The Impact of Quantum Computing on Present Cryptography
The aim of this paper is to elucidate the implications of quantum computing in present cryptography and to introduce the reader to basic post-quantum algorithms. In particular the reader can delve into the following subjects: present cryptographic schemes (symmetric and asymmetric), differences betw...
Saved in:
Published in | International journal of advanced computer science & applications Vol. 9; no. 3 |
---|---|
Main Authors | , , , |
Format | Journal Article |
Language | English |
Published |
West Yorkshire
Science and Information (SAI) Organization Limited
2018
The Science and Information Organization |
Subjects | |
Online Access | Get full text |
Cover
Loading…
Abstract | The aim of this paper is to elucidate the implications of quantum computing in present cryptography and to introduce the reader to basic post-quantum algorithms. In particular the reader can delve into the following subjects: present cryptographic schemes (symmetric and asymmetric), differences between quantum and classical computing, challenges in quantum computing, quantum algorithms (Shor’s and Grover’s), public key encryption schemes affected, symmetric schemes affected, the impact on hash functions, and post quantum cryptography. Specifically, the section of Post-Quantum Cryptography deals with different quantum key distribution methods and mathematicalbased solutions, such as the BB84 protocol, lattice-based cryptography, multivariate-based cryptography, hash-based signatures and code-based cryptography. |
---|---|
AbstractList | The aim of this paper is to elucidate the implications of quantum computing in present cryptography and to introduce the reader to basic post-quantum algorithms. In particular the reader can delve into the following subjects: present cryptographic schemes (symmetric and asymmetric), differences between quantum and classical computing, challenges in quantum computing, quantum algorithms (Shor’s and Grover’s), public key encryption schemes affected, symmetric schemes affected, the impact on hash functions, and post quantum cryptography. Specifically, the section of Post-Quantum Cryptography deals with different quantum key distribution methods and mathematical-based solutions, such as the BB84 protocol, lattice-based cryptography, multivariate-based cryptography, hash-based signatures and code-based cryptography. The aim of this paper is to elucidate the implications of quantum computing in present cryptography and to introduce the reader to basic post-quantum algorithms. In particular the reader can delve into the following subjects: present cryptographic schemes (symmetric and asymmetric), differences between quantum and classical computing, challenges in quantum computing, quantum algorithms (Shor’s and Grover’s), public key encryption schemes affected, symmetric schemes affected, the impact on hash functions, and post quantum cryptography. Specifically, the section of Post-Quantum Cryptography deals with different quantum key distribution methods and mathematicalbased solutions, such as the BB84 protocol, lattice-based cryptography, multivariate-based cryptography, hash-based signatures and code-based cryptography. |
Author | Jøsang, Audun Vishi, Kamer D., Mateusz Mavroeidis, Vasileios |
Author_xml | – sequence: 1 givenname: Vasileios surname: Mavroeidis fullname: Mavroeidis, Vasileios – sequence: 2 givenname: Kamer surname: Vishi fullname: Vishi, Kamer – sequence: 3 givenname: Mateusz surname: D. fullname: D., Mateusz – sequence: 4 givenname: Audun surname: Jøsang fullname: Jøsang, Audun |
BookMark | eNp9kL1OwzAUhS1UJErpEzAQiTnF_3HGKoJSVAkQRWKznNRpUzV2sJ2hb49pYGHg3uHe4Zyjo-8SjIw1GoBrBGeIMp7fLZ_mxdt8hiESM5hDwugZGGPEeMpYBkenX6QIZh8XYOr9HsYhOeaCjEG23ulk2XaqComtk9demdC3SWHbrg-N2SbWJC9Oe21CUrhjF-zWqW53vALntTp4Pf25E_D-cL8uHtPV82JZzFdpRSgP6QaJuoQlgyTDFOdU0Q0XFVeYCaFqlhGsNa8xVYQJrBlHtIS1oGVcvSEVJxNwM-RWrvGxkDTWKYmgYFhmKBc0Km4HRefsZ699kHvbOxNLScwZpxjGE1X5b4713ulaVk1QobEmONUcYqI8wZQDTPkNUw4wo5f88XauaZU7_uv6AjPmdoA |
CitedBy_id | crossref_primary_10_1016_j_ijinfomgt_2024_102776 crossref_primary_10_1109_ACCESS_2024_3485875 crossref_primary_10_1109_COMST_2023_3309051 crossref_primary_10_1038_s41598_024_65800_z crossref_primary_10_1002_spy2_203 crossref_primary_10_3390_jcp2030027 crossref_primary_10_1007_s43762_022_00070_x crossref_primary_10_1109_OJVT_2022_3183218 crossref_primary_10_3390_electronics12030546 crossref_primary_10_3390_e25060855 crossref_primary_10_56977_jicce_2022_20_4_242 crossref_primary_10_1038_s41534_021_00373_7 crossref_primary_10_3390_s22052057 crossref_primary_10_3390_sym14081625 crossref_primary_10_1007_s11831_021_09578_7 crossref_primary_10_1002_wics_1644 crossref_primary_10_1103_PhysRevA_100_042329 crossref_primary_10_1109_ACCESS_2024_3485602 crossref_primary_10_25046_aj070609 crossref_primary_10_1038_s41534_020_00327_5 crossref_primary_10_1109_TIFS_2025_3526049 crossref_primary_10_1038_s41598_024_60758_4 crossref_primary_10_1109_MS_2020_2985321 crossref_primary_10_1109_TNSM_2024_3487265 crossref_primary_10_1007_s41965_021_00073_3 crossref_primary_10_1103_PhysRevApplied_13_054033 crossref_primary_10_1109_ACCESS_2024_3473901 crossref_primary_10_1364_JOCN_509269 crossref_primary_10_15673_atbp_v15i2_2527 crossref_primary_10_3390_fi15020083 crossref_primary_10_54105_ijcns_A1402_051121 crossref_primary_10_1080_08874417_2023_2260333 crossref_primary_10_1109_ACCESS_2021_3059623 crossref_primary_10_3390_su142315901 crossref_primary_10_1088_1757_899X_1090_1_012063 crossref_primary_10_1109_OJCOMS_2020_2989738 crossref_primary_10_3390_electronics13132649 crossref_primary_10_1007_s10773_020_04698_5 crossref_primary_10_62056_a3w7tr_10k crossref_primary_10_1109_ACCESS_2024_3462531 crossref_primary_10_3389_fbinf_2024_1401223 crossref_primary_10_1080_23270012_2022_2089064 crossref_primary_10_1007_s11227_022_04923_4 crossref_primary_10_1177_18479790241301163 crossref_primary_10_3390_app11052082 crossref_primary_10_1103_PhysRevA_109_052408 crossref_primary_10_54097_hset_v38i_5875 crossref_primary_10_17671_gazibtd_733309 crossref_primary_10_1109_ACCESS_2024_3390244 crossref_primary_10_1016_j_neunet_2024_107004 crossref_primary_10_1109_TDSC_2024_3378474 crossref_primary_10_1051_sands_2023021 crossref_primary_10_56394_aris2_v2i2_17 crossref_primary_10_1109_ACCESS_2020_3031595 crossref_primary_10_1109_TMLCN_2023_3321285 crossref_primary_10_4236_jqis_2022_123006 crossref_primary_10_15864_ijiip_2405 crossref_primary_10_1093_jigpal_jzae072 crossref_primary_10_1109_LCA_2023_3318857 crossref_primary_10_1109_TVLSI_2021_3129107 crossref_primary_10_1007_s11042_023_17929_8 crossref_primary_10_1007_s12652_022_03875_0 crossref_primary_10_1016_j_cose_2022_102914 crossref_primary_10_1145_3445979 crossref_primary_10_1007_s42979_020_00201_3 crossref_primary_10_35940_ijcns_A1402_051121 crossref_primary_10_1103_PhysRevA_110_062404 |
ContentType | Journal Article |
Copyright | 2018. This work is licensed under https://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. info:eu-repo/semantics/openAccess |
Copyright_xml | – notice: 2018. This work is licensed under https://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. – notice: info:eu-repo/semantics/openAccess |
DBID | AAYXX CITATION 3V. 7XB 8FE 8FG 8FK 8G5 ABUWG AFKRA ARAPS AZQEC BENPR BGLVJ CCPQU DWQXO GNUQQ GUQSH HCIFZ JQ2 K7- M2O MBDVC P5Z P62 PHGZM PHGZT PIMPY PKEHL PQEST PQGLB PQQKQ PQUKI PRINS Q9U 3HK |
DOI | 10.14569/IJACSA.2018.090354 |
DatabaseName | CrossRef ProQuest Central (Corporate) ProQuest Central (purchase pre-March 2016) ProQuest SciTech Collection ProQuest Technology Collection ProQuest Central (Alumni) (purchase pre-March 2016) ProQuest Research Library ProQuest Central (Alumni) ProQuest Central UK/Ireland Advanced Technologies & Aerospace Collection ProQuest Central Essentials ProQuest Central Technology Collection ProQuest One Community College ProQuest Central Korea ProQuest Central Student Research Library Prep ProQuest SciTech Premium Collection ProQuest Computer Science Collection Computer Science Database Research Library Research Library (Corporate) Advanced Technologies & Aerospace Database ProQuest Advanced Technologies & Aerospace Collection ProQuest Central Premium ProQuest One Academic Publicly Available Content Database ProQuest One Academic Middle East (New) ProQuest One Academic Eastern Edition (DO NOT USE) ProQuest One Applied & Life Sciences ProQuest One Academic ProQuest One Academic UKI Edition ProQuest Central China ProQuest Central Basic NORA - Norwegian Open Research Archives |
DatabaseTitle | CrossRef Publicly Available Content Database Research Library Prep Computer Science Database ProQuest Central Student Technology Collection ProQuest One Academic Middle East (New) ProQuest Advanced Technologies & Aerospace Collection ProQuest Central Essentials ProQuest Computer Science Collection ProQuest Central (Alumni Edition) SciTech Premium Collection ProQuest One Community College Research Library (Alumni Edition) ProQuest Central China ProQuest Central ProQuest One Applied & Life Sciences ProQuest Central Korea ProQuest Research Library ProQuest Central (New) Advanced Technologies & Aerospace Collection ProQuest Central Basic ProQuest One Academic Eastern Edition ProQuest Technology Collection ProQuest SciTech Collection Advanced Technologies & Aerospace Database ProQuest One Academic UKI Edition ProQuest One Academic ProQuest One Academic (New) ProQuest Central (Alumni) |
DatabaseTitleList | Publicly Available Content Database |
Database_xml | – sequence: 1 dbid: 8FG name: ProQuest Technology Collection url: https://search.proquest.com/technologycollection1 sourceTypes: Aggregation Database |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Computer Science |
EISSN | 2156-5570 |
ExternalDocumentID | 10852_71984 10_14569_IJACSA_2018_090354 |
GroupedDBID | .DC 5VS 8G5 AAYXX ABUWG ADMLS AFKRA ALMA_UNASSIGNED_HOLDINGS ARAPS AZQEC BENPR BGLVJ CCPQU CITATION DWQXO EBS EJD GNUQQ GUQSH HCIFZ K7- KQ8 M2O OK1 PHGZM PHGZT PIMPY RNS 3V. 7XB 8FE 8FG 8FK JQ2 MBDVC P62 PKEHL PQEST PQGLB PQQKQ PQUKI PRINS Q9U 3HK GROUPED_DOAJ |
ID | FETCH-LOGICAL-c346t-d18fb0b503724294a4d68c6a2588af5732ee6f24a3582e5614b0f84b4b4ed3c63 |
IEDL.DBID | BENPR |
ISSN | 2158-107X |
IngestDate | Sat Apr 29 05:43:37 EDT 2023 Mon Jul 14 08:22:07 EDT 2025 Tue Jul 01 04:11:32 EDT 2025 Thu Apr 24 22:51:17 EDT 2025 |
IsDoiOpenAccess | true |
IsOpenAccess | true |
IsPeerReviewed | false |
IsScholarly | true |
Issue | 3 |
Language | English |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c346t-d18fb0b503724294a4d68c6a2588af5732ee6f24a3582e5614b0f84b4b4ed3c63 |
Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 NFR/247648 |
OpenAccessLink | https://www.proquest.com/docview/2656420265?pq-origsite=%requestingapplication% |
PQID | 2656420265 |
PQPubID | 5444811 |
ParticipantIDs | cristin_nora_10852_71984 proquest_journals_2656420265 crossref_citationtrail_10_14569_IJACSA_2018_090354 crossref_primary_10_14569_IJACSA_2018_090354 |
ProviderPackageCode | CITATION AAYXX |
PublicationCentury | 2000 |
PublicationDate | 2018-00-00 |
PublicationDateYYYYMMDD | 2018-01-01 |
PublicationDate_xml | – year: 2018 text: 2018-00-00 |
PublicationDecade | 2010 |
PublicationPlace | West Yorkshire |
PublicationPlace_xml | – name: West Yorkshire |
PublicationTitle | International journal of advanced computer science & applications |
PublicationYear | 2018 |
Publisher | Science and Information (SAI) Organization Limited The Science and Information Organization |
Publisher_xml | – name: Science and Information (SAI) Organization Limited – name: The Science and Information Organization |
SSID | ssj0000392683 |
Score | 2.4447122 |
Snippet | The aim of this paper is to elucidate the implications of quantum computing in present cryptography and to introduce the reader to basic post-quantum... |
SourceID | cristin proquest crossref |
SourceType | Open Access Repository Aggregation Database Enrichment Source Index Database |
SubjectTerms | Algorithms Cryptography Hash based algorithms Quantum computing Quantum cryptography |
Title | The Impact of Quantum Computing on Present Cryptography |
URI | https://www.proquest.com/docview/2656420265 http://hdl.handle.net/10852/71984 |
Volume | 9 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwfV07T8MwED7RIiQW3qiFgjwwEpqH4zgTKlVLiwQqL6mb5VcmSAu0A_-ec-KCuqCMsTN8vrvvfLG_A7goZBHZKMqDjEsWoFGgz8WpCZiu5KaQUaQrDdw_sNErvZumU19w-_LHKlcxsQrUZqZdjbwbY-JBcafO0uv5R-C6Rrm_q76FRgM2MQRz3oTNm8HD5Om3yhIi_bNKixOpzemYZlMvPYSJQ94d3_X6zz13wItfuYKFawqwpSvvKteJaj1OV-Qz3IMdnzWSXr3M-7BhywPYXXVkIN5BDyHDVSfj6uIjmRXkcYm4Ld9JPRBJisxKMqkvHJH-5_d84QWrj-B1OHjpjwLfGiHQCWWLwES8UKFKwyRDjs2ppIZxzWScci6LNEtia1nhgE55bJ3apwoLThU-1iSaJcfQLGelbQGhHIdlhsYFNVQr3GAYrozMlZKhtJluQ8sjIkq0SqcomsYii3JO2xCvIBLaS4q7zhZvwm0tHMKiRlg4hEWNcBsufyfNa0WN_4d3VtgL715f4s8YTv5_fQrb7lt1zaQDzcXn0p5hFrFQ59Dgw9tzbzA_r3zBtA |
linkProvider | ProQuest |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1LT9wwEB4BFaIXaKEVy6P1AW5NSRzHcQ5Vtdp2u8tLrQBpb65fOZXsAruq-FP9jczkQcWFG8oxThR9nvE3nni-ATgoTZmEJCmiXBkZoVGgz_HMR9LVclPIKIZSA2fncnQljifZZAn-dbUwdKyyWxPrhdpPHeXIjzgGHgJ36jL7OruJqGsU_V3tWmg0ZnES7v_ilu3uy_gbzu8h58Pvl4NR1HYViFwq5DzyiSptbLM4zZGeCmGEl8pJwzOlTJnlKQ9BlvSNmeKBhDJtXCph8Qo-dTLF9y7DK5Eik1Nl-vDHY04nxmBD1sqfSKSkmppPWqEjDFOKo_Fxf3DRp-Nk6jOlR6gFwaqrfbl6SotPWaGmuuEbWG9jVNZvjOotLIVqEza6_g-sXQ62IEcbY-O6zJJNS_ZrgbO0uGbNQKRENq3Yz6a8iQ1u72fzVh77HVy9CGTvYaWaVmEbmFA4LPeCl8ILZ3E745X1prDWxCbkrgfbLSK6Qh8g_dKM6zwplOgB7yDSrhUwpz4afzRtZAhh3SCsCWHdINyDT48PzRr9jueH73XY69aZ7_R_09t5_vZHWBtdnp3q0_H5yS68pvc22Zo9WJnfLsI-xi9z-6E2Gga_X9pKHwAXYvtU |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=The+impact+of+quantum+computing+on+present+cryptography&rft.jtitle=International+journal+of+advanced+computer+science+%26+applications&rft.au=Mavroeidis%2C+Vasileios&rft.au=Vishi%2C+Kamer&rft.au=Zych%2C+Mateusz+D&rft.au=J%C3%B8sang%2C+Audun&rft.date=2018&rft.pub=The+Science+and+Information+Organization&rft.issn=2158-107X&rft.eissn=2156-5570&rft_id=info:doi/10.14569%2FIJACSA.2018.090354&rft.externalDBID=n%2Fa&rft.externalDocID=10852_71984 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2158-107X&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2158-107X&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2158-107X&client=summon |