Submitted:
26 December 2025
Posted:
29 December 2025
You are already at the latest version
Abstract
Keywords:
1. Introduction
1.1. Objectives
- To introduce the theoretical concepts of quantum computing;
- To introduce asymmetric cryptography;
- Address the existing problem associated with quantum computing and cryptography, as well as the central issue arising from quantum algorithmic development;
- Present a proposed applied solution;
- Present the conclusions and limitations of the study;
- Promote a prospective methodological approach that allows for the anticipation of risk scenarios, combining academic rigor with practical applicability;
- Promote a prospective methodological approach that allows for the anticipation of risk scenarios, combining academic rigor with practical applicability;
- Contribute to the scientific advancement of information security by providing a conceptual and operational framework that supports decision-making in contexts of technological uncertainty;
- Contribute to the scientific debate regarding the post-quantum transition.
2. Theoretical Methodology of Work
- Defining the most relevant thematic areas for study, ensuring that the study remains focused on fundamental aspects;
- Mapping adaptation and transition strategies for post-quantum algorithms (PQC);
- Building a prospective framework that is not limited to the current state of the art but seeks to provide strategic solutions.
- Relevance: Pertinence of the study;
- Applicability.
2.1. Eligibility Criteria
- Thematic scope: Works directly related to quantum computing, asymmetric cryptography, PQC, information security and technological transition;
- Scientific nature of the study: Scientific articles, technical reports, institutional documents, books, and scientific conferences;
- Methodological relevance: Studies that present an empirical, prospective, analytical, or conceptual approach, with applicable contributions to risk analysis and the formulation of post-quantum transition strategies.
- Deviation from thematic scope: Studies unrelated to the research topic;
- Insufficient relevance: Publications that address the topic merely speculatively, without proven technical or scientific contributions;
- Content duplication: Repeated versions of content in different works.
2.2. Information Sources and Validation Mechanisms
- Thematic relevance: Inclusion of studies and case studies related to the thematic area under study;
- Credibility and scientific review: Prioritization of information published by highly recognized bodies and institutions, such as NIST, IEEE and EU;
- Temporal relevance: Selection of documents and information that are preferably recent, avoiding the use of obsolete literature.
2.3. Bias Considerations
3. Theoretical and Technical Background
3.1. Asymmetric Cryptography
3.2. History of Asymmetric Cryptography
3.3. Asymmetric Cryptography - RSA
- Information encoded with the public key can only be read with the corresponding private key;
- Information encoded with the private key can only be read with the public key;
- There is no obvious relationship between the two, in the sense that it is possible to discover the private key in polynomial time from the public key.
3.4. Symmetric Cryptography and Asymmetric Cryptography
3.5. Weaknesses of Asymmetric Cryptography
3.6. Public Key Infrastructure (PKI)
3.7. Quantum Computing and Cryptanalytic Implications
3.8. Quantum Entanglement
3.9. Quantum Interference
3.10. Quantum Circuits
- Input: The input qubits are in an initial state, usually |0〉 for each qubit. The combined state of multiple qubits is mathematically described by their tensor product;
- Horizontal lines: Each line represents the temporal evolution level of a single qubit.
- These are not necessarily made of wires, and may simply represent a passage process for a trapped ion or the spatial displacement of a photon;
- Direction: The circuit is read from left to right, describing the evolution of the quantum system in relation to time;
- Quantum gates: Blocks of lines that represent unitary operations applied to the qubits;
- Vertical lines: Vertical segment connecting multiple lines of qubits, as happens in a CNOT gate, where it acts simultaneously on these qubits. The vertical line represents the synchronization of the operation, but not the transmission of information;
- Control: In a controlled gate, such as CNOT, a solid point on a line indicates that the qubit represented on that line is a control qubit. If in state |1〉, the gate performs the operation on the target qubit. If in state |0〉, the gate performs no operation. If the control qubit is in a superposition state or if two qubits are entangled, it will not be possible to understand the individual behavior of the control qubit and the target qubit. One must always consider simultaneously the unitary operator, which represents the entire circuit, acting simultaneously on the combined state of the qubits;
- Output: At the end of the circuit, the qubits that make up the output can be measured. The measurement collapses the superposition of each qubit to a classic result of 0 or 1.
3.11. Quantum Algorithms
- Quantum Fourier Transform: This is a quantum analog based on the classical discrete Fourier transform and is fundamental in algorithms such as Shor’s algorithm. This pillar performs transformations of data encoded in amplitudes of quantum states for a given frequency space, being an example of how certain linear transformations can be performed in an exponentially more evolved way;
- Amplitude Amplification: A general technique, applicable in quantum algorithms such as Grover’s algorithm. It is used to increase the probability of measuring one or more states corresponding to the solution of a given problem. It works iteratively, rotating the state vector towards the desired state;
- Quantum Interference: As previously discussed, quantum interference works in conjunction with amplitude amplification, being a fundamental mechanism for quantum algorithms to function. The operations are carefully orchestrated so that unwanted states cancel each other out through destructive interference, while the solution state is reinforced by constructive interference, leaving it as the most probable result in the final measurement;
- Hamiltonian Simulation: Inspired by Feynman’s original idea, it involves using a quantum computer to simulate the evolution of another quantum system. This is done by mapping the Hamiltonian (an operator that describes the total energy) of the system to be simulated onto a sequence of quantum logic gates;
- Heisenberg’s Uncertainty Principle: Quantum mechanics is fundamentally probabilistic. The outputs of the algorithms will not return a single, determined result, but rather a probability distribution in relation to the possible outcomes. By running the algorithms multiple times, the statistics of the results will be analyzed to infer the solution.
3.12. Shor’s Algorithm
3.13. Post-Quantum Cryptography (PQC)
- Lattice-based cryptography: Construction of cryptographic primitives involving lattices. This type of construction has proven resilient in both classical and modern computing. In 2024, NIST announced the Module-Lattice-Based Digital Signature Standard referring to PQC;
- Code-based cryptography: Code-based cryptography, which allows the construction of quantum- resistant public-key cryptographic systems. This process involves the use of error correctors to protect data, based on the difficulty of decoding random linear codes. The McEliece cryptosystem [16] is widely regarded in this context for its properties, although its application results in high- dimensional keys;
- Hash-based cryptography: Construction of cryptographic primitives based on hash functions, applying to the construction of digital signatures, with proof of computational integrity [17] and proofs of reach of issued credentials (HashWires protocol) [18]. In public key authentication environments, cryptographic keys are unbreakable, if the hash function is not broken at the time, it is established;
- Multivariate cryptography: Asymmetric cryptographic primitives based on multivariate polyno- mials. This cryptographic concept has been widely used in the field of cryptanalysis [19] often linked to the theory of NP-completeness.
3.14. Post-Quantum Cryptography Algorithms
- ML-KEM;
- CRYSTALS-Dilithium (or ML-DAS);
- Sphincs+ (or SLH-DAS).
3.15. Comparative Analysis of PQC Algorithms
4. Problem Statement and Central Question
4.1. Problem Statement
- “How long have the cryptographic keys remained secure, containing this personal, health, professional, business, and national security information?”. The value of X represents this value;
- “How long will it take to implement quantum security tools?”. There may be a simple automatic implementation that replaces a fully controlled system, or we may have an encryption method that needs to be adapted to a restricted environment. The value of Y represents that period of time;
- “How long will it take for a quantum computer to break the encryption systems currently used?”. Zrepresents this metric.
4.2. Central Question
- Prospective dimension: Assessment of the impact of quantum computing on digital infrastruc- tures (asymmetric cryptography), envisioning possible temporal scenarios;
- Technical dimension: Preparation of a technical plan of measures and solutions that can be applied, to guarantee adequate risk mitigation and a gradual transition.
5. Proposed Solution: A Five-Phase Transition Roadmap
5.1. Phase 1 - Initial Process and Awareness Raising
- Raising awareness of the risks of quantum computing;
- Inventory of assets and infrastructure that rely on asymmetric encryption technology processes.
5.2. Phase 2 - Assessment, Training, and Alignment
- Formation of teams specialized in implementing post-quantum cryptography;
- Performance and interoperability assessment of hybrid systems;
- General alignment and training.
5.3. Phase 3: Transition and Integration
- Gradual replacement of infrastructure, prioritizing critical infrastructure;
- Adopting hybrid architectures;
- Performing performance, compatibility, and security tests;
- Validing PQC protocols in strategic sectors.
5.4. Phase 4: Widespread Implementation and Standardization
- Global implementation of PQC algorithms;
- Implementation and standardization of strategic policies;
- Dissemination of applicable technical roadmaps.
5.5. Phase 5: Consolidation, Monitoring, and Continuous Resilience
- Search for mechanisms for continuous updating of algorithmic processes;
- Preparation of contingency plans;
- Ongoing review of legal requirements that depend on cryptography;
- Continuous monitoring of implemented algorithms;
- Continuation of the investigative process.
5.6. Roadmap Summary
6. Application Perspective in Critical Sectors
6.1. Healthcare Sector
6.2. Financial Sector
7. Operationalization of the Proposed Solution
7.1. Operationalization of the Proposed Solution in the Healthcare Sector
- Launching comprehensive audits aimed at identifying all TLS certificates and all digital signatures with a validity period exceeding five years;
- Certificates of compliance with a validity that exceeds the projected horizon for the quantum threat should be marked;
- Use of QC frameworks, creating simulated clinical data testing environments that simulate the time required to break asymmetric cryptographic systems;
- Implementation of pilot projects for VPN connection and remote access, where DHKE is replaced by hybrid encapsulation ECC + ML-KEM;
- Use of the hybrid encryption protocol, selected as a mandatory standard for all new confidential data flows.
7.2. Operationalization of the Proposed Solution in the Financial Sector
- Conducting audits on all systems using ECDSA, focusing on interbank transaction protocols and customer authentication mechanisms;
- Inventory of assets, according to their vulnerability exposure and operational frequency;
- Creation of dedicated areas for performance overload testing hybrid systems on high-frequency platforms and payment gateways. The two main metrics should be transaction latency and the increase in signature key size when migrating from ECDSA to a hybrid system (ECDSA + ML-DSA);
- Implementation of pilot projects related to interbank communications, signed by hybrid algo- rithms. This approach ensures that transactions remain valid while offering protection against future quantum breakdowns;
- Implementation of internal mandates that explicitly integrate the use of hybrid cryptography into industry compliance frameworks, including NIST FIPS standards, as a minimum requirement.
8. Formal Review Protocol
8.1. Queries and Search Terms
- Quantum computing/Quantum cryptography;
- Asymmetric cryptography/Public key infrastructure/RSA/ECC;
- Post-Quantum/PQC/Transition roadmap/Migration strategy.
8.2. Filters and Dates
8.3. Qualitative Nature of the Synthesis
9. Conclusions and Limitations
9.1. Response to the Study’s Central Question
9.2. General Research Conclusions
- Prospective analysis of the impact of quantum computing on asymmetric cryptography;
- Direct contribution to the scientific and organizational debate, providing practical guidance to support the transition of digital infrastructures to the quantum era.
9.3. Limitations of the Study and Research
9.4. Reflective Closure
Funding
Acknowledgments
Conflicts of Interest
References
- Oliveira, A. Estratégia europeia para as tecnologias quânticas: visão ou FOMO? PÚBLICO 2025. [Google Scholar]
- Bernstein, D.L.T. Post-Quantum cryptography. Nature 2017, 549, 188–194. [Google Scholar] [CrossRef] [PubMed]
- Stallings, W. Cryptography and Network Security: Principles and Practice. In Prentice Hall; 1990; p. 165. [Google Scholar]
- Diffie, W.; Hellman, M. New directions in cryptography. IEEE Transactions on Information Theory 1976, 22(6), 644–654. [Google Scholar] [CrossRef]
- Mosca, M. Cybersecurity in an Era with Quantum Computers: Will We Be Ready? IEEE, Security Privacy 2018, 16(5), 38–41. [Google Scholar] [CrossRef]
- Jevons, W.S. The Principles of Science: A Treatise on Logic and Scientific Method. In Macmillan Co; 1874; p. 141. [Google Scholar]
- Golomb, S.W. On Factoring Jevons’ Number. Cryptologia 1996, 20(3), 243–246. [Google Scholar] [CrossRef]
- Ellis, J.H. The Possibility of Secure Non-secret Digital Encryption. In CryptoCellar; 1970. [Google Scholar]
- Rivest, R. L. S.A. A.L. A Method for Obtaining Digital Signatures and Public-Key Cryptosystems. In Mas- sachusetts Institute of Technology; 1978. [Google Scholar]
- Sabiguero, A.; Esnal, A.V.G. Let There Be Trust. IEEE URUCON 2024, 1–5. [Google Scholar] [CrossRef]
- Horodecki, R. H.P.H.M. H.K. Quantum entanglement. Reviews of Modern Physics 2007, 81(2), 865–942. [Google Scholar] [CrossRef]
- Einstein, A.P.B..R.N. Can Quantum-Mechanical Description of Physical Reality Be Considered Complete? Physical Review 1935, 47(10), 777–780. [Google Scholar] [CrossRef]
- Schrödinger, E. Probability relations between separated systems. Mathematical Proceedings of the Cambridge Philosophical Society 1936, 32(3), 446–452. [Google Scholar] [CrossRef]
- Fuwa, Maria; Takeda, S.Z.M.W.H.M.F.A. Experimental proof of nonlocal wavefunction collapse for a single particle using homodyne measurements. Nature Communications 2015. [Google Scholar] [CrossRef] [PubMed]
- Shor, P.W. Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer. SIAM Journal on Computing, Quantum Physics 1997, SIAM 26. [Google Scholar] [CrossRef]
- of Electrical, I.; Engineers, E. Code-Based Cryptography: state of the art and perspectives; 2017. [Google Scholar]
- Ben-Sasson, E.; Bentov, I.; Horesh, Y.; Riabzev, M. Scalable, transparent, and post-quantum secure computa- tional integrity. Cryptology Archive; 2018. [Google Scholar]
- Chalkias, Konstantinos; Cohen, S.L.K.M.F.R.Y. HashWires: Hyperefficient Credential-Based Range Proofs. Privacy Enhancing Technologies Symposium; 2021. [Google Scholar]
- Garey, Michael R. J.D.S. Computers and intractability: a guide to the theory of NP-completeness. In San Francisco: W.H. Freeman; 1979. [Google Scholar]
- of Standards, N.I. Technology. NIST Workshop on Cybersecurity in a Post-Quantum World, 2015. [Google Scholar]
- Digital Operational Resilience Act. Regulation (EU) 2022/2554 on digital operational resilience for the financial sector (DORA). 2022.
- European Union. Directive (EU) 2022/2555 on measures for a high common level of cybersecurity across the Union (NIS2 Directive). 2022. [Google Scholar]
- Cai, W.; Ma, Y. W.W.C.L.Z.L.S. Bosonic quantum error correction codes in superconducting quantum circuits. Fundamental Research 2020. [Google Scholar] [CrossRef]
| Phase |
| Initial Process and Awareness Raising Assessment, Training, and Alignment Transition and Integration Widespread Implementation and Standardization Consolidation, Monitoring, and Continuous Resilience |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).