on IoT. Proceedings of the 2021 IEEE International Performance, Computing, and Communications Conference (IPCCC), Austin, TX, USA.","DOI":"10.1109\/IPCCC51483.2021.9679365"},{"key":"ref_6","doi-asserted-by":"crossref","unstructured":"Sikeridis, D., Kampanakis, P., and Devetsikiotis, M. (2020, January 1\u20134). Assessing the overhead of post-quantum cryptography in TLS 1.3 and SSH. Proceedings of the 16th International Conference on emerging Networking Experiments and Technologies, Barcelona, Spain.","DOI":"10.1145\/3386367.3431305"},{"key":"ref_7","doi-asserted-by":"crossref","unstructured":"Razaghpanah, A., Niaki, A.A., Vallina-Rodriguez, N., Sundaresan, S., Amann, J., and Gill, P. (2017, January 12\u201315). Studying TLS usage in Android apps. Proceedings of the 13th International Conference on emerging Networking Experiments and Technologies, Incheon, Republic of Korea.","DOI":"10.1145\/3143361.3143400"},{"key":"ref_8","unstructured":"(2023, January 19). Google Transparency Report\u2014HTTPS Encryption on the Web. Available online: https:\/\/transparencyreport.google.com\/https\/overview."},{"key":"ref_9","unstructured":"ANSI (2005). Public Key Cryptography for the Financial Services Industry: The Elliptic Curve Digital Signature Algorithm (ECDSA), American National Standards Institute. X9-Financial Services."},{"key":"ref_10","unstructured":"(2023, January 19). ECDSA: The Digital Signature Algorithm of a Better Internet. Available online: https:\/\/blog.cloudflare.com\/ecdsa-the-digital-signature-algorithm-of-a-better-internet."},{"key":"ref_11","doi-asserted-by":"crossref","unstructured":"Hosoyamada, A., and Sasaki, Y. (2023, January 25). Quantum Collision Attacks on Reduced SHA-256 and SHA-512. Cryptology ePrint Archive, Paper 2021\/292. Available online: https:\/\/eprint.iacr.org\/2021\/292.","DOI":"10.1007\/978-3-030-84242-0_22"},{"key":"ref_12","doi-asserted-by":"crossref","unstructured":"Sikeridis, D., Kampanakis, P., and Devetsikiotis, M. (2020, January 23\u201326). Post-Quantum Authentication in TLS 1.3: A Performance Study. Proceedings of the Network and Distributed Systems Security (NDSS) Symposium 2020, San Diego, CA, USA.","DOI":"10.14722\/ndss.2020.24203"},{"key":"ref_13","doi-asserted-by":"crossref","unstructured":"Tasopoulos, G., Li, J., Fournaris, A.P., Zhao, R.K., Sakzad, A., and Steinfeld, R. (2022, January 23\u201325). Performance Evaluation of Post-Quantum TLS 1.3 on Resource-Constrained Embedded Systems. Proceedings of the ISPEC 2022: International Conference on Information Security Practice and Experience, Taipei, Taiwan.","DOI":"10.1007\/978-3-031-21280-2_24"},{"key":"ref_14","doi-asserted-by":"crossref","unstructured":"Raavi, M., Wuthier, S., Chandramouli, P., Balytskyi, Y., Zhou, X., and Chang, S.Y. (2021, January 21\u201324). Security comparisons and performance analyses of post-quantum signature algorithms. Proceedings of the International Conference on Applied Cryptography and Network Security, Kamakura, Japan.","DOI":"10.1007\/978-3-030-78375-4_17"},{"key":"ref_15","doi-asserted-by":"crossref","unstructured":"Alagic, G., Alperin-Sheriff, J., Apon, D., Cooper, D., Dang, Q., Kelsey, J., Liu, Y.K., Miller, C., Moody, D., and Peralta, R. (2020). Status Report on the Second Round of the NIST Post-Quantum Cryptography Standardization Process, US Department of Commerce, NIST.","DOI":"10.6028\/NIST.IR.8240"},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"433","DOI":"10.22331\/q-2021-04-15-433","article-title":"How to factor 2048 bit RSA integers in 8 h using 20 million noisy qubits","volume":"5","author":"Gidney","year":"2021","journal-title":"Quantum"},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"303","DOI":"10.1137\/S0036144598347011","article-title":"Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer","volume":"41","author":"Shor","year":"1999","journal-title":"SIAM Rev."},{"key":"ref_18","unstructured":"Merkle, R.C. (1989, January 10\u201313). A certified digital signature. Proceedings of the CRYPTO 1989: Advances in Cryptology\u2014CRYPTO\u201989 Proceedings, Houthalen, Belgium."},{"key":"ref_19","doi-asserted-by":"crossref","unstructured":"Ajtai, M. (1996, January 22\u201324). Generating hard instances of lattice problems. Proceedings of the Twenty-Eighth Annual ACM Symposium on Theory of Computing, Philadelphia, PA, USA.","DOI":"10.1145\/237814.237838"},{"key":"ref_20","unstructured":"Moody, D. (2018, January 11\u201313). Let\u2019s get ready to rumble. the nist pqc competition. Proceedings of the First PQC Standardization Conference, Fort Lauderdale, FL, USA."},{"key":"ref_21","unstructured":"Churi, J.D. (2022, December 15). Post-Quantum Encryption Benchmark. Available online: https:\/\/digitalcommons.calpoly.edu\/eesp\/500\/."},{"key":"ref_22","doi-asserted-by":"crossref","unstructured":"D\u00f6ring, R., and Geitz, M. (2022, January 25\u201329). Post-Quantum Cryptography in Use: Empirical Analysis of the TLS Handshake Performance. Proceedings of the NOMS 2022\u20132022 IEEE\/IFIP Network Operations and Management Symposium, Budapest, Hungary.","DOI":"10.1109\/NOMS54207.2022.9789913"},{"key":"ref_23","doi-asserted-by":"crossref","unstructured":"Strand, M. (2021, January 4\u20135). A Status Update on Quantum Safe Cryptography. Proceedings of the 2021 International Conference on Military Communication and Information Systems (ICMCIS), The Hague, The Netherlands.","DOI":"10.1109\/ICMCIS52405.2021.9486413"},{"key":"ref_24","doi-asserted-by":"crossref","unstructured":"Alagic, G., Apon, D., Cooper, D., Dang, Q., Dang, T., Kelsey, J., Lichtinger, J., Miller, C., Moody, D., and Peralta, R. (2022). Status Report on the Third Round of the NIST Post-Quantum Cryptography Standardization Process, US Department of Commerce, NIST.","DOI":"10.6028\/NIST.IR.8413-upd1"},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"51","DOI":"10.1049\/ip-ifs:20060017","article-title":"Cryptanalysis of Pomaranch","volume":"153","author":"Cid","year":"2006","journal-title":"IEE Proc. Inf. Secur."},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"139112","DOI":"10.1007\/s11432-018-9522-6","article-title":"Ciphertext-only fault analysis on the Midori lightweight cryptosystem","volume":"63","author":"Li","year":"2020","journal-title":"Sci. China Inf. Sci."},{"key":"ref_27","doi-asserted-by":"crossref","unstructured":"Aghaie, A., Kermani, M.M., and Azarderakhsh, R. (2016, January 11\u201314). Fault diagnosis schemes for secure lightweight cryptographic block cipher RECTANGLE benchmarked on FPGA. Proceedings of the 2016 IEEE International Conference on Electronics, Circuits and Systems (ICECS), Monte Carlo, Monaco.","DOI":"10.1109\/ICECS.2016.7841315"},{"key":"ref_28","doi-asserted-by":"crossref","unstructured":"Ramezanpour, K., Ampadu, P., and Diehl, W. (2019, January 5\u201310). A Statistical Fault Analysis Methodology for the Ascon Authenticated Cipher. Proceedings of the 2019 IEEE International Symposium on Hardware Oriented Security and Trust (HOST), McLean, VA, USA.","DOI":"10.1109\/HST.2019.8741029"},{"key":"ref_29","unstructured":"(2023, May 29). Lightweight Cryptography Standardization Process: NIST Selects Ascon, Available online: https:\/\/csrc.nist.gov\/News\/2023\/lightweight-cryptography-nist-selects-ascon."},{"key":"ref_30","unstructured":"Dekhuijzen, L., Liang, K., and Chen, H. (2023, May 20). A Comparison of Code-Based Cryptosystems. Available online: http:\/\/resolver.tudelft.nl\/uuid:32a102cb-bb48-4f95-8a80-c687700d0443."},{"key":"ref_31","unstructured":"(2023, January 19). BIKE\u2014Bit Flipping Key Encapsulation. Available online: https:\/\/bikesuite.org."},{"key":"ref_32","unstructured":"McEliece, R.J. (2023, May 20). A Public Key Cryptosystem Based on Algebraic Coding Theory, Available online: https:\/\/ntrs.nasa.gov\/api\/citations\/19780016269\/downloads\/19780016269.pdf#page=123."},{"key":"ref_33","unstructured":"(2023, January 19). Classic McEliece: Introduction. Available online: https:\/\/classic.mceliece.org\/."},{"key":"ref_34","doi-asserted-by":"crossref","unstructured":"van Tilborg, H.C.A., and Jajodia, S. (2011). Encyclopedia of Cryptography and Security, Springer.","DOI":"10.1007\/978-1-4419-5906-5"},{"key":"ref_35","unstructured":"(2023, May 20). Power Analysis. Available online: https:\/\/en.wikipedia.org\/wiki\/Power_analysis."},{"key":"ref_36","unstructured":"Rescorla, E. (2023, May 12). The Transport Layer Security (TLS) Protocol Version 1.3. Technical Report. Available online: https:\/\/www.rfc-editor.org\/rfc\/rfc8446."},{"key":"ref_37","unstructured":"(2023, January 19). OQS Project. Liboqs. Available online: https:\/\/github.com\/open-quantum-safe\/liboqs."},{"key":"ref_38","unstructured":"(2023, January 19). OQS Project. OQS OpenSSL. Available online: https:\/\/github.com\/open-quantum-safe\/openssl."}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/23\/12\/5379\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T19:49:27Z","timestamp":1760125767000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/23\/12\/5379"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,6,6]]},"references-count":38,"journal-issue":{"issue":"12","published-online":{"date-parts":[[2023,6]]}},"alternative-id":["s23125379"],"URL":"https:\/\/doi.org\/10.3390\/s23125379","relation":{},"ISSN":["1424-8220"],"issn-type":[{"value":"1424-8220","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,6,6]]}}}