Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

Quantum Resistant Cryptography – A Perspective on its Impact in Security


Affiliations
1 Department of Mathematics and Statistics, University of Ottawa, Ottawa, Canada
     

   Subscribe/Renew Journal


The thoughts responsible for reliable outcomes in the quantum world are superposition (which can be multiple states at the same time), entanglement (particles are connected by traditional potential energies), and quantum uncertainty (observe the properties of particles). Will lower the quantum dots). Observe other possibilities). In this article, we will discuss the public key cryptographic algorithms considered to resist attacks based on quantum computing and the problems that must be solved using post quantum cryptography. The purpose of this review is to focus on the basic ideas and mechanisms of crypto systems, secure communications, various post quantum cryptographic algorithms, and their implementation aspects.

Keywords

Cryptography, Quantum Cryptography, Public Key Cryptography, Post Quantum Cryptography Algorithm.
User
Subscription Login to verify subscription
Notifications
Font Size

Abstract Views: 158

PDF Views: 1




  • Quantum Resistant Cryptography – A Perspective on its Impact in Security

Abstract Views: 158  |  PDF Views: 1

Authors

Changhyun Pang
Department of Mathematics and Statistics, University of Ottawa, Ottawa, Canada
Sang Moon Kim
Department of Mathematics and Statistics, University of Ottawa, Ottawa, Canada

Abstract


The thoughts responsible for reliable outcomes in the quantum world are superposition (which can be multiple states at the same time), entanglement (particles are connected by traditional potential energies), and quantum uncertainty (observe the properties of particles). Will lower the quantum dots). Observe other possibilities). In this article, we will discuss the public key cryptographic algorithms considered to resist attacks based on quantum computing and the problems that must be solved using post quantum cryptography. The purpose of this review is to focus on the basic ideas and mechanisms of crypto systems, secure communications, various post quantum cryptographic algorithms, and their implementation aspects.

Keywords


Cryptography, Quantum Cryptography, Public Key Cryptography, Post Quantum Cryptography Algorithm.