The Impact of Quantum Computing on Present Cryptography

Abstract

The aim of this paper is to elucidate the implications of quantum computing in present cryptography and to introduce the reader to basic post-quantum algorithms. In particular the reader can delve into the following subjects: present cryptographic schemes (symmetric and asymmetric), differences between quantum and classical computing, challenges in quantum computing, quantum algorithms (Shor’s and Grover’s), public key encryption schemes affected, symmetric schemes affected, the impact on hash functions, and post quantum cryptography. Specifically, the section of Post-Quantum Cryptography deals with different quantum key distribution methods and mathematicalbased solutions, such as the BB84 protocol, lattice-based cryptography, multivariate-based cryptography, hash-based signatures and code-based cryptography.

Authors and Affiliations

Vasileios Mavroeidis, Kamer Vishi, Mateusz D. Zych, Audun Jøsang

Keywords

Related Articles

Implementing Project Management Category Process Areas of CMMI Version 1.3 Using Scrum Practices, and Assets

Software development organizations that rely on Capability Maturity Model Integration (CMMI) to assess and improve their processes have realized that agile approaches can provide improvements as well. CMMI and agile meth...

Detecting Inter-Component Vulnerabilities in Event-based Systems

Event-based system (EBS) has become popular because of its high flexibility, scalability, and adaptability. These advantages are enabled by its communication mechanism—implicit invocation and implicit concurrency between...

Conceptual Modeling of a Procurement Process

Procurement refers to a process resulting in delivery of goods or services within a set time period. The process includes aspects of purchasing, specifications to be met, and solicitation notifications as in the case of...

Designing of Hydraulically Balanced Water Distribution Network Based on GIS and EPANET

The main objectives of this paper are, designing and balancing of Water Distribution Network (WDN) based on loops hydraulically balanced method as well as using Geographical Information System (GIS) methodology with the...

A Universally Designed and Usable Data Visualization for A Mobile Application in the Context of Rheumatoid Arthritis

This paper discusses the design, development and evaluation of a data visualization prototype for a mobile application, for people with rheumatoid arthritis conditions. The visualizations concern ways of displaying graph...

Download PDF file
  • EP ID EP278339
  • DOI 10.14569/IJACSA.2018.090354
  • Views 102
  • Downloads 0

How To Cite

Vasileios Mavroeidis, Kamer Vishi, Mateusz D. Zych, Audun Jøsang (2018). The Impact of Quantum Computing on Present Cryptography. International Journal of Advanced Computer Science & Applications, 9(3), 405-414. https://europub.co.uk/articles/-A-278339