Post-quantum Cryptography to Protect Data Privacy and Security in the Banking Sector: Lattice-Based Key-Encapsulation Mechanism (ML-KEM) Cryptographic Algorithms
Pawan Kumar (),
Sumesh Singh Dadwal (),
Sanjay Modi (),
Arsalan Mujahid Ghouri () and
Hamid Jahankhani ()
Additional contact information
Pawan Kumar: Lovely Professional University
Sumesh Singh Dadwal: London Southbank University
Sanjay Modi: Lovely Professional University
Arsalan Mujahid Ghouri: London Southbank University
Hamid Jahankhani: Northumbria University
Chapter Chapter 13 in The Dark Side of Marketing, 2025, pp 363-407 from Springer
Abstract:
Abstract Financial organisations have been using encryption mechanisms to protect data privacy and security for the past 20 years. Traditional cryptographic techniques encrypt data using mathematical methods and then decrypt it with keys to recover the original message. Most encryption techniques currently in use rely on algorithms that even the most robust conventional computers in the world could only break after thousands of years of continuous processing. Cybersecurity experts agree that a quantum computer could easily break traditional cryptographic techniques within seconds, while others say that most of the techniques currently in use will become obsolete with the arrival of quantum computing. The chapter evaluates the system performance of ML-KEM a post-quantum cryptographic algorithm, conducting a comparison with RSA and Blowfish, two widely used cryptographic algorithms in the banking sector. This algorithm presents a balanced behaviour considering the benefits it brings. Thus, ML-KEM can be implemented in banking applications where quantum security is a priority, considering more robust hardware and software. On the other hand, RSA is suitable for many applications currently being the most popular cryptographic technique in the finance industry. Finally, Blowfish proves optimal for applications, where the computational resources are limited; however, this algorithm does not offer a strong security level.
Keywords: Quantum Computing; Cryptography. Cyber Security; ML-KEM; KEM; RSA; Algorithm; Banks (search for similar items in EconPapers)
Date: 2025
References: Add references at CitEc
Citations:
There are no downloads for this item, see the EconPapers FAQ for hints about obtaining it.
Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.
Export reference: BibTeX
RIS (EndNote, ProCite, RefMan)
HTML/Text
Persistent link: https://EconPapers.repec.org/RePEc:spr:sprchp:978-3-031-94946-3_13
Ordering information: This item can be ordered from
http://www.springer.com/9783031949463
DOI: 10.1007/978-3-031-94946-3_13
Access Statistics for this chapter
More chapters in Springer Books from Springer
Bibliographic data for series maintained by Sonal Shukla () and Springer Nature Abstracting and Indexing ().