Comparison of cryptographic schemes
Cryptographic Algorithm |
Type |
Purpose |
Quantum Safe? |
Available Now? |
RSA, ECDSA |
Asymmetric |
Key Establishment, Signatures |
No |
Yes |
AES-GCM |
Symmetric |
Encryption |
Larger Key Sizes Needed |
Yes |
SHA-3 |
- |
Hash Function |
Larger Output Needed |
Yes |
Post Quantum Cryptography |
Public |
Encryption, Key Establishment, Signatures |
Yes |
No |
Quantum Key Distribution |
Symmetric |
Key Generation |
Yes |
Yes |
References:
Quantum Computing: Progress and Prospects Sect 4.1.1, 4.1.4, National Academies of Sciences, Engineering, and Medicine 2019
The Impact of Quantum Computing on Present Cryptography, Vasileios Mavroeidis et. al. IJACSA, 9(3), 405-414, 2018