A Survey of Post-Quantum Cryptography Support in Cryptographic Libraries

📅 2025-08-22
📈 Citations: 0
Influential: 0
📄 PDF
🤖 AI Summary
Quantum computing poses an existential threat to public-key cryptography, necessitating timely adoption of NIST-standardized post-quantum cryptographic (PQC) algorithms—Kyber, Dilithium, FALCON, and SPHINCS+. Method: This paper systematically evaluates PQC support across nine major open-source cryptographic libraries—including OpenSSL and Bouncy Castle—through rigorous analysis of official documentation, release notes, and real-world deployment practices. Contribution/Results: We identify substantial disparities in implementation completeness, API maturity, and production readiness: only a minority offer stable, production-grade integrations, while most remain experimental or unimplemented. To address this gap, we propose the first multi-dimensional PQC support assessment framework, quantitatively pinpointing key standardization bottlenecks. Based on empirical findings, we recommend three actionable strategies: phased migration, cross-library interoperability coordination, and development of standardized PQC testing benchmarks. Our results provide evidence-based guidance for library developers, standards bodies, and system deployers navigating the transition to quantum-resilient cryptography.

Technology Category

Application Category

📝 Abstract
The rapid advancement of quantum computing poses a significant threat to modern cryptographic systems, necessitating the transition to Post-Quantum Cryptography (PQC). This study evaluates the support for PQC algorithms within nine widely used open-source cryptographic libraries -- OpenSSL, wolfSSL, BoringSSL, LibreSSL, Bouncy Castle, libsodium, Crypto++, Botan, and MbedTLS -- focusing on their implementation of the NIST-selected PQC finalists: CRYSTALS-Kyber, CRYSTALS-Dilithium, FALCON, and SPHINCS+. Our analysis, based on the latest available documentation, release notes, and industry reports as of early 2025, reveals a varied state of readiness across these libraries. While some libraries have integrated PQC support or have clear implementation roadmaps, others lag behind, creating potential security risks as quantum threats become more imminent. We discuss key challenges, including performance trade-offs, implementation security, and adoption hurdles in real-world cryptographic applications. Our findings highlight the urgent need for continued research, standardization efforts, and coordinated adoption strategies to ensure a secure transition to the quantum-resistant cryptographic landscape.
Problem

Research questions and friction points this paper is trying to address.

Evaluating PQC algorithm support in major cryptographic libraries
Assessing implementation status of NIST-selected post-quantum cryptography standards
Identifying performance and security challenges in quantum-resistant transition
Innovation

Methods, ideas, or system contributions that make the work stand out.

Evaluates PQC support in nine libraries
Focuses on NIST-selected PQC algorithm implementations
Analyzes performance and security trade-offs
🔎 Similar Papers
No similar papers found.
N
Nadeem Ahmed
Department of Information Systems, Univ. of Maryland Baltimore County, Baltimore, USA
L
Lei Zhang
Department of Information Systems, Univ. of Maryland Baltimore County, Baltimore, USA
Aryya Gangopadhyay
Aryya Gangopadhyay
Professor, Information Systems, Affiliate Professor CSEE, UMBC
Machine/deep learningdomain adaptationsmart citiescybersecurity