Authors :
Utkarsh Barde; Twara Parekh
Volume/Issue :
Volume 10 - 2025, Issue 3 - March
Google Scholar :
https://tinyurl.com/mpwn48nk
Scribd :
https://tinyurl.com/2yu7x7mu
DOI :
https://doi.org/10.38124/ijisrt/25mar1393
Note : A published paper may take 4-5 working days from the publication date to appear in PlumX Metrics, Semantic Scholar, and ResearchGate.
Abstract :
As quantum computing gains traction, classical forms of encryption such as RSA and ECC may be rendered
obsolete. To remain ahead, we must have more robust security measures—and that is where lattice-based cryptography
steps in. This work examines how it is possible to use Kyber (for key exchange securely) and CRYSTALS-DILITHIUM (for
digital signatures) in JavaScript, making quantum-resistant security accessible for web applications. We deconstruct major
concepts, detail actual implementation techniques, and consider performance trade-offs, illustrating how developers can pre-
empt their systems against the dangers of quantum.
Keywords :
Lattice Cryptography, Post-Quantum Security, Kyber, CRYSTALS-DILITHIUM, JavaScript, Quantum-Resistant Encryption, Digital Signatures, Key Exchange, Web Security, Cryptographic Implementation.
References :
- PQCkemKAT. "PQCkemKAT_3168.rsp", https://www.nist.gov/ (Accessed: March 2025)
- Jian Guo, Zhenfei Zhang, and Xiongfeng Liang, "Kyber: A Post-Quantum Key Exchange Protocol," IEEE Transactions on Information Forensics and Security, 2020.
- Laarhoven, T. (2021). "Lattice-Based Cryptography," Springer Handbook of Cryptography, pp. 431-480.
- NIST Post-Quantum Cryptography Standardization. National Institute of Standards and Technology (NIST). "Post-Quantum Cryptography," NIST, https://csrc.nist.gov/projects/post-quantum- cryptography.R. Nicole, “Title of paper with only first word capitalized,” J. Name Stand. Abbrev., in press.
- Brakerski, Z., & Vaikuntanathan, V. (2011). "Fully Homomorphic Encryption from Ring-LWE and Security for Key Dependent Messages," Proceedings of the 52nd Annual IEEE Symposium on Foundations of Computer Science (FOCS)
As quantum computing gains traction, classical forms of encryption such as RSA and ECC may be rendered
obsolete. To remain ahead, we must have more robust security measures—and that is where lattice-based cryptography
steps in. This work examines how it is possible to use Kyber (for key exchange securely) and CRYSTALS-DILITHIUM (for
digital signatures) in JavaScript, making quantum-resistant security accessible for web applications. We deconstruct major
concepts, detail actual implementation techniques, and consider performance trade-offs, illustrating how developers can pre-
empt their systems against the dangers of quantum.
Keywords :
Lattice Cryptography, Post-Quantum Security, Kyber, CRYSTALS-DILITHIUM, JavaScript, Quantum-Resistant Encryption, Digital Signatures, Key Exchange, Web Security, Cryptographic Implementation.