Explore chapters and articles related to this topic
Cryptography
Published in Paul L. Goethals, Natalie M. Scala, Daniel T. Bennett, Mathematics in Cyber Research, 2022
Gretchen L. Matthews, Aidan W. Murphy
At present time, we do not have large-scale quantum computers capable of running Shor's Algorithm on reasonably sized problems. However, more and more attention is being paid to the impact of quantum algorithms on cryptographic protocols, especially as we enter an era in which some entities may have access to powerful quantum computing before others. In this timeframe, most (if not all) communications will be conducted via classical methods, while some more financially potent or dominant parties would have the power to intercept and decipher messages meant for others. It is also the case that large amounts of information communicated or generated today may be stored in anticipation of the ability to decrypt when quantum computing is more viable, in what is sometimes termed a download now, decrypt later attack. Post-quantum cryptography is a way of securing classical information, meaning strings of elements from a finite alphabet, that is believed to be robust even in the presence of quantum algorithms. A distinction must be made between post-quantum cryptography and quantum cryptography. Quantum cryptography uses quantum mechanics to securely communicate. It comes with the promise of provably secure communications and the ability to detect eavesdropping. This would obviously be a major scientific advance, but it is not yet within reach. For those reasons, we focus on post-quantum cryptography. This is portrayed in Figure 2.1.
Post-Quantum Cryptography
Published in Khaleel Ahmad, M. N. Doja, Nur Izura Udzir, Manu Pratap Singh, Emerging Security Algorithms and Techniques, 2019
Amandeep Singh Bhatia, Ajay Kumar
Post-quantum cryptography offers secure alternatives. The goal of post-quantum cryptography is to develop cryptographic systems that are secure against both quantum and classical computers, and compatible with existing communication protocols and networks. Apart from RSA, DSA, and ECDSA, there are other important classes of cryptographic systems which include Code-based, Lattice-based, Hash-based and Multivariate quadratic equations. In fact, nobody has been able to apply Shor’s algorithm to these classes of cryptographic systems.
Intelligent Situation Assessment to Secure Smart Cities with Cryptography
Published in Huansheng Ning, Liming Chen, Ata Ullah, Xiong Luo, Cyber-Enabled Intelligence, 2019
Pushpinder Kaur Chouhan, Jorge Martinez Carracedo, Bryan Scotney, Sally McClean
It is well known (thanks to Shor’s algorithm [12]) that the most used public key algorithms such as RSA, ECC, and ELGAMAL cannot resist an attack performed by a quantum computer. Post-quantum cryptography refers to algorithms (in general terms, public key algorithms) that are supposed to be secure against these kinds of attacks.
Implementing blockchain in information systems: a review
Published in Enterprise Information Systems, 2022
Quantum information technology will pose a security threat to the distributed ledger system based on traditional public key cryptography. Post-quantum cryptography can effectively resist quantum computing. The mainstream post-quantum cryptographic schemes include: post-quantum cryptography based on the Hash function, whose security depends on the anti-collision Hash function; quantum post-cryptography based on multivariate quadratic equations; quantum post-cryptography based on coding theory; and post-quantum cryptography based on lattice theory. Currently, the main difficulty in applying post-quantum cryptographic signature schemes to distributed ledger systems is that the length of the public key and the signature of the scheme are too large. This will affect the performance and efficiency of the distributed ledger system. For instance, transaction throughput (TPS) and the DGS (Discrete Gaussian Sampling) modules are vulnerable to the attackers (Kiktenko et al. 2018; Yin et al. 2018).