CFP last date
20 March 2026
Call for Paper
April Edition
IJCA solicits high quality original research papers for the upcoming April edition of the journal. The last date of research paper submission is 20 March 2026

Submit your paper
Know more
Random Articles
Reseach Article

Post-Quantum Cryptography for IoT Networks: A Survey on PQC Protocols

by Bhaskar Jyoti Sarmah
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 187 - Number 91
Year of Publication: 2026
Authors: Bhaskar Jyoti Sarmah
10.5120/ijca2026926610

Bhaskar Jyoti Sarmah . Post-Quantum Cryptography for IoT Networks: A Survey on PQC Protocols. International Journal of Computer Applications. 187, 91 ( Mar 2026), 19-27. DOI=10.5120/ijca2026926610

@article{ 10.5120/ijca2026926610,
author = { Bhaskar Jyoti Sarmah },
title = { Post-Quantum Cryptography for IoT Networks: A Survey on PQC Protocols },
journal = { International Journal of Computer Applications },
issue_date = { Mar 2026 },
volume = { 187 },
number = { 91 },
month = { Mar },
year = { 2026 },
issn = { 0975-8887 },
pages = { 19-27 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume187/number91/post-quantum-cryptography-for-iot-networks-a-survey-on-pqc-protocols/ },
doi = { 10.5120/ijca2026926610 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2026-03-20T22:55:41.943406+05:30
%A Bhaskar Jyoti Sarmah
%T Post-Quantum Cryptography for IoT Networks: A Survey on PQC Protocols
%J International Journal of Computer Applications
%@ 0975-8887
%V 187
%N 91
%P 19-27
%D 2026
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In the current time, the classical cryptographic systems are used worldwide. Cryptography makes the transmission operation secure and it ensure the basic motivation of security such that availability, integrity, confidentially and non-repudiation. The development of quantum computing algorithm such that Shor’s algorithm rise the threats towards the classical cryptographic infrastructure particularly in public key infrastructure i.e. RSA and ECC. Also, Grover’s algorithm provides the square root time enhancement of searching of keys in the symmetric key cryptography. In this scenario, the fully operation quantum computer will break the classical cryptographic systems, and it is the main reason behind the advancement of post quantum cryptography (PQC). Specially, in the IoT network, the energy constrain end devices have the main issue to implement the strong cryptographic methods to secure the network from quan-tum attacks. The current available cryptographic methods which are quantum resistance in context of IoT network is thoroughly discussed in the paper. Also, key families of PQC algorithms i.e. lattice-based, code-based, multivariate polynomial based, hash-based, and isogeny-based and the NIST standardization of PQC techniques are investigated. This survey will be work as a bridge between deployment of PQC and existing methods of PQC in context of IoT environment.

References
  1. Akbar, A., 2025. Analyzing the Harvest Now, Decrypt Later Threat and Post-Quantum Cryptography Solutions: A Systematic Literature Review. migration, 2, p.10.
  2. Shor, P.W., 1999. Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum com-puter. SIAM review, 41(2), pp.303-332.
  3. Grover, L.K., 1996, July. A fast quantum mechanical algorithm for database search. In Proceedings of the twen-ty-eighth annual ACM symposium on Theory of compu-ting (pp. 212-219).
  4. Bindel, N., Brendel, J., Fischlin, M., Goncalves, B. and Stebila, D., 2019, May. Hybrid key encapsulation mecha-nisms and authenticated key exchange. In International Conference on Post-Quantum Cryptography (pp. 206-226). Cham: Springer International Publishing.
  5. Peikert, C., 2016. A decade of lattice cryptog-raphy. Foundations and TrendsŴ in Theoretical Comput-er Science, 10(4), pp.283-424.
  6. Ducas, L., Lepoint, T., Lyubashevsky, V., Schwabe, P., Seiler, G. and Stehlé, D., 2018. Crystals–dilithium: Digital signatures from module lattices.
  7. Alkim, E., Ducas, L., Pöppelmann, T. and Schwabe, P., 2016. Post-quantum key {Exchange—A} new hope. In 25th USENIX security symposium (USENIX Security 16) (pp. 327-343).
  8. Bernstein, D.J., 2025. Post-quantum cryptography. In Encyclopedia of Cryptography, Security and Priva-cy (pp. 1846-1847). Cham: Springer Nature Switzerland.
  9. National Institute of Standards and Technology (2024) NIST Releases First 3 Finalized Post-Quantum Encryp-tion Standards, 13 August. Available at: https://www.nist.gov/news-events/news/2024/08/nist-releases-first-3-finalized-post-quantum-encryption-standards.
  10. Alagic, G., Alagic, G., Apon, D., Cooper, D., Dang, Q., Dang, T., Kelsey, J., Lichtinger, J., Liu, Y.K., Miller, C. and Moody, D., 2022. Status report on the third round of the NIST post-quantum cryptography standardization pro-cess.
  11. Grassl, M., Langenberg, B., Roetteler, M. and Steinwandt, R., 2016, February. Applying Grover’s algorithm to AES: quantum resource estimates. In International Workshop on Post-Quantum Cryptography (pp. 29-43). Cham: Springer International Publishing.
  12. Erol, V., 2025. Quantum Readiness in Cryptography: A Maturity-Based Framework for Post-Quantum Transition.
  13. Mukhamedovna, A.S., 2024, May. Access Authentication and Key Distribution Using Physically Unclonable Func-tions, with SHA-256 as an Example. In International Workshop on Advanced Information Security Manage-ment and Applications (pp. 12-18). Cham: Springer Na-ture Switzerland.
  14. Brassard, G., Høyer, P. and Tapp, A., 1998, April. Quan-tum cryptanalysis of hash and claw-free functions. In Latin American Symposium on Theoretical Informat-ics (pp. 163-169). Berlin, Heidelberg: Springer Berlin Heidelberg.
  15. Chen, J., Deng, H., Su, H., Yuan, M. and Ren, Y., 2024. Lattice-based threshold secret sharing scheme and its ap-plications: A survey. Electronics, 13(2), p.287.
  16. Nejatollahi, H., Dutt, N., Ray, S., Regazzoni, F., Banerjee, I. and Cammarota, R., 2019. Post-quantum lattice-based cryptography implementations: A survey. ACM Compu-ting Surveys (CSUR), 51(6), pp.1-41.
  17. Ducas, L., Kiltz, E., Lepoint, T., Lyubashevsky, V., Schwabe, P., Seiler, G. and Stehlé, D., 2018. Crystals-dilithium: A lattice-based digital signature scheme. IACR transactions on cryptographic hardware and embedded systems, pp.238-268.
  18. Fouque, P.A., Hoffstein, J., Kirchner, P., Lyubashevsky, V., Pornin, T., Prest, T., Ricosset, T., Seiler, G., Whyte, W. and Zhang, Z., 2018. Falcon: Fast-Fourier lattice-based compact signatures over NTRU. Submission to the NIST’s post-quantum cryptography standardization pro-cess, 36(5), pp.1-75.
  19. Fitzgibbon, G. and Ottaviani, C., 2024. Constrained de-vice performance benchmarking with the implementation of post-quantum cryptography. Cryptography, 8(2), p.21.
  20. Vercauteren, I.F., Roy, S.S., D’Anvers, J.P. and Karmak-ar, A., 2020. SABER: Mod-LWR based KEM (round 3 submission). ProQuest Number: INFORMATION TO ALL USERS, 31657053.
  21. Hoffstein, J., Pipher, J. and Silverman, J.H., 1998, June. NTRU: A ring-based public key cryptosystem. In International algorithmic number theory symposi-um (pp. 267-288). Berlin, Heidelberg: Springer Berlin Heidelberg.
  22. Alagic, G., Bros, M., Ciadoux, P., Cooper, D., Dang, Q., Dang, T., Kelsey, J., Lichtinger, J., Liu, Y.K., Miller, C. and Moody, D., 2025. Status report on the fourth round of the nist post-quantum cryptography standardization process (p. 5). Gaithersburg, MD, USA: US Department of Commerce, National Institute of Standards and Tech-nology.
  23. Ahmed, N., Zhang, L. and Gangopadhyay, A., 2025, August. A survey of post-quantum cryptography support in cryptographic libraries. In 2025 IEEE International Conference on Quantum Computing and Engineering (QCE) (Vol. 1, pp. 906-917). IEEE.
  24. Paul, S., Scheible, P. and Wiemer, F., 2022. Towards post-quantum security for cyber-physical systems: Inte-grating PQC into industrial M2M communication. Journal of Computer Security, 30(4), pp.623-653.
  25. Duraibi, S. and Alashjaee, A.M., 2025. Lightweight Post-Quantum Secure Communication Protocol for IoT Devic-es Using Code-Based Cryptography. IEEE Transactions on Consumer Electronics.
  26. Wang, Y. and Ismail, E.S., 2025. A Review on the ad-vances, applications, and future prospects of post-quantum cryptography in blockchain, IoT. IEEE Access.
  27. Joshi, A., Bhalgat, P., Chavan, P., Chaudhari, T. and Patil, S., 2024, November. Guarding against quantum threats: A survey of post-quantum cryptography standardization, techniques, and current implementations. In International Conference on Applications and Techniques in Infor-mation Security (pp. 33-46). Singapore: Springer Nature Singapore.
  28. GonzÁlez de la Torre, M.A., Encinas, L.H. and GarcÍa, J.S., 2025. Structural analysis of code-based algorithms of the NIST post-quantum call. Logic Journal of the IGPL, 33(5), p.jzae071.
  29. Bernstein, D.J., Chou, T., Lange, T., von Maurich, I., Misoczki, R., Niederhagen, R., Persichetti, E., Peters, C., Schwabe, P., Sendrier, N. and Szefer, J., 2017. Classic McEliece: conservative code-based cryptography. NIST submissions, 1(1), pp.1-25.
  30. Aragon, N., Barreto, P., Bettaieb, S., Bidoux, L., Blazy, O., Deneuville, J.C., Gaborit, P., Ghosh, S., Gueron, S., Güneysu, T. and Melchor, C.A., 2022. BIKE: bit flipping key encapsulation.
  31. Melchor, C.A., Aragon, N., Bettaieb, S., Bidoux, L., Blazy, O., Deneuville, J.C., Gaborit, P., Persichetti, E., Zémor, G. and Bourges, I., 2018. Hamming quasi-cyclic (HQC). NIST PQC Round, 2(4), p.13.
  32. Ding, J. and Schmidt, D., 2005, June. Rainbow, a new multivariable polynomial signature scheme. In International conference on applied cryptography and network security (pp. 164-175). Berlin, Heidelberg: Springer Berlin Heidelberg.
  33. Casanova, A., Faugere, J.C., Macario-Rat, G., Patarin, J., Perret, L. and Ryckeghem, J., 2017. GeMSS: a great mul-tivariate short signature (Doctoral dissertation, UPMC-Paris 6 Sorbonne Universités; INRIA Paris Research Centre, MAMBA Team, F-75012, Paris, France; LIP6-Laboratoire d'Informatique de Paris 6).
  34. Ding, J., Zhang, Z., Deaton, J., Schmidt, K. and Vishakha, F., 2019. New attacks on lifted unbalanced oil vinegar. In the 2nd NIST PQC Standardization Conference (pp. 1-13).
  35. Gligoroski, D., Ødegård, R.S., Jensen, R.E., Perret, L., Faugere, J.C., Knapskog, S.J. and Markovski, S., 2011, November. MQQ-SIG: An ultra-fast and provably CMA resistant digital signature scheme. In International Confer-ence on Trusted Systems (pp. 184-203). Berlin, Heidel-berg: Springer Berlin Heidelberg.
  36. Morales Rivero, X., 2023. Seamless transition to post-quantum resistant: implementing digital signatures for pdf documents Using PQ algorithms (Bachelor's thesis, Universitat Politècnica de Catalunya).
  37. Azarderakhsh, R., Elkhatib, R., Koziel, B. and Langen-berg, B., 2021, September. Hardware deployment of hy-brid PQC: SIKE+ ECDH. In International Conference on Security and Privacy in Communication Systems (pp. 475-491). Cham: Springer International Publishing.
  38. Giron, A.A., do Nascimento, J.P.A., Custódio, R., Perin, L.P. and Mateu, V., 2023, September. Post-quantum hy-brid KEMTLS performance in simulated and real network environments. In International Conference on Cryptology and Information Security in Latin America (pp. 293-312). Cham: Springer Nature Switzerland.
  39. Bernstein, D.J., Hülsing, A., Kölbl, S., Niederhagen, R., Rijneveld, J. and Schwabe, P., 2019, November. The SPHINCS+ signature framework. In Proceedings of the 2019 ACM SIGSAC conference on computer and commu-nications security (pp. 2129-2146).
  40. Hülsing, A., Butin, D., Gazdag, S., Rijneveld, J. and Mo-haisen, A., 2018. XMSS: eXtended Merkle signature scheme (No. rfc8391).
  41. Bagheri, S., Kaveh, M., Hernando-Gallego, F., Martín, D. and Serrano, N., 2025. A Constant-Time Hardware Archi-tecture for the CSIDH Key-Exchange Protocol. arXiv pre-print arXiv:2508.11082.
  42. Costello, C., Longa, P. and Naehrig, M., 2016, July. Effi-cient algorithms for supersingular isogeny Diffie-Hellman. In Annual international cryptology conference (pp. 572-601). Berlin, Heidelberg: Springer Berlin Heidelberg.
  43. Azarderakhsh, R., Campagna, M., Costello, C., Feo, L., Hess, B., Jalali, A., Jao, D., Koziel, B., LaMacchia, B. and Longa, P., 2017. SIKE–Supersingular Isogeny Key En-capsulation. URL: https://sike. org.
  44. Felderhoff, J., 2019. Hard homogenous spaces and commutative supersingular isogeny based diffie-hellman (Doctoral dissertation, LIX, Ecole polytechnique; ENS de Lyon).
  45. Costello, C., 2020, December. B-SIDH: supersingular isogeny Diffie-Hellman using twisted torsion. In International Conference on the Theory and Applica-tion of Cryptology and Information Security (pp. 440-463). Cham: Springer International Publishing.
  46. Singh, M., Sood, S.K. and Bhatia, M., 2025. Post-quantum cryptography: a review on cryptographic solu-tions for the era of quantum computing. Archives of Com-putational Methods in Engineering, pp.1-42.
  47. Qi, M. and Chen, C., 2025. Hpqke: Hybrid post-quantum key exchange protocol for ssh transport layer from csidh. IEEE Transactions on Information Forensics and Security.
  48. Lee, Y., Youn, J., Nam, K., Jung, H.H., Cho, M., Na, J., Park, J.Y., Jeon, S., Kang, B.G., Oh, H. and Paek, Y., 2024. An efficient hardware/software co-design for FAL-CON on low-end embedded systems. IEEE Access, 12, pp.57947-57958.
  49. Liu, T., Ramachandran, G. and Jurdak, R., 2024. Post-quantum cryptography for internet of things: a survey on performance and optimization. arXiv preprint arXiv:2401.17538.
  50. Kuznetsov, O., Kandiy, S., Frontoni, E. and Smirnov, O., 2023, October. Trade-offs in Post-Quantum Cryptog-raphy: A Comparative Assessment of BIKE, HQC, and Classic McEliece. In CQPC (pp. 1-11).
  51. Egbuagha, O. and Ikwunna, E., 2025. Post-quantum cryp-tography in practice: A literature review of protocol-level transitions and readiness. Cryptology ePrint Archive.
  52. Rahmati, M. and Rahmati, N., 2025. Lightweight post-quantum cryptographic frameworks for real-time secure communications in IoT edge net-works. Telecommunication Systems, 88(4), p.136.
  53. Almutairi, M. and Sheldon, F.T., 2025. Resilience of Post-Quantum Cryptography in Lightweight IoT Proto-cols: A Systematic Review. Eng, 6(12), p.346.
  54. Ramakrishna, D. and Shaik, M.A., 2025. PSESV: A hy-brid post-quantum encryption Framework with real-time thermal and EM side-channel attack detection. Ain Shams Engineering Journal, 16(12), p.103776.
Index Terms

Computer Science
Information Sciences

Keywords

IoT Security Post-Quantum Cryptography (PQC) Lattice-based Cryptography Cryptanalysis NIST PQC standardiza-tion.