Impact of Quantum Computing on Asymmetric Cryptography Infrastructures: Prospective Study and Post-Quantum Transition Roadmap

Read the full article See related articles

Discuss this preprint

Start a discussion What are Sciety discussions?

Listed in

This article is not in any list yet, why not save it to one of your lists.
Log in to save this article

Abstract

The evolution of quantum computing represents one of the most significant technological transformations of this century, with direct implications for cryptographic systems currently in use, especially in the field of asymmetric cryptography. This article develops a prospective study on the impact of quantum computing on asymmetric cryptographic infrastructures, presenting the central problem and proposing the implementation of a structured solution in the form of a transition roadmap. This approach enables the anticipation of technological scenarios and the identification of appropriate mitigation strategies, based on scientific evidence and expert projections. The results obtained highlight the vulnerability of classical cryptographic algorithms, based on complex mathematical problems, such as RSA and ECC, demonstrating that the technological and cryptographic transition is inevitable. However, this transition should not be exclusively algorithmic, it must integrate technical training policies, regulatory compliance, interoperability between hybrid systems, and continuous monitoring mechanisms. The proposed solution stands out from the others due to its methodological and operational approach, offering a dynamic, detailed, and adaptable model applicable to different organizational and sectoral contexts. The proposed roadmap is structured in sequential and interdependent phases, allowing for practical and strategic guidance of the transition process. The contributions of this research include the systematization of the phases of the post-quantum transition process, the introduction of a resilient and evolutionary model capable of responding to technological uncertainty, and the consolidation of an integrated approach that combines academic, scientific, organizational, and technical rigor. Planning and adopting a proactive stance are crucial factors in ensuring the operational continuity and resilience of digital infrastructures in a potential quantum era. The article therefore constitutes a relevant contribution to the academic debate on post-quantum information security, offering practical guidance and concepts applicable to the protection of digital infrastructures in the context of profound technological transformation.

Article activity feed