What are the future of traditional authentication protocols that are based on DH or RSA for securing the IoT, Fog and Edge computing in case of emergence of the quantum computing ?
The cryptography community has already started preparation for the post-quantum world. For example, there is a paper by Daniel J. Bernstein (et al.) ''Post-quantum RSA'' (https://cr.yp.to/papers/pqrsa-20170419.pdf), where authors propose RSA parameters for which:
key generation, encryption, decryption, signing, and verification are feasible on today’s computers,
all known attacks are infeasible, even assuming highly scalable quantum computers.
Based on that I assume that a lot of traditional protocols will be adjusted to the modifications of classical DH and RSA. On the other hand, alternative public key algorithms attract increasing attention, e.g. hash-based cryptography, code-based cryptography or lattice-based cryptography. Thus, protocols based on those concepts will become an interesting alternative.
Dear Tomasz Mazurkiewicz, firstly, thank for your answer.
Since the IoT devices have constraints in its memory, computation and packet size, the post-quantum cryptography needs a larger key size and more consume computation than traditional cryptography. Therefore, it may not suitable for IoT devices.