Quantum-Resistant Authentication using Lattice- Based Cryptography


Authors : Utkarsh Barde; Twara Parekh

Volume/Issue : Volume 10 - 2025, Issue 3 - March


Google Scholar : https://tinyurl.com/mpwn48nk

Scribd : https://tinyurl.com/2yu7x7mu

DOI : https://doi.org/10.38124/ijisrt/25mar1393

Google Scholar

Note : A published paper may take 4-5 working days from the publication date to appear in PlumX Metrics, Semantic Scholar, and ResearchGate.

Note : Google Scholar may take 15 to 20 days to display the article.


Abstract : As quantum computing gains traction, classical forms of encryption such as RSA and ECC may be rendered obsolete. To remain ahead, we must have more robust security measures—and that is where lattice-based cryptography steps in. This work examines how it is possible to use Kyber (for key exchange securely) and CRYSTALS-DILITHIUM (for digital signatures) in JavaScript, making quantum-resistant security accessible for web applications. We deconstruct major concepts, detail actual implementation techniques, and consider performance trade-offs, illustrating how developers can pre- empt their systems against the dangers of quantum.

Keywords : Lattice Cryptography, Post-Quantum Security, Kyber, CRYSTALS-DILITHIUM, JavaScript, Quantum-Resistant Encryption, Digital Signatures, Key Exchange, Web Security, Cryptographic Implementation.

References :

  1. PQCkemKAT. "PQCkemKAT_3168.rsp", https://www.nist.gov/ (Accessed: March 2025)
  2. Jian Guo, Zhenfei Zhang, and Xiongfeng Liang, "Kyber: A Post-Quantum Key Exchange Protocol," IEEE Transactions on Information Forensics and Security, 2020.
  3. Laarhoven, T. (2021). "Lattice-Based Cryptography," Springer Handbook of Cryptography, pp. 431-480.
  4. NIST Post-Quantum Cryptography Standardization. National Institute of Standards and Technology (NIST). "Post-Quantum   Cryptography,"    NIST, https://csrc.nist.gov/projects/post-quantum- cryptography.R. Nicole, “Title of paper with only first word capitalized,” J. Name Stand. Abbrev., in press.
  5. Brakerski, Z., & Vaikuntanathan, V. (2011). "Fully Homomorphic Encryption from Ring-LWE and Security for Key Dependent Messages," Proceedings of the 52nd Annual IEEE Symposium on Foundations of Computer Science (FOCS)

As quantum computing gains traction, classical forms of encryption such as RSA and ECC may be rendered obsolete. To remain ahead, we must have more robust security measures—and that is where lattice-based cryptography steps in. This work examines how it is possible to use Kyber (for key exchange securely) and CRYSTALS-DILITHIUM (for digital signatures) in JavaScript, making quantum-resistant security accessible for web applications. We deconstruct major concepts, detail actual implementation techniques, and consider performance trade-offs, illustrating how developers can pre- empt their systems against the dangers of quantum.

Keywords : Lattice Cryptography, Post-Quantum Security, Kyber, CRYSTALS-DILITHIUM, JavaScript, Quantum-Resistant Encryption, Digital Signatures, Key Exchange, Web Security, Cryptographic Implementation.

Never miss an update from Papermashup

Get notified about the latest tutorials and downloads.

Subscribe by Email

Get alerts directly into your inbox after each post and stay updated.
Subscribe
OR

Subscribe by RSS

Add our RSS to your feedreader to get regular updates from us.
Subscribe