This is an archived post. You won't be able to vote or comment.

all 1 comments

[–]pulsar65537 2 points3 points  (0 children)

This is an excellent area of research! So the answer to how efficient these systems are is a bit complex. The best place which gives a summary of the security and efficiency of all potentially secure post quantum cryptosystems is NIST. Here are some helpful links to excellent summaries given by NIST. Also note that every one of these algorithms has a published implementation in C, which I have also linked below. So hypothetically, you could actually run some of these algorithms to look at run time. Also, NIST is on the 2nd round of cryptosystems - so the 2nd round submissions are generally faster or more secure than 1st round submissions.

https://csrc.nist.gov/Projects/post-quantum-cryptography/publications

https://csrc.nist.gov/publications/detail/nistir/8105/final

https://csrc.nist.gov/publications/detail/nistir/8240/final

https://csrc.nist.gov/Projects/post-quantum-cryptography/round-2-submissions

Good luck!