Comparative Analysis of Classical and Post-Quantum Cryptographic Methods for Secure Digital Signature Implementation in the Quantum Era

Rayasa Puringgar Prasadha Putra, H.A. Danang Rimbawa, Bisyron Wahyudi

Abstract


Rapid improvements in quantum computing have posed substantial hurdles to conventional cryptography systems, which depend on the computational intractability of resolving intricate mathematical issues. Digital signatures, fundamental to data security, guarantee the authenticity and integrity of digital communications. Nevertheless, traditional cryptography techniques, like RSA and ECC, are becoming more susceptible to quantum attacks owing to the substantial computing capabilities of quantum computers. Post-Quantum Cryptography (PQC) has developed as a crucial domain dedicated to the creation of quantum-resistant algorithms that can endure these dangers. This research examines the relative efficacy of conventional and quantum cryptography techniques, concentrating on the processes of digital signature creation and validation. Experimental findings underscore the trade-offs between the two methodologies regarding computing efficiency and security strength. Although classical cryptography has superior execution speeds, it is deficient in the robustness necessary to withstand quantum assaults. In contrast, PQC approaches, although somewhat more resource-demanding, provide superior security via sophisticated algorithms like lattice-based, hash-based, and multivariate polynomial cryptography. The research demonstrates that PQC mitigates the weaknesses of conventional cryptographic systems while providing a scalable and pragmatic solution for secure communication in the quantum age. This study underscores the need for ongoing research and enhancement of PQC approaches to augment their computing efficiency and facilitate smooth incorporation into current infrastructures. The results provide an essential foundation for the shift to quantum-resistant encryption, safeguarding sensitive information in a swiftly changing digital environment.

Keywords


Quantum Cryptography, Digital Signature, Data Security, Data Integrity, Information Systems

Full Text:

PDF

References


Alahmadi, A., Çalkavur, S., Solé, P., Khan, A. N., Raza, M., & Aggarwal, V. (2023). A New Code Based Signature Scheme for Blockchain Technology. Mathematics, 11, 1177. https://doi.org/10.3390/math11051177

Ali, Z. A., Atia, T. S., Yousuf, A. Y., & Khahdim, A. J. (2024). A comprehensive review of quantum image encryption methods: design characteristics, cryptographic properties, and AI integration. Quantum Information Processing, 23(10), 335. https://doi.org/10.1007/s11128-024-04563-y

Cooper, D. A., Apon, D. C., Dang, Q. H., Davidson, M. S., Dworkin, M. J., & Miller, C. A. (2020). Recommendation for Stateful Hash-Based Signature Schemes. https://doi.org/10.6028/NIST.SP.800-208

Durr-E-Shahwar, Imran, M., Altamimi, A. B., Khan, W., Hussain, S., & Alsaffar, M. (2024). Quantum Cryptography for Future Networks Security: A Systematic Review. IEEE Access, 12, 180048–180078. https://doi.org/10.1109/ACCESS.2024.3504815

Hattenbach, H. (2021). Quantum-resistant digital signatures schemes for low-power IoT. https://doi.org/10.48550/arXiv.2106.11710

Kuznetsov, O., Kiian, A., Babenko, V., Perevozova, I., Chepurko, I., & Oleksii, S. (2020). New Approach to the Implementation of Post-Quantum Digital Signature Scheme. 166–171. https://doi.org/10.1109/DESSERT50317.2020.9125053

Mitra, S., Jana, B., Bhattacharya, S., Pal, P., & Poray, J. (2017). Quantum cryptography: Overview, security issues and future challenges. 2017 4th International Conference on Opto-Electronics and Applied Optics (Optronix), 1–7. https://doi.org/10.1109/OPTRONIX.2017.8350006

Moskvin, V. S. (2022). Post-Quantum Digital Signatures in Transport Documents. 2022 Intelligent Technologies and Electronic Devices in Vehicle and Road Transport Complex (TIRVED), 1–5. https://doi.org/10.1109/TIRVED56496.2022.9965491

Sahu, S. K., & Mazumdar, K. (2024). State-of-the-art analysis of quantum cryptography: applications and future prospects. In Frontiers in Physics (Vol. 12). Frontiers Media SA. https://doi.org/10.3389/fphy.2024.1456491

Sargiotis, D. (2024). Data Security and Privacy: Protecting Sensitive Information. In Data Governance: A Guide (pp. 217–245). Springer Nature Switzerland. https://doi.org/10.1007/978-3-031-67268-2_6

Shajahan, R., Jain, K., & Krishnan, P. (2024). A Survey on NIST 3 rd Round Post Quantum Digital Signature Algorithms. 132–140. https://doi.org/10.1109/ICMCSI61536.2024.00027

Shim, K.-A. (2022). A Survey on Post-Quantum Public-Key Signature Schemes for Secure Vehicular Communications. Trans. Intell. Transport. Sys., 23(9), 14025–14042. https://doi.org/10.1109/TITS.2021.3131668

Templ, M., & Sariyar, M. (2022). A systematic overview on methods to protect sensitive data provided for various analyses. International Journal of Information Security, 21(6), 1233–1246. https://doi.org/10.1007/s10207-022-00607-5

Tripathi, T., Awasthi, A., Singh, S. P., & Chaturvedi, A. (2024). Post Quantum Cryptography and its Comparison with Classical Cryptography. https://arxiv.org/abs/2403.19299

Vasiliev, A. (2016). Quantum Hashing for Finite Abelian Groups. http://arxiv.org/abs/1603.02209

Xin, X., Wang, Z., He, Q., Yang, Q., & Li, F. (2019). New Public-key Quantum Signature Scheme with Quantum One-Way Function. International Journal of Theoretical Physics, 58(10), 3282–3294. https://doi.org/10.1007/s10773-019-04203-7

Xin, X., Yang, Q., & Li, F. (2020). Quantum public-key signature scheme based on asymmetric quantum encryption with trapdoor information. Quantum Information Processing, 19(8), 233. https://doi.org/10.1007/s11128-020-02736-z




DOI: http://dx.doi.org/10.52155/ijpsat.v48.2.6923

Refbacks

  • There are currently no refbacks.


Copyright (c) 2025 Rayasa Puringgar Prasadha Putra

Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 International License.