Post-Quantum Cryptography in Corporate Data Protection

Authors

  • Sonia Sharma Author
  • Jyoti Sachdeva Author

Keywords:

Post-Quantum Cryptography, corporate data protection, cryptographic agility, quantum computing, cybersecurity compliance

Abstract

The rapid advancement of quantum computing poses a significant threat to classical cryptographic methods such as RSA and ECC, which underpin corporate data protection strategies worldwide. This research investigates the adoption and implications of Post-Quantum Cryptography (PQC) in corporate environments through doctrinal analysis of regulatory standards (NIST FIPS 203–205, NSA CNSA 2.0) and non-doctrinal insights from industry surveys and market reports. Despite growing awareness—69% of corporations recognize quantum threats—only 5% have implemented PQC solutions. The paper presents empirical data illustrating global market trends (projected CAGR ~37%) and evaluates sectoral preparedness, particularly within finance and government. Case studies from companies like Commvault, Apple, and NXP demonstrate early adoption, while challenges remain around integration complexity, cryptographic agility, and regulatory lag. The findings emphasize the urgency of a proactive shift towards hybrid encryption models, procurement reforms, and sector-specific PQC readiness frameworks. This research concludes that strategic, agile adoption of PQC is critical to safeguarding long-term corporate data confidentiality in the approaching quantum era.

Downloads

Download data is not yet available.

References

Demir, E. D., Bilgin, B., & Onbasli, M. C. (2025). Performance analysis and industry deployment of post-quantum cryptography algorithms. arXiv. https://doi.org/10.48550/arXiv.2503.12952

Hosseini, S. M. R., & Pilaram, H. (2024). A comprehensive review of post-quantum cryptography: Challenges and advances. Cryptology ePrint Archive, Paper 2024/1940.

Fedorov, A. K. (2023). Deploying hybrid quantum secured infrastructure for applications: When quantum and post quantum can work together. arXiv. https://doi.org/10.48550/arXiv.2304.04585

Hasan, K. F., Simpson, L., Rezazadeh Baee, M. A., Islam, C., Rahman, Z., Armstrong, W., … McKague, M. (2023). A framework for migrating to post-quantum cryptography: Security dependency analysis and case studies. arXiv. https://doi.org/10.48550/arXiv.2307.06520

Mahdi, L. H., & Abdullah, A. A. (2025). Fortifying future IoT security: A comprehensive review on lightweight post quantum cryptography. Engineering, Technology & Applied Science Research, 15(2), 21812–21821.

Mitra, S., et al. (2024). Enhancing the security of classical communication with post quantum authenticated encryption schemes for quantum key distribution. Computers, 13(7), 163.

Kumar, P. V. A., et al. (2020). Hash based digital signatures—a tutorial review. In IEEE International Conference on Public Key Infrastructure and its Applications (PKIA).

Lopez Valdivieso, J., & Cumplido, R. (2024). Performance analysis of Cryptographic Hardware–Software Architecture Based on Hashes for SPHINCS+. ACM Transactions on Reconfigurable Technology and Systems, 14(1).

Liu, F., Zheng, Z., Gong, Z., & others. (2024). A survey on lattice based digital signature. Cybersecurity, 7, 7.

Tasopoulos, E., et al. (2024). A review of post quantum privacy preservation for IoMT using blockchain. Electronics, 13(15), 2962.

Kumari, et al. (2024). A comparative study of post quantum cryptographic algorithm implementations for secure and efficient energy systems monitoring. Electronics, 12(18), 3824.

Shahreyar, et al. (2023). Post Quantum Cryptography: A Systematic Review of Next Generation Cybersecurity Algorithms. International Journal of Artificial Intelligence, Data Science, and Machine Learning, 4(4), 102.

Hosseini, S. M. R., & Pilaram, H. (2024). Post quantum cryptography: Challenges and advances. Sharif University of Technology.

Hasan, K. F., et al. (2023). Migration framework to PQC.

Fedorov, A. K. (2023). Hybrid quantum secured infrastructure deployment.

Ekert, A., et al. (1992). Practical quantum cryptography based on two photon interferometry. Physical Review Letters, 69(9), 1293–1297.

Buchmann, J., Lange, T., & Mengíbar, O. (2017). Post quantum cryptography. Nature, 549(7670), 188–193.

Bernstein, D. J., & Lange, T. (2017). Post quantum cryptography. Nature, 549, 188–193.

Sood, N. (2024). Cryptography in Post Quantum Computing Era. SSRN Electronic Journal.

Rawal, B. S., & Curry, P. J. (2024). Challenges and opportunities on the horizon of post quantum cryptography. APL Quantum, 5(2).

Bagirovs, E., Provodin, G., Sipola, T., & Hautamäki, J. (2024). Applications of post quantum cryptography. European Conference on Cyber Warfare and Security.

Mamatha, G. S., Dimri, N., & Sinha, R. (2024). Post Quantum Cryptography: Securing Digital Communication in the Quantum Era. Procedia Computer Science.

Bavdekar, R., et al. (2022). Post Quantum Cryptography: Techniques, Challenges, Standardization, and Directions for Future Research. ICOIN 2023.

Ekert, A. (1991). Quantum cryptography based on Bell’s theorem. Physical Review Letters, 67(6), 661–663.

Buchmann, J., Braun, J., Demirel, D., & Geihs, M. (2017). Quantum cryptography: A view from classical cryptography. Quantum Science and Technology, 2(2), 020502.

Imaña, J. L., & Luengo, I. (2024). The security implications of quantum cryptography and quantum computing. Future Generation Computer Systems, 160, 666–710.

Downloads

Published

2025-06-30

Issue

Section

Original Research Articles

How to Cite

Post-Quantum Cryptography in Corporate Data Protection. (2025). International Journal of Artificial Intelligence, Computer Science, Management and Technology, 2(2), 61-73. https://ijacmt.com/index.php/j/article/view/29

Similar Articles

1-10 of 25

You may also start an advanced similarity search for this article.