The Impact of Quantum Computing on Present Cryptography
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2018, Vol 9, Issue 3
Abstract
The aim of this paper is to elucidate the implications of quantum computing in present cryptography and to introduce the reader to basic post-quantum algorithms. In particular the reader can delve into the following subjects: present cryptographic schemes (symmetric and asymmetric), differences between quantum and classical computing, challenges in quantum computing, quantum algorithms (Shor’s and Grover’s), public key encryption schemes affected, symmetric schemes affected, the impact on hash functions, and post quantum cryptography. Specifically, the section of Post-Quantum Cryptography deals with different quantum key distribution methods and mathematicalbased solutions, such as the BB84 protocol, lattice-based cryptography, multivariate-based cryptography, hash-based signatures and code-based cryptography.
Authors and Affiliations
Vasileios Mavroeidis, Kamer Vishi, Mateusz D. Zych, Audun Jøsang
Improved Face Recognition with Multilevel BTC using Kekre’s LUV Color Space
The theme of the work presented in the paper is Multilevel Block Truncation Coding based Face Recognition using the Kekre’s LUV (K’LUV) color space. In [1], Multilevel Block Truncation Coding was applied on the RGB...
Performance Analysis of In-Network Caching in Content-Centric Advanced Metering Infrastructure
In-network caching is a key feature of content-centric networking. It is however a relatively costly mechanism with hardware requirements besides placement/replication strategies elaboration. As content-centric networkin...
Internet Orchestra of Things: A Different Perspective on the Internet of Things
The Internet of Things (IoT) is defined as a global network that links together living and/or non-living entities, such as people, animals, software, physical objects or devices. These entities can interact with each oth...
Green Cloud Computing: Efficient Energy-Aware and Dynamic Resources Management in Data Centers
The uses of Cloud computing over the last years are constantly increasing since it has become a very important technology in the computing landscape. It provides to client decentralized services and a pay-as-you-go model...
Successful Transmission Rate of Mobile Terminals with Agents in Segmented Ad Hoc Network
Mobile Wireless Ad-Hoc Network (MANET) is a special kind of network, where all of the nodes move in time. Random movement is the commonly used to model the mobility in this network. Beside as a host, each node is intend...