Table 3 Cryptographic techniques and their security functions.

From: A survey on advancements in blockchain-enabled spectrum access security for 6G cognitive radio IoT networks

Combination

Purpose

Symmetric cryptography + QKD

Secure key exchange for efficient data encryption.

Asymmetric cryptography + QKD

Secure key management for digital signatures and authentication.

Symmetric cryptography + post-quantum cryptography

Secure key management and data encryption against quantum threats.

Asymmetric cryptography + post-quantum cryptography

Future-proof public key infrastructure and digital signatures.