Publications
Standardization Activities
Tags:
Security,
Cybersecurity,
Sikkerhet,
Cybersikkerhet,
CTI,
SOAR
Publications
-
Mavroeidis, Vasileios; Vishi, Kamer; Zych, Mateusz & Jøsang, Audun
(2018).
The impact of quantum computing on present cryptography.
International Journal of Advanced Computer Science and Applications (IJACSA).
ISSN 2158-107X.
9(3),
p. 405–414.
doi:
10.14569/IJACSA.2018.090354.
Full text in Research Archive
Show summary
The aim of this paper is to elucidate the implications of quantum computing in present cryptography and to introduce the reader to basic post-quantum algorithms. In particular the reader can delve into the following subjects: present cryptographic schemes (symmetric and asymmetric), differences between quantum and classical computing, challenges in quantum computing, quantum algorithms (Shor’s and Grover’s), public key encryption schemes affected, symmetric schemes affected, the impact on hash functions, and post quantum cryptography. Specifically, the section of Post-Quantum Cryptography deals with different quantum key distribution methods and mathematical-based solutions, such as the BB84 protocol, lattice-based cryptography, multivariate-based cryptography, hash-based signatures and code-based cryptography.
View all works in Cristin
Published
Sep. 9, 2020 11:44 AM
- Last modified
May 24, 2021 1:23 PM