RUS  ENG
Full version
JOURNALS // Prikladnaya Diskretnaya Matematika. Supplement // Archive

Prikl. Diskr. Mat. Suppl., 2025 Issue 18, Pages 146–152 (Mi pdma702)

Mathematical Methods of Cryptography

Post-quantum block cipher-based symmetric cryptography: existing results and topical research directions

A. M. Koreneva, S. P. Panasenko, G. V. Firsov


Abstract: Symmetric cryptographic algorithms are not dramatically affected by quantum computing in comparison to asymmetric ones. However, some symmetric algorithms are insecure in case when an attacker (or adversary) has access to quantum computer. Post-quantum security models are more complex than classical ones, e.g., these models could be classified by quantum computer access type. That is, an adversary may have the only ability to run quantum algorithms locally, or may have quantum (superposition) access to cryptographic algorithm implemented on quantum computer. Further, quantum effects (e.g. entanglement) affect security proofs methods by introducing new restrictions inexistent in classical world. Therefore, existing algorithms need new security proofs in post-quantum models with potentially new assumptions. These proofs of security (and especially insecurity) imply implementation restrictions for cryptographic algorithms. In this paper, we review some existing results and highlight topical research directions in post-quantum block cipher-based symmetric cryptography.

Keywords: post-quantum cryptography, symmetric cryptography, block ciphers, block ciphers modes of operation, quantum cryptanalysis, quantum computing.

UDC: 003.26

DOI: 10.17223/2226308X/18/30



© Steklov Math. Inst. of RAS, 2026