The Impact of Quantum Computing on Present Cryptography
The aim of this paper is to elucidate the implications of quantum computing in present cryptography and to introduce the reader to basic post-quantum algorithms. In particular the reader can delve into the following subjects: present cryptographic schemes (symmetric and asymmetric), differences betw...
Saved in:
Published in | arXiv.org |
---|---|
Main Authors | , , , |
Format | Paper Journal Article |
Language | English |
Published |
Ithaca
Cornell University Library, arXiv.org
31.03.2018
|
Subjects | |
Online Access | Get full text |
ISSN | 2331-8422 |
DOI | 10.48550/arxiv.1804.00200 |
Cover
Loading…
Abstract | The aim of this paper is to elucidate the implications of quantum computing in present cryptography and to introduce the reader to basic post-quantum algorithms. In particular the reader can delve into the following subjects: present cryptographic schemes (symmetric and asymmetric), differences between quantum and classical computing, challenges in quantum computing, quantum algorithms (Shor's and Grover's), public key encryption schemes affected, symmetric schemes affected, the impact on hash functions, and post quantum cryptography. Specifically, the section of Post-Quantum Cryptography deals with different quantum key distribution methods and mathematicalbased solutions, such as the BB84 protocol, lattice-based cryptography, multivariate-based cryptography, hash-based signatures and code-based cryptography. |
---|---|
AbstractList | International Journal of Advanced Computer Science and
Applications (IJACSA), 9(3), 405-414, March 2018 The aim of this paper is to elucidate the implications of quantum computing
in present cryptography and to introduce the reader to basic post-quantum
algorithms. In particular the reader can delve into the following subjects:
present cryptographic schemes (symmetric and asymmetric), differences between
quantum and classical computing, challenges in quantum computing, quantum
algorithms (Shor's and Grover's), public key encryption schemes affected,
symmetric schemes affected, the impact on hash functions, and post quantum
cryptography. Specifically, the section of Post-Quantum Cryptography deals with
different quantum key distribution methods and mathematicalbased solutions,
such as the BB84 protocol, lattice-based cryptography, multivariate-based
cryptography, hash-based signatures and code-based cryptography. The aim of this paper is to elucidate the implications of quantum computing in present cryptography and to introduce the reader to basic post-quantum algorithms. In particular the reader can delve into the following subjects: present cryptographic schemes (symmetric and asymmetric), differences between quantum and classical computing, challenges in quantum computing, quantum algorithms (Shor's and Grover's), public key encryption schemes affected, symmetric schemes affected, the impact on hash functions, and post quantum cryptography. Specifically, the section of Post-Quantum Cryptography deals with different quantum key distribution methods and mathematicalbased solutions, such as the BB84 protocol, lattice-based cryptography, multivariate-based cryptography, hash-based signatures and code-based cryptography. |
Author | Jøsang, Audun Kamer Vishi Zych, Mateusz D Mavroeidis, Vasileios |
Author_xml | – sequence: 1 givenname: Vasileios surname: Mavroeidis fullname: Mavroeidis, Vasileios – sequence: 2 fullname: Kamer Vishi – sequence: 3 givenname: Mateusz surname: Zych middlename: D fullname: Zych, Mateusz D – sequence: 4 givenname: Audun surname: Jøsang fullname: Jøsang, Audun |
BackLink | https://doi.org/10.48550/arXiv.1804.00200$$DView paper in arXiv https://doi.org/10.14569/IJACSA.2018.090354$$DView published paper (Access to full text may be restricted) |
BookMark | eNotj1FLwzAYRYMoOOd-gE8GfG5NviRN8yhF52CgQt9L1iZbh01i2or999bNpwuXw-WeG3TpvDMI3VGS8lwI8qjjT_ud0pzwlBAg5AItgDGa5BzgGq36_kjmPpMgBFsgWR4M3nRB1wP2Fn-M2g1jhwvfhXFo3R57h9-j6Y0bcBGnMPh91OEw3aIrqz97s_rPJSpfnsviNdm-rTfF0zbRAmSia8KtkJA1QhtbZ41Rhtm6VllDMgrWMK13NLfAORhogGZGUQVyR7lQ3AJbovvz7MmqCrHtdJyqP7vqZDcTD2ciRP81mn6ojn6Mbv5UAZFUCSGkZL95b1NE |
ContentType | Paper Journal Article |
Copyright | 2018. This work is published under http://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. http://creativecommons.org/licenses/by/4.0 |
Copyright_xml | – notice: 2018. This work is published under http://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. – notice: http://creativecommons.org/licenses/by/4.0 |
DBID | 8FE 8FG ABJCF ABUWG AFKRA AZQEC BENPR BGLVJ CCPQU DWQXO HCIFZ L6V M7S PHGZM PHGZT PIMPY PKEHL PQEST PQGLB PQQKQ PQUKI PRINS PTHSS AKY GOX |
DOI | 10.48550/arxiv.1804.00200 |
DatabaseName | ProQuest SciTech Collection ProQuest Technology Collection Materials Science & Engineering Collection ProQuest Central (Alumni) ProQuest Central UK/Ireland ProQuest Central Essentials ProQuest Central Technology Collection ProQuest One Community College ProQuest Central SciTech Premium Collection ProQuest Engineering Collection Engineering Database ProQuest Central Premium ProQuest One Academic (New) Publicly Available Content Database ProQuest One Academic Middle East (New) ProQuest One Academic Eastern Edition (DO NOT USE) ProQuest One Applied & Life Sciences ProQuest One Academic ProQuest One Academic UKI Edition ProQuest Central China Engineering Collection arXiv Computer Science arXiv.org |
DatabaseTitle | Publicly Available Content Database Engineering Database Technology Collection ProQuest One Academic Middle East (New) ProQuest Central Essentials ProQuest One Academic Eastern Edition ProQuest Central (Alumni Edition) SciTech Premium Collection ProQuest One Community College ProQuest Technology Collection ProQuest SciTech Collection ProQuest Central China ProQuest Central ProQuest One Applied & Life Sciences ProQuest Engineering Collection ProQuest One Academic UKI Edition ProQuest Central Korea Materials Science & Engineering Collection ProQuest Central (New) ProQuest One Academic ProQuest One Academic (New) Engineering Collection |
DatabaseTitleList | Publicly Available Content Database |
Database_xml | – sequence: 1 dbid: GOX name: arXiv.org url: http://arxiv.org/find sourceTypes: Open Access Repository – sequence: 2 dbid: 8FG name: ProQuest Technology Collection url: https://search.proquest.com/technologycollection1 sourceTypes: Aggregation Database |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Physics |
EISSN | 2331-8422 |
ExternalDocumentID | 1804_00200 |
Genre | Working Paper/Pre-Print |
GroupedDBID | 8FE 8FG ABJCF ABUWG AFKRA ALMA_UNASSIGNED_HOLDINGS AZQEC BENPR BGLVJ CCPQU DWQXO FRJ HCIFZ L6V M7S M~E PHGZM PHGZT PIMPY PKEHL PQEST PQGLB PQQKQ PQUKI PRINS PTHSS AKY GOX |
ID | FETCH-LOGICAL-a527-ac04f5726d5aefc6de9e3fcc96d0612fe3aab18f2442e2d216e91927b14594f23 |
IEDL.DBID | 8FG |
IngestDate | Wed Jul 23 01:27:24 EDT 2025 Mon Jun 30 09:22:39 EDT 2025 |
IsDoiOpenAccess | true |
IsOpenAccess | true |
IsPeerReviewed | false |
IsScholarly | false |
Language | English |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-a527-ac04f5726d5aefc6de9e3fcc96d0612fe3aab18f2442e2d216e91927b14594f23 |
Notes | SourceType-Working Papers-1 ObjectType-Working Paper/Pre-Print-1 content type line 50 |
OpenAccessLink | https://www.proquest.com/docview/2071955577?pq-origsite=%requestingapplication% |
PQID | 2071955577 |
PQPubID | 2050157 |
ParticipantIDs | arxiv_primary_1804_00200 proquest_journals_2071955577 |
PublicationCentury | 2000 |
PublicationDate | 20180331 2018-03-31 |
PublicationDateYYYYMMDD | 2018-03-31 |
PublicationDate_xml | – month: 03 year: 2018 text: 20180331 day: 31 |
PublicationDecade | 2010 |
PublicationPlace | Ithaca |
PublicationPlace_xml | – name: Ithaca |
PublicationTitle | arXiv.org |
PublicationYear | 2018 |
Publisher | Cornell University Library, arXiv.org |
Publisher_xml | – name: Cornell University Library, arXiv.org |
SSID | ssj0002672553 |
Score | 1.6528487 |
SecondaryResourceType | preprint |
Snippet | The aim of this paper is to elucidate the implications of quantum computing in present cryptography and to introduce the reader to basic post-quantum... International Journal of Advanced Computer Science and Applications (IJACSA), 9(3), 405-414, March 2018 The aim of this paper is to elucidate the implications... |
SourceID | arxiv proquest |
SourceType | Open Access Repository Aggregation Database |
SubjectTerms | Algorithms Computation Computer Science - Cryptography and Security Cryptography Data encryption Encryption Hash based algorithms Quantum computing Quantum cryptography Quantum theory |
SummonAdditionalLinks | – databaseName: arXiv.org dbid: GOX link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwdV1LSwMxEB7anryIotJqlRy8Bpv37lGKtQq-oEJvS57gwbb0hf57p9ktHsRrSA4zX5j5hmS-AbhOhdUYAw3lIkgqvR3QwpeJOoXwW6ZTkYfBPD3r8bt8nKppC8i-F8Yuvz62tT6wW92wIotbI5JtaHO--7J1_zKtHyezFFez_3cfcsy89Ce05nwxOoLDhuiR2xqZY2jF2QkYRIU85MZEMk_kbYN2bT5JPVoBkwiZz8hr3RBEhsvvxboRlD6FyehuMhzTZnQBtYobav1AJmW4DsrG5HWIZRTJ-1KHHaVIUVjrWJEwt_LIA2c6lki1jGNSlTJxcQYdrP5jF4gLxiblsSqKTKIXrQgsuiCkMgK5juhBNxtcLWp1imrniyr7ogf9vQ-q5mauKo6colRKGXP-_8kLOEBi0PTe9aGzXm7iJSbftbvKCPwA0hKDew priority: 102 providerName: Cornell University |
Title | The Impact of Quantum Computing on Present Cryptography |
URI | https://www.proquest.com/docview/2071955577 https://arxiv.org/abs/1804.00200 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwfV09T8MwELWgERIbn2qhVB5YDbUd28mERNUPkFoKKlK3yPGHxEAS0hbBwm_HcVIYkFgiJZnyzrr3cvbdA-DSRpK7HCgQoTpEoZJ9FKnYopS58EvMbeTNYKYzPnkO75ds2RTcVs2xym1O9Ila56qqkVeVEBwzxoS4Kd5Q5RpV7a42Fhq7IMCOaaoVHo3GPzUWwoVTzLTezPSju65l-fHyfoUjPzSbVH1tgX_0JxV7fhkdgGAuC1Megh2THYE9fyxTrY6BcFGEd76REeYWPm4cDptXWFsxONKBeQbndQMRHJSfxboZQH0CFqPhYjBBjdUBkowIJFU_tEwQrpk0VnFtYkOtUjHXlQSxhkqZ4sg6LiaGaIK5iZ00EykOWRxaQk9BK8sz0wYw1UJaptxflMGhQ11SjU2qacgEddqIdkDbf3BS1NMskgqLxGPRAd0tBkmzklfJL-5n_78-B_tOTDT9el3QWpcbc-EIe532fFR6ILgdzuZP7m78sHTX6dfwG-3fmCE |
linkProvider | ProQuest |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV07T8MwELaqVgg2nmqhgAcYDY0fcTIghkJp6UNFKlK3yPFDYqAJfQD9UfxHbKeFAYmtazLlu8t35_PddwBcmEiElgM5wkRRRKVooEjGBqXMml8EoYn8Mpj-IGw_08cxG5fA13oWxrVVrjnRE7XKpKuRu0pIEDPGOL_N35DbGuVuV9crNAq36Orlhz2yzW46d9a-lxi37kfNNlptFUCCYY6EbFDDOA4VE9rIUOlYEyNlHCoX7Y0mQqRBZGzYwxorHIQ6tlkQTwPKYmqczoFl_AolJHYdhFHr4aekg0NuE3RS3J16pbBrMf18eb8KIq_Rjd0YXcU_-sP8Ppy1dkFlKHI93QMlPdkHW74LVM4OALdOAzt-bhJmBj4tLOyLV1hsfrAxDmYTOCzmlWBzusznK73rQzDaBAZHoDzJJroKYKq4MEzaQ5sOqDWyICrQqSKUcWJTMVIDVf_BSV6IZyQOi8RjUQP1NQbJ6seZJb9mPv7_9TnYbo_6vaTXGXRPwI7NY1ajgnVQnk8X-tTmCvP0zFsIgmTDHvENtJLQyQ |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=The+Impact+of+Quantum+Computing+on+Present+Cryptography&rft.jtitle=arXiv.org&rft.au=Mavroeidis%2C+Vasileios&rft.au=Kamer+Vishi&rft.au=Zych%2C+Mateusz+D&rft.au=J%C3%B8sang%2C+Audun&rft.date=2018-03-31&rft.pub=Cornell+University+Library%2C+arXiv.org&rft.eissn=2331-8422&rft_id=info:doi/10.48550%2Farxiv.1804.00200 |