Table 3 Cryptographic techniques and their security functions.
Combination | Purpose |
---|---|
Symmetric cryptography + QKD | Secure key exchange for efficient data encryption. |
Asymmetric cryptography + QKD | Secure key management for digital signatures and authentication. |
Symmetric cryptography + post-quantum cryptography | Secure key management and data encryption against quantum threats. |
Asymmetric cryptography + post-quantum cryptography | Future-proof public key infrastructure and digital signatures. |