Public key cryptography is widely used to secure transactions over the Internet. However, advances in quantum computers threaten to undermine the security assumptions upon which currently used public key cryptographic algorithms are based. In this paper, we provide a survey of some of the public key cryptographic algorithms that have been developed that, while not currently in widespread use, are believed to be resistant to quantum computing based attacks and discuss some of the issues that protocol designers may need to consider if there is a need to deploy these algorithms at some point in the future. Categories and Subject Descriptors E.3 [Data]: Data Encryption—Public key cryptosystems General Terms Algorithms, Security Keywords Quantum computers, public key cryptography
Ray A. Perlner, David A. Cooper