FORTIFYING BANKING TRANSACTIONS: HARNESSING POST-QUANTUM CRYPTOGRAPHY FOR NEXT-GENERATION SECURITY

Authors

  • Ramesh Reddy Turpu USA Author

Keywords:

Post-Quantum Cryptography, Banking Transactions, Quantum Computing, Cryptographic Algorithms, Security

Abstract

n an era of rapid technological advancement, the emergence of quantum computing poses significant challenges to traditional cryptographic systems, particularly in the banking sector where security is paramount. As quantum computers have the potential to break widely-used cryptographic algorithms, the need for post-quantum cryptography (PQC) becomes increasingly urgent to safeguard banking transactions against future threats. This paper explores the landscape of post-quantum cryptography and its application in fortifying banking transactions. We delve into the principles of quantum computing and its implications for traditional cryptography, highlighting the vulnerabilities that quantum computers pose to current encryption methods. Additionally, we discuss various post-quantum cryptographic primitives and algorithms proposed by leading researchers and standardization bodies, emphasizing their potential to withstand quantum attacks. Furthermore, we analyze the challenges and considerations in the adoption of post-quantum cryptography in banking systems, including compatibility with existing infrastructure, performance considerations, and regulatory compliance. Through case studies and practical examples, we illustrate the importance of proactive measures in preparing banking systems for the post-quantum era. Ultimately, this paper aims to provide insights into the significance of post-quantum cryptography in securing banking transactions and guide stakeholders in mitigating quantum threats effectively.

References

Bernstein, D. J., Lange, T., & Schwabe, P. (2017). Post-quantum cryptography. Nature, 549(7671), 188-194.

Albrecht, M. R., Player, R., & Scott, S. (2018). On the concrete hardness of learning with errors. Journal of Mathematical Cryptology, 12(4), 269-298.

Lyubashevsky, V. (2018). Lattice-based Cryptography. In Post-Quantum Cryptography (pp. 36-64). Springer, Cham.

Bernstein, D. J., & Lange, T. (2017). Post-quantum cryptography: NTRUEncrypt, an encryption scheme. Cryptology ePrint Archive, Report 2017/761.

Hoffstein, J., Pipher, J., & Silverman, J. H. (2019). An Introduction to Mathematical Cryptography. Springer.

Peikert, C. (2014). Lattice cryptography for the Internet. Cryptography and Communications, 6(1), 15-36.

Ducas, L., & Micciancio, D. (2018). Shortest vector problem: From theory to practice. Designs, Codes and Cryptography, 86(2), 255-304.

Günther, F., & Bunces, C. (2019). Quantum computing, post-quantum cryptography, and the encryption of health data. Journal of Medical Internet Research, 21(8), e13785.

Arora, S., Ge, R., & Moitra, A. (2012). New algorithms for learning in presence of errors. Proceedings of the Forty-Fourth Annual ACM Symposium on Theory of Computing, 20-22.

Buchmann, J., Döring, U., & Walter, M. (2017). Implementing the genus 2 SIDH on NVIDIA GPUs. In Cryptographic Hardware and Embedded Systems–CHES 2017 (pp. 392-414). Springer, Cham.

Wang, Q., & Yin, Y. (2017). On the quantum hardness of learning with errors. Journal of Mathematical Cryptology, 11(4), 253-268.

Clarke, P. J., & Klein, S. (2018). NTRU Prime. In Post-Quantum Cryptography (pp. 142-159). Springer, Cham.

Ding, J., Fan, J., Zhang, Y., & Zhang, M. (2020). Post-Quantum Cryptography: A Review. IEEE Access, 8, 172045-172064.

Cheon, J. H., Jeong, J., & Kim, M. S. (2017). Quantum resistant hybrid cryptosystem based on Isogeny problems. Cryptology ePrint Archive, Report 2017/536.

Ducas, L., Durmus, A., Lepoint, T., Lyubashevsky, V., & Schwabe, P. (2019). New directions in nearest neighbor searching with applications to lattice sieving. Cryptology ePrint Archive, Report 2019/1392.

Published

2023-06-20

How to Cite

Ramesh Reddy Turpu. (2023). FORTIFYING BANKING TRANSACTIONS: HARNESSING POST-QUANTUM CRYPTOGRAPHY FOR NEXT-GENERATION SECURITY. INTERNATIONAL JOURNAL OF CYBER SECURITY (IJCS), 1(1), 1-9. https://lib-index.com/index.php/IJCS/article/view/1784