COMMENTS

  1. PDF Quantum Cryptography

    1.1The beginnings of cryptography Cryptography is the science, at the crossroads of mathematics, physics, and computer science, that tends to design protocols to prevent malicious third-party from reading private messages. Even if the development of computers during the 20th century made the research in cryptography explode,

  2. PDF Quantum Cryptography

    Quantum cryptography is one of the emerging topics in the field of computer industry. This paper focus on quantum cryptography and how this technology contributes value to a defense-in-depth strategy pertaining to completely secure key distribution. The scope of this paper covers the weaknesses of modern digital cryptosystems, the fundamental ...

  3. PDF Quantum Cryptography in Real-life Applications: Assumptions and Security

    Quantum cryptography, or quantum key distribution (QKD), provides a means of uncon-ditionally secure communication. The security is in principle based on the fundamental laws of physics. Security proofs show that if quantum cryptography is appropriately implemented, even the most powerful eavesdropper cannot decrypt the message from a cipher.

  4. Post Quantum Cryptography: Techniques, Challenges, Standardization, and

    searched algorithms (post-quantum cryptography) that would prove di cult to crack even by a quantum ad-versary. Finally, the survey culminates in an overview of the most viable candidates for the NIST standard and provides future research directions in the eld of post-quantum cryptography. In 2018 Mavroeidis, et al. [4] published a paper to

  5. PDF Quantum cryptography: from theory to practice

    Quantum cryptography or quantum key distribution (QKD) applies fundamental laws of ... to quantum cryptography presented in this thesis. I would like to acknowledge that I have beneflted very much from thoughtful discussions with Norbert Lutk˜ enhaus, Jian-Wei Pan, Aephraim M. Steinberg, Wolfgang Tittel, Gregor Weihs and the members of ...

  6. Revocable Cryptography in a Quantum World

    This thesis undertakes a systematic study of how to delegate and revoke privileges in a world in which quantum computers become widely available. As part of a single framework we call revocable cryptography, we show how to revoke programs, encrypted data, and even cryptographic keys under standard assumptions. In the first part of this thesis ...

  7. A quantum encryption design featuring confusion, diffusion, and mode of

    Quantum cryptography—the application of quantum information processing and quantum computing techniques to cryptography has been extensively investigated. Two major directions of quantum ...

  8. PDF Improving post-quantum cryptography through cryptanalysis

    organizers and attendees of the Dagstuhl seminar series on quantum cryptanalysis and the AIM workshop on quantum algorithms for analysis of public-key crypto. Thanks to everyone who made this thesis possible. Thanks to Michele Mosca for advising me and supporting my research. Thanks to my co-authors: Martin Albrecht, Vlad

  9. [1705.02417] Quantum Security of Cryptographic Primitives

    This encompasses both the fields of post-quantum cryptography (that is, traditional cryptography engineered to be resistant against quantum adversaries), and quantum cryptography (that is, security protocols designed to be natively run on a quantum infrastructure, such as quantum key distribution). ... PhD Thesis. This document is an electronic ...

  10. (PDF) DESIGN AND IMPLEMENTATION OF QUANTUM CRYPTOGRAPHIC ...

    quantum computing and quantum-safe cryptography influences the assumptions and theoretical foundations, requiring adjustments and updates to the framework presented. Again, considering

  11. Hardware Architectures for Post-Quantum Cryptography

    The rapid development of quantum computers poses severe threats to many commonly-used cryptographic algorithms that are embedded in different hardware devices to ensure the security and privacy of data and communication. Seeking for new solutions that are potentially resistant against attacks from quantum computers, a new research field called Post-Quantum Cryptography (PQC) has emerged, that ...

  12. Master Thesis

    Yoann Piétri. My research interests include quantum physics, computer science and cryptography. In this paper, we review how the laws of Quantum Mechanics allow creating unconditionally secure protocols in cryptography, i.e. protocols where the security is ensured by physical laws and bounds and not on some computationally hard problems.

  13. PDF Practical Issues in Quantum Cryptography

    computer can easily break standard public-key systems via Shor's quantum algorithm. In contrast to the public-key encryption algorithm, quantum cryptography (QC) is the unbreakable encryption algorithm based on the laws of quantum physics. In the past decade, the unconditional security of QC has been rigorously proven and various QC

  14. Post-Quantum Cryptography

    Post-Quantum Cryptography. Technical University of Denmark. Kgs. Lyngby, Denmark : Technical University of Denmark, 2011. 156 p. abstract = "The security of almost all the public-key cryptosystems used in practice depends on the fact that the prime factorization of a number and the discrete logarithm are hard problems to solve.

  15. DataSpace: CRYPTOGRAPHY IN THE AGE OF QUANTUM COMPUTERS 2.0

    Issue Date: 2021. Publisher: Princeton, NJ : Princeton University. Abstract: People widely believe that full-scale quantum computers will eventually be viable in the near future. Quantum computers pose threats to many existing cryptosystems (most prominently, Shor's algorithm) while raising the possibility of using quantum-mechanical phenomena ...

  16. Electronic Thesis/Dissertation

    To better understand security, risks, and other related issues in the theory, designs, implementations, and deployment of post-quantum cryptography, in this thesis, I study the following topics.1. The National Institute of Standards and Technology has made clear through its evaluation criteria that cryptographic schemes and their ...

  17. PDF Khanh Hoang POST-QUANTUM CRYPTOGRAPHY FOR PUBLIC KEY ...

    3.2.3 Algorithms Break. It has been demonstrated that a quantum computer-based algorithm can break the symmetric key cryptographic algorithm by a factor of the square root of the size of the key. For instance, to find an image of a 256-bit hash function, a quantum algorithm will take only 2128 times.

  18. PDF Quantum cryptography: from theory to practice arXiv:0808.1385v1 [quant

    Quantum cryptography or quantum key distribution (QKD) applies fundamental laws of ... to quantum cryptography presented in this thesis. I would like to acknowledge that I have benefited very much from thoughtful discussions with Norbert Lu¨tkenhaus, Jian-Wei Pan, Aephraim M. Steinberg, Wolfgang Tittel, Gregor Weihs and the members of ...

  19. PDF Bachelor Thesis Quantum Cryptography

    he Vernam one-time pad scheme, work.Quantum cryptography makes it possible that two parties, in this case Alice and Bob. share a random key in a secure way. Therefore, the notion "quantum key distribution" is more. ccurate than "quantum cryptography".In quantum key distribution, a single or entangled quantum i.

  20. Quantum hacking looms

    Approval of three quantum-proof algorithms caps eight-year global effort to make the Internet safe from attacks using future computers.

  21. (PDF) Quantum Cryptography

    The thesis is based on Quantum cryptography. I talked bout various aspects of quantum cryptography. How it will impact the existing cryptography techniques. Discover the world's research.

  22. Quantum Cryptography

    Quantum cryptography is a new method for secret communications offering the ultimate security assurance of the inviolability of a Law of Nature. In this paper we shall describe the theory of quantum cryptography, its potential relevance and the development of a prototype system at Los Alamos, which utilises the phenomenon of single-photon ...

  23. Implementation attacks on post-quantum lattice-based cryptography

    Side-Channel Analysis (SCA): In the first part of the thesis (Chapters 3-8), we focus exclusively on SCA of lattice-based cryptography. In this respect, we demonstrate that lattice-based PKE/KEMs contain inherent algorithmic features that make them susceptible to very simple side-channel attacks in a chosen-ciphertext setting.

  24. A Survey on Quantum Cryptography, its Protocols, Applications, and

    This paper focuses on the concepts used in Quantum Cryptography and recent progress made. We look at the different categories of key distribution protocols that have been proposed and issues ...

  25. Quantum Key Distribution Meets Post-Quantum Cryptography

    By contrast, post-quantum cryptography (PQC) is based not around quantum physics but pure math, in which next-generation cryptographic algorithms are designed to run on conventional computers.

  26. NIST Releases First Post-Quantum Encryption Algorithms

    My recent writings on post-quantum cryptographic standards. Tags: cryptography, encryption, national security policy, NIST, quantum computing, security standards. Posted on August 15, 2024 at 11:37 AM • 0 Comments

  27. Doctoral Thesis: From Data, to Models, and Back: Making ML "Predictably

    Artificial Intelligence and Decision-making combines intellectual traditions from across computer science and electrical engineering to develop techniques for the analysis and synthesis of systems that interact with an external world via perception, communication, and action; while also learning, making decisions and adapting to a changing environment.

  28. The Quantum Threat To AI Language Models Like ChatGPT

    To give ourselves the best opportunity for a secure future, we need to immediately upgrade public key cryptography so it is quantum resilient. This will prevent a disaster of epic proportions.