The Fragility of Lattice-Based Cryptography in Post-Quantum Cryptography: Theoretical and Practical Vulnerabilities
Introduction The advent of quantum computing poses an existential threat to conventional public key cryptosystems such as RSA and ECC, both of which rely on the intractability of problems like integer factorization and discrete logarithms—problems which Shor's algorithm can solve efficiently. In response, significant focus has shifted