Arena Pro
Kädet tietokoneen näppäimistöllä, koneen yllä leijuu tietoturvakuvakkeita kuten avain, lukko ja kilpi.

Image: iStock

A review on post-quantum cryptography and related cyber threats for critical infrastructures

Technology and Industry

This article discusses the role of quantum computing in cyber threats for critical infrastructures, with a focus on operational technology. Various threats are discussed highlighting the importance of research in this field of application.

Post-quantum cryptography (PQC) is widely discussed for different applications and environments due to the rapid research and development it is undergoing currently. (Bernstein & Lange, 2017) algorithm, which is a famous quantum algorithm, expected to break widely used public-key cryptographic schemes like elliptic-curve cryptography, Diffie-Hellman key exchange and the RSA (Rivest-Shamir-Adleman) algorithm when quantum computers have advanced enough (Bene & Kiss, 2023). To ensure the world has functional public key solutions, the field of cryptography requires new developments before quantum computers become sufficiently advanced.

Important information technology (IT) networks and operational technology (OT) environments support and establish critical infrastructures providing a functioning society and economy. These environments, particularly OT environments, are vulnerable to cyber-attacks due to their nature of inhabiting computationally weak legacy components. Additionally, further development in quantum computing (QC) presents an even greater risk for those environments, and the need for suitable cryptosystems is necessary.

Since Shor’s algorithm can solve large prime number factoring and discrete-logarithm problems in polynomial time, the new PQC algorithms are based on different hard problems (Mailloux et al., 2016). The cryptographic schemes created for PQC include hash-based, lattice-based, isogeny-based, code-based, multivariate and graph-based schemes (Bene & Kiss, 2023; del Moral et al., 2024).

Global actors have started to prepare for the threat of currently used public-key cryptography schemes being broken. Several countries such as China, Germany and South-Korea are now developing their own PQC algorithms to replace the classical ones. The PQC standardization process of NIST (National Institute of Standards and Technology) is one of the currently active PQC standardization processes. (del Moral et al., 2024.)

The NIST’s standardization process started in 2017 (NIST Staff, 2024). After the third round, NIST selected the key encapsulation mechanism algorithm CRYSTALS-Kyber and digital signature algorithms CRYSTALS-Dilithium, Falcon and SPHINCS+ for standardization, and from which NIST suggests using CRYSTALS-Kyber and CRYSTALS-Dilithium for most different use cases (Alagic et al., 2022). The status report published on March 11, 2025, states that HQC (Hamming Quasi-Cyclic) was selected for standardization (NIST IR 8545, 2025). As the process is still ongoing, more algorithms may still be standardized in the future.

This article discusses the status of QC in cybersecurity and focuses on applications in critical infrastructures presenting cyber threats arising there.

Post-quantum cryptography algorithms

Cryptography algorithms focusing on different security areas are hash-based, lattice-based, isogeny-based, code-based, multivariate, multiparty computation, and graph-based (del Moral et al., 2024). For instance, hash-based algorithms rely on mathematical functions, called hash functions, mapping something of undetermined length into an object of specific length, a value providing authenticity and integrity in communication. In the following, we present concrete algorithm examples for the algorithm types. Moreover, examples of the different algorithm approaches are presented in the table below.

Algorithm approachExamples
hash-basedSPHINCS+
lattice-basedCRYSTALS-Kyber, CRYSTALS-Dilithium, Falcon
isogeny-basedSIDH
code-basedMcEliece, BIKE, HQC
multivariateRainbow, LUOV, GeMMS, MQDSS
graph-basedPCC

Table 1: List of PQC algorithms that are currently being researched, and the algorithm approach they are based on.

Hash-based: SPHINCS+

Hash functions are used in digital signatures. The basic idea of SPHINCS+ is the authentication of a huge number of few-time signatures key pairs using a so-called hypertree (Aumasson et al., 2022). SPHINCS+ is similar to SPHINCS, a high-security post-quantum stateless hash-based signature scheme. The signature scheme is stateless, which means that it allows to be a drop-in replacement for current signature schemes (Bernstein et al., 2015).

Lattice-based: CRYSTALS-Kyber, CRYSTALS-Dilithium, Falcon

Kyber is a key encapsulation mechanism and is lattice-based, which means that security is based on lattice-involved hard problems including the learning-with-errors problem (Bos et al., 2017). Dilithium is a digital signature scheme, and the hardness of an attack is based on the same principle as Kyber (Ducas et al., 2017). Falcon is also a digital signature scheme, which uses Fast Fourier sampling in addition to lattices (Fouque et al., 2020).

Isogeny-based: SIDH

SIDH (Supersingular Isogeny Diffie–Hellman protocol) is a key exchange algorithm, which vulnerability has already been proven. Castryck et al. (2022) presented a key recovery attack on SIDH by using Kani’s “reducibility criterion” for isogenies that can be easily and fast implemented.

Code-based: McEliece, BIKE, HQC

The classic McEliece algorithm has larger key sizes requiring more resources for generating keys, however small ciphertext sizes. BIKE (Bit Flipping Key Encapsulation) and HQC (Hamming Quasi-Cyclic) have both smaller key and ciphertext sizes (Kuznetsov et al., 2023). BIKE is based on QC-MDPC (Quasi-Cyclic Moderate Density Parity-Check) codes submitted to the NIST PQC Standardization Process (Aragon et al., 2022). HQC is a code-based public key encryption scheme designed to provide security against attacks by both classical and quantum computers (Aguilar-Melchor et al., 2024).

Multivariate: Rainbow, LUOV, GeMMS, MQDSS

Another category are multivariate signature schemes including Rainbow, which was found to be vulnerable, hence, was dropped from the NIST competition (Beullens, 2022), and LUOV (Lifted Unbalanced Oil and Vinegar), which are based on the Oil and Vinegar signature scheme. Other multivariate signatures are GeMMS (Great Multivariate Short Signature) (Tao et al., 2020), which was dropped from the NIST competition after the third round, and MQDSS (Multivariate Quadratic Digital Signature Scheme), which was dropped from the competition after the second round.

Graph-based: PCC

PCC (Perfect Code Cryptosystem) is based on combinatorics relying on the difficulty of determining perfect dominating sets in given graphs (Ryu et al., 2024). However, this algorithm approach is yet inefficient regarding memory and speed, and hence, there has not been a lot in the focus of research so far.

Quantum computing cyber threats for critical infrastructures

Critical infrastructure refers to the obligatory infrastructure that provides states with their vital needs. Sectors like health, energy, finance, transportation and telecommunications are all part of critical infrastructure as the sectors are necessary components of a modern functioning society (Viganó et al., 2020). Critical infrastructures are essential to provide a functioning economy as they facilitate social and economic key resources (del Moral et al., 2024). In particular, combinations of AI and QC pose cyber-threats to critical infrastructures involving questions of ethical issues in national security (Viganó et al., 2020).

Operational technology refers to hardware and software used to monitor and control physical assets in an industrial network environment (Knapp, 2024). The lifetime of OT devices is usually much longer than the lifetime of IT devices. OT devices can be used even for decades before being replaced by new units. Every critical infrastructure includes OT devices. Critical infrastructures are dependent on each other, so malfunctioning in one sector may lead to issues in other sectors. For instance, interruptions in the energy sector could lead to power outages in other critical sectors (Stouffer et al., 2023).

OT device communication environments often include legacy components which are computationally slow (del Moral et al., 2024). Therefore, the implementation of cryptosystems is challenging, even more with the rise of quantum computers. Difficulties in the implementation of new PQC algorithms to OT systems arise because the older hardware may not support the algorithms due to strict availability requirements. The new PQC algorithms require more computing power than the currently widely used public key cryptography that is vulnerable to quantum computing. Too much latency in some operations of OT systems may cause failures, so it is vital that the hardware is computationally capable of processing relevant PQC algorithms in a certain time limit frame (del Moral et al., 2024).

Critical infrastructures are progressively more connected to the internet. Many programmable logic controllers (PLCs) can be directly accessed from the internet, increasing the risk of unauthorized access to the PLCs (Rashid et al., 2019). Code signing is used by publishers, for example, to sign their applications and firmware, so the end-users can be confident that the code is of authentic origin. If threat actors can forge valid digital signatures, they can assume the publisher’s role and spread the publisher’s software infected with malicious code (Tan et al., 2022).

In embedded systems, secure boot validates certificates of images like boot loader that are run during the boot process, before the code in the images is executed (Marzougui & Krämer, 2019). If the digital signature scheme is compromised, a third party who has access to an advanced quantum computer, can create authentic certificates for any image, and the images will pass secure boot certificate validation.

The upcoming standardized PQC algorithms are designed from a perspective of information technology, so the adaptability and availability requirements of OT have received less attention in the algorithm design processes. Lattice-based PQC algorithms may be the most optimal for OT

devices in the critical infrastructure sector because of their low computational costs and small key sizes when compared to PQC algorithms based on different hard problems. Future OT hardware chips can be designed to implement certain PQC algorithms for optimized efficiency, but if any of the implemented algorithms are later found vulnerable, all the chips must be renewed, which will result in high financial costs. (del Moral et al., 2024.)

OT systems are becoming more like IT systems as capabilities and technology from IT are being applied to OT systems. Because of this, OT environments are starting to become more connected to external environments, which increases the amount of security risks (Stouffer et al., 2023).

Possible OT incidents include blockage of information flow between systems and modification of the information flow. OT environments are increasingly using wireless connections to transfer information, so physical access to the environment is not required to interfere with the flow of information, because wireless traffic can be captured and tampered with from a distance (Stouffer et al., 2023). However, general information applying to all OT systems and wireless traffic might be outside of quantum computers’ range, since the vulnerable public key algorithms are most likely not used by them.

Some end devices in IoT (internet of things) environments may have limited computational power meaning the devices might not be able to encrypt data that they forward to the cloud. Resource efficient edge nodes can encrypt the data before it is sent to the cloud through the internet. Less resource intensive, but secure implementations of PQC algorithms are being developed for IoT to make the data transmitting quantum resistant (Karakaya & Ulu, 2024). In this context, lattice-based approaches have been highlighted, and Mani et al. (2024) note that important areas for improving security are supply chains, protected patch management, cyberattacks, authentication and validation processes, and secure transactions. Critical Infrastructures showing vulnerabilities and security risks include Supervisory Control and Data Acquisition systems in Industrial Control Systems (Alqudhaibi et al., 2023). One promising approach for critical infrastructures is hardware-enforced cyber security (Szymanski, 2024).

Conclusions

In this article, we discussed recent PQC algorithms, their relations for critical infrastructures, and the NIST standardization process in PQC. The countermeasures for cyber threats in critical infrastructures are crucial due to their importance regarding societal and economic stability. Weak legacy components impose still a great risk for successful cyber attacks and need to be considered when improving environments like OT systems. PQC algorithms are still under investigation and the NIST standardization process is ongoing. Currently, new algorithms are submitted, tested, some proven to be vulnerable like SIDH, and some have been selected for standardization like CRYSTALS-Kyber, CRYSTALS-Dilithium, Falcon and SPHINCS+. Research in this field is essential due to the urgency of the potential construction of large-scale computers imposes which will lead to the breaking of current public-key cryptosystems. NIST is preparing for that era to come.

Finnish Future Farm

Finnish Future Farm brings together smart farming technologies, national and international networks, funding, and solutions in Saarijärvi, Central Finland. One of the project’s key goals is to develop the Bioeconomy Campus into a centre of excellence and meeting place for smart agriculture, promoting the adoption of new precision farming technologies and methods.

The project also supports international collaboration and innovation through a startup community and accelerator ecosystem focused on smart agriculture.

The project runs from 1 September 2023 to 30 June 2026, and is primarily funded by the Just Transition Fund (JTF) granted by the Regional Council of Central Finland.

Read more here Opens in a new tab