Quantum Advantage in Cryptography

06/08/2022
by   Renato Renner, et al.
0

Ever since its inception, cryptography has been caught in a vicious circle: Cryptographers keep inventing methods to hide information, and cryptanalysts break them, prompting cryptographers to invent even more sophisticated encryption schemes, and so on. But could it be that quantum information technology breaks this circle? At first sight, it looks as if it just lifts the competition between cryptographers and cryptanalysts to the next level. Indeed, quantum computers will render most of today's public key cryptosystems insecure. Nonetheless, there are good reasons to believe that cryptographers will ultimately prevail over cryptanalysts. Quantum cryptography allows us to build communication schemes whose secrecy relies only on the laws of physics as well as some minimum assumptions about the cryptographic hardware - leaving basically no room for an attack. While we are not yet there, this article provides an overview of the principles and state of the art of quantum cryptography.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
11/09/2022

Quantum Cryptography: Quantum Key Distribution, a Non-technical Approach

With the rapid development of quantum computers the currently secure cry...
research
01/29/2021

Security in Quantum Cryptography

Quantum cryptography exploits principles of quantum physics for the secu...
research
01/18/2022

A Survey on Code-Based Cryptography

The improvements on quantum technology are threatening our daily cyberse...
research
10/16/2021

Making Existing Software Quantum Safe: Lessons Learned

In the era of quantum computing, Shor's algorithm running on quantum com...
research
01/11/2023

Managing the Migration to Post-Quantum-Cryptography

Cryptographically relevant quantum computers (CRQC) are presumably able ...
research
07/01/2022

Resource Guide for Teaching Post-Quantum Cryptography

Public-key cryptography has become a popular way to motivate the teachin...
research
11/15/2018

McEliece Cryptosystem Based On Extended Golay Code

With increasing advancements in technology, it is expected that the emer...

Please sign up or login with your details

Forgot password? Click here to reset