The Impact of Quantum Computing on Present Cryptography

The aim of this paper is to elucidate the implications of quantum computing in present cryptography and to introduce the reader to basic post-quantum algorithms. In particular the reader can delve into the following subjects: present cryptographic schemes (symmetric and asymmetric), differences betw...

Full description

Saved in:
Bibliographic Details
Published inarXiv.org
Main Authors Mavroeidis, Vasileios, Kamer Vishi, Zych, Mateusz D, Jøsang, Audun
Format Paper Journal Article
LanguageEnglish
Published Ithaca Cornell University Library, arXiv.org 31.03.2018
Subjects
Online AccessGet full text
ISSN2331-8422
DOI10.48550/arxiv.1804.00200

Cover

Loading…
Abstract The aim of this paper is to elucidate the implications of quantum computing in present cryptography and to introduce the reader to basic post-quantum algorithms. In particular the reader can delve into the following subjects: present cryptographic schemes (symmetric and asymmetric), differences between quantum and classical computing, challenges in quantum computing, quantum algorithms (Shor's and Grover's), public key encryption schemes affected, symmetric schemes affected, the impact on hash functions, and post quantum cryptography. Specifically, the section of Post-Quantum Cryptography deals with different quantum key distribution methods and mathematicalbased solutions, such as the BB84 protocol, lattice-based cryptography, multivariate-based cryptography, hash-based signatures and code-based cryptography.
AbstractList International Journal of Advanced Computer Science and Applications (IJACSA), 9(3), 405-414, March 2018 The aim of this paper is to elucidate the implications of quantum computing in present cryptography and to introduce the reader to basic post-quantum algorithms. In particular the reader can delve into the following subjects: present cryptographic schemes (symmetric and asymmetric), differences between quantum and classical computing, challenges in quantum computing, quantum algorithms (Shor's and Grover's), public key encryption schemes affected, symmetric schemes affected, the impact on hash functions, and post quantum cryptography. Specifically, the section of Post-Quantum Cryptography deals with different quantum key distribution methods and mathematicalbased solutions, such as the BB84 protocol, lattice-based cryptography, multivariate-based cryptography, hash-based signatures and code-based cryptography.
The aim of this paper is to elucidate the implications of quantum computing in present cryptography and to introduce the reader to basic post-quantum algorithms. In particular the reader can delve into the following subjects: present cryptographic schemes (symmetric and asymmetric), differences between quantum and classical computing, challenges in quantum computing, quantum algorithms (Shor's and Grover's), public key encryption schemes affected, symmetric schemes affected, the impact on hash functions, and post quantum cryptography. Specifically, the section of Post-Quantum Cryptography deals with different quantum key distribution methods and mathematicalbased solutions, such as the BB84 protocol, lattice-based cryptography, multivariate-based cryptography, hash-based signatures and code-based cryptography.
Author Jøsang, Audun
Kamer Vishi
Zych, Mateusz D
Mavroeidis, Vasileios
Author_xml – sequence: 1
  givenname: Vasileios
  surname: Mavroeidis
  fullname: Mavroeidis, Vasileios
– sequence: 2
  fullname: Kamer Vishi
– sequence: 3
  givenname: Mateusz
  surname: Zych
  middlename: D
  fullname: Zych, Mateusz D
– sequence: 4
  givenname: Audun
  surname: Jøsang
  fullname: Jøsang, Audun
BackLink https://doi.org/10.48550/arXiv.1804.00200$$DView paper in arXiv
https://doi.org/10.14569/IJACSA.2018.090354$$DView published paper (Access to full text may be restricted)
BookMark eNotj1FLwzAYRYMoOOd-gE8GfG5NviRN8yhF52CgQt9L1iZbh01i2or999bNpwuXw-WeG3TpvDMI3VGS8lwI8qjjT_ud0pzwlBAg5AItgDGa5BzgGq36_kjmPpMgBFsgWR4M3nRB1wP2Fn-M2g1jhwvfhXFo3R57h9-j6Y0bcBGnMPh91OEw3aIrqz97s_rPJSpfnsviNdm-rTfF0zbRAmSia8KtkJA1QhtbZ41Rhtm6VllDMgrWMK13NLfAORhogGZGUQVyR7lQ3AJbovvz7MmqCrHtdJyqP7vqZDcTD2ciRP81mn6ojn6Mbv5UAZFUCSGkZL95b1NE
ContentType Paper
Journal Article
Copyright 2018. This work is published under http://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
http://creativecommons.org/licenses/by/4.0
Copyright_xml – notice: 2018. This work is published under http://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
– notice: http://creativecommons.org/licenses/by/4.0
DBID 8FE
8FG
ABJCF
ABUWG
AFKRA
AZQEC
BENPR
BGLVJ
CCPQU
DWQXO
HCIFZ
L6V
M7S
PHGZM
PHGZT
PIMPY
PKEHL
PQEST
PQGLB
PQQKQ
PQUKI
PRINS
PTHSS
AKY
GOX
DOI 10.48550/arxiv.1804.00200
DatabaseName ProQuest SciTech Collection
ProQuest Technology Collection
Materials Science & Engineering Collection
ProQuest Central (Alumni)
ProQuest Central UK/Ireland
ProQuest Central Essentials
ProQuest Central
Technology Collection
ProQuest One Community College
ProQuest Central
SciTech Premium Collection
ProQuest Engineering Collection
Engineering Database
ProQuest Central Premium
ProQuest One Academic (New)
Publicly Available Content Database
ProQuest One Academic Middle East (New)
ProQuest One Academic Eastern Edition (DO NOT USE)
ProQuest One Applied & Life Sciences
ProQuest One Academic
ProQuest One Academic UKI Edition
ProQuest Central China
Engineering Collection
arXiv Computer Science
arXiv.org
DatabaseTitle Publicly Available Content Database
Engineering Database
Technology Collection
ProQuest One Academic Middle East (New)
ProQuest Central Essentials
ProQuest One Academic Eastern Edition
ProQuest Central (Alumni Edition)
SciTech Premium Collection
ProQuest One Community College
ProQuest Technology Collection
ProQuest SciTech Collection
ProQuest Central China
ProQuest Central
ProQuest One Applied & Life Sciences
ProQuest Engineering Collection
ProQuest One Academic UKI Edition
ProQuest Central Korea
Materials Science & Engineering Collection
ProQuest Central (New)
ProQuest One Academic
ProQuest One Academic (New)
Engineering Collection
DatabaseTitleList
Publicly Available Content Database
Database_xml – sequence: 1
  dbid: GOX
  name: arXiv.org
  url: http://arxiv.org/find
  sourceTypes: Open Access Repository
– sequence: 2
  dbid: 8FG
  name: ProQuest Technology Collection
  url: https://search.proquest.com/technologycollection1
  sourceTypes: Aggregation Database
DeliveryMethod fulltext_linktorsrc
Discipline Physics
EISSN 2331-8422
ExternalDocumentID 1804_00200
Genre Working Paper/Pre-Print
GroupedDBID 8FE
8FG
ABJCF
ABUWG
AFKRA
ALMA_UNASSIGNED_HOLDINGS
AZQEC
BENPR
BGLVJ
CCPQU
DWQXO
FRJ
HCIFZ
L6V
M7S
M~E
PHGZM
PHGZT
PIMPY
PKEHL
PQEST
PQGLB
PQQKQ
PQUKI
PRINS
PTHSS
AKY
GOX
ID FETCH-LOGICAL-a527-ac04f5726d5aefc6de9e3fcc96d0612fe3aab18f2442e2d216e91927b14594f23
IEDL.DBID 8FG
IngestDate Wed Jul 23 01:27:24 EDT 2025
Mon Jun 30 09:22:39 EDT 2025
IsDoiOpenAccess true
IsOpenAccess true
IsPeerReviewed false
IsScholarly false
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-a527-ac04f5726d5aefc6de9e3fcc96d0612fe3aab18f2442e2d216e91927b14594f23
Notes SourceType-Working Papers-1
ObjectType-Working Paper/Pre-Print-1
content type line 50
OpenAccessLink https://www.proquest.com/docview/2071955577?pq-origsite=%requestingapplication%
PQID 2071955577
PQPubID 2050157
ParticipantIDs arxiv_primary_1804_00200
proquest_journals_2071955577
PublicationCentury 2000
PublicationDate 20180331
2018-03-31
PublicationDateYYYYMMDD 2018-03-31
PublicationDate_xml – month: 03
  year: 2018
  text: 20180331
  day: 31
PublicationDecade 2010
PublicationPlace Ithaca
PublicationPlace_xml – name: Ithaca
PublicationTitle arXiv.org
PublicationYear 2018
Publisher Cornell University Library, arXiv.org
Publisher_xml – name: Cornell University Library, arXiv.org
SSID ssj0002672553
Score 1.6528487
SecondaryResourceType preprint
Snippet The aim of this paper is to elucidate the implications of quantum computing in present cryptography and to introduce the reader to basic post-quantum...
International Journal of Advanced Computer Science and Applications (IJACSA), 9(3), 405-414, March 2018 The aim of this paper is to elucidate the implications...
SourceID arxiv
proquest
SourceType Open Access Repository
Aggregation Database
SubjectTerms Algorithms
Computation
Computer Science - Cryptography and Security
Cryptography
Data encryption
Encryption
Hash based algorithms
Quantum computing
Quantum cryptography
Quantum theory
SummonAdditionalLinks – databaseName: arXiv.org
  dbid: GOX
  link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwdV1LSwMxEB7anryIotJqlRy8Bpv37lGKtQq-oEJvS57gwbb0hf57p9ktHsRrSA4zX5j5hmS-AbhOhdUYAw3lIkgqvR3QwpeJOoXwW6ZTkYfBPD3r8bt8nKppC8i-F8Yuvz62tT6wW92wIotbI5JtaHO--7J1_zKtHyezFFez_3cfcsy89Ce05nwxOoLDhuiR2xqZY2jF2QkYRIU85MZEMk_kbYN2bT5JPVoBkwiZz8hr3RBEhsvvxboRlD6FyehuMhzTZnQBtYobav1AJmW4DsrG5HWIZRTJ-1KHHaVIUVjrWJEwt_LIA2c6lki1jGNSlTJxcQYdrP5jF4gLxiblsSqKTKIXrQgsuiCkMgK5juhBNxtcLWp1imrniyr7ogf9vQ-q5mauKo6colRKGXP-_8kLOEBi0PTe9aGzXm7iJSbftbvKCPwA0hKDew
  priority: 102
  providerName: Cornell University
Title The Impact of Quantum Computing on Present Cryptography
URI https://www.proquest.com/docview/2071955577
https://arxiv.org/abs/1804.00200
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwfV09T8MwELWgERIbn2qhVB5YDbUd28mERNUPkFoKKlK3yPGHxEAS0hbBwm_HcVIYkFgiJZnyzrr3cvbdA-DSRpK7HCgQoTpEoZJ9FKnYopS58EvMbeTNYKYzPnkO75ds2RTcVs2xym1O9Ila56qqkVeVEBwzxoS4Kd5Q5RpV7a42Fhq7IMCOaaoVHo3GPzUWwoVTzLTezPSju65l-fHyfoUjPzSbVH1tgX_0JxV7fhkdgGAuC1Megh2THYE9fyxTrY6BcFGEd76REeYWPm4cDptXWFsxONKBeQbndQMRHJSfxboZQH0CFqPhYjBBjdUBkowIJFU_tEwQrpk0VnFtYkOtUjHXlQSxhkqZ4sg6LiaGaIK5iZ00EykOWRxaQk9BK8sz0wYw1UJaptxflMGhQ11SjU2qacgEddqIdkDbf3BS1NMskgqLxGPRAd0tBkmzklfJL-5n_78-B_tOTDT9el3QWpcbc-EIe532fFR6ILgdzuZP7m78sHTX6dfwG-3fmCE
linkProvider ProQuest
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV07T8MwELaqVgg2nmqhgAcYDY0fcTIghkJp6UNFKlK3yPFDYqAJfQD9UfxHbKeFAYmtazLlu8t35_PddwBcmEiElgM5wkRRRKVooEjGBqXMml8EoYn8Mpj-IGw_08cxG5fA13oWxrVVrjnRE7XKpKuRu0pIEDPGOL_N35DbGuVuV9crNAq36Orlhz2yzW46d9a-lxi37kfNNlptFUCCYY6EbFDDOA4VE9rIUOlYEyNlHCoX7Y0mQqRBZGzYwxorHIQ6tlkQTwPKYmqczoFl_AolJHYdhFHr4aekg0NuE3RS3J16pbBrMf18eb8KIq_Rjd0YXcU_-sP8Ppy1dkFlKHI93QMlPdkHW74LVM4OALdOAzt-bhJmBj4tLOyLV1hsfrAxDmYTOCzmlWBzusznK73rQzDaBAZHoDzJJroKYKq4MEzaQ5sOqDWyICrQqSKUcWJTMVIDVf_BSV6IZyQOi8RjUQP1NQbJ6seZJb9mPv7_9TnYbo_6vaTXGXRPwI7NY1ajgnVQnk8X-tTmCvP0zFsIgmTDHvENtJLQyQ
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=The+Impact+of+Quantum+Computing+on+Present+Cryptography&rft.jtitle=arXiv.org&rft.au=Mavroeidis%2C+Vasileios&rft.au=Kamer+Vishi&rft.au=Zych%2C+Mateusz+D&rft.au=J%C3%B8sang%2C+Audun&rft.date=2018-03-31&rft.pub=Cornell+University+Library%2C+arXiv.org&rft.eissn=2331-8422&rft_id=info:doi/10.48550%2Farxiv.1804.00200