Abstract

The aim of this paper is to elucidate the implications of quantum computing in present cryptography and to introduce the reader to basic post-quantum algorithms. In particular the reader can delve into the following subjects: present cryptographic schemes (symmetric and asymmetric), differences between quantum and classical computing, challenges in quantum computing, quantum algorithms (Shor’s and Grover’s), public key encryption schemes affected, symmetric schemes affected, the impact on hash functions, and post quantum cryptography. Specifically, the section of Post-Quantum Cryptography deals with different quantum key distribution methods and mathematicalbased solutions, such as the BB84 protocol, lattice-based cryptography, multivariate-based cryptography, hash-based signatures and code-based cryptography.

Highlights

  • PRESENT CRYPTOGRAPHYIn this chapter we explain briefly the role of symmetric algorithms, asymmetric algorithms and hash functions in modern cryptography

  • There is no doubt that advancements in technology and electronic communications have become one of the main technological pillars of the modern age

  • Algorithms that can break the present asymmetric cryptoschemes whose security is based on the difficulty of factorizing large prime numbers and the discrete logarithm problem have been introduced. It appears that even elliptic curve cryptography which is considered presently the most secure and efficient scheme is weak against quantum computers

Read more

Summary

PRESENT CRYPTOGRAPHY

In this chapter we explain briefly the role of symmetric algorithms, asymmetric algorithms and hash functions in modern cryptography. We analyze the difficulty of factorizing large numbers, as well as the discrete logarithm problem which is the basis of strong asymmetric ciphers

INTRODUCTION
Asymmetric Cryptography
QUANTUM COMPUTING VS CLASSICAL COMPUTING
Challenges in Quantum Computing
CRYPTOSYSTEMS VULNERABLE TO QUANTUM ALGORITHMS
Shor’s Algorithm in Asymmetric Cryptography
Grover’s algorithm in Symmetric Cryptography
Asymmetric Encryption Schemes Affected
Symmetric Encryption Schemes Affected
Hash Functions
POST-QUANTUM CRYPTOGRAPHY
Quantum Key Distribution
Mathematically-based Solutions
Findings
CONCLUSION
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call