Quantum Cryptography

Author:

Chauhan Sonam1ORCID,Srivastava Shipra2ORCID,Singh Ramveer3,Sharma Ajay1ORCID,Ojha Deo Brat4

Affiliation:

1. SRM University, India

2. Greater Noida Institute of Technology, India

3. Galgotias College of Engineering and Technology, India

4. University of Rajasthan, India

Abstract

The world in which we live is heavily reliant on digital communications. Traditional communication methodologies have been replaced with digital communications methods such as e-mail, instant messages, social media, and many more. Every day, terabytes of data are generated and shared around the world. Securing data stored and shared across these networks have evolved into a thriving discipline. Cryptography is an excellent way to secure terabytes of data. The core of cryptography is to transform data into unreadable format. With the introduction of quantum systems, it has been proved that many traditional cryptographic schemes are unsecure and can be broken with quantum computers. This chapter presents a brief review of pre- and post-quantum systems.

Publisher

IGI Global

Reference99 articles.

1. Ajtai, M. (1996, July). Generating hard instances of lattice problems. In Proceedings of the twenty-eighth annual ACM symposium on Theory of computing (pp. 99-108). ACM. https://dl.acm.org/doi/pdf/10.1145/237814.237838

2. Alagic, G., Alperin-Sheriff, J., Apon, D., Cooper, D., Dang, Q., Kelsey, J., & Smith-Tone, D. (2020). Status report on the second round of the NIST post-quantum cryptography standardization process. US Department of Commerce, NIST, 2. https://rnbee.kiev.ua/goto/https://nvlpubs.nist.gov/nistpubs/ir/2020/NIST.IR.8309.pdf

3. Ardehali, M., Chau, H. F., & Lo, H. K. (1998). Efficient quantum key distribution. arXiv preprintquant-ph/9803007. https://link.springer.com/article/10.1007/s00145-004-0142-y

4. Avanzi, R., Bos, J., Ducas, L., Kiltz, E., Lepoint, T., Lyubashevsky, V., & Stehlé, D. (2017). Crystals-kyber. NIST, Tech. Rep. https://csrc.nist.gov/csrc/media/Presentations/2022/crystals-kyber-update/images-media/session-1-schwabe-crystals-kyber-pqc2022.pdf

5. Avanzi, R., Bos, J., Ducas, L., Kiltz, E., Lepoint, T., Lyubashevsky, V., & Stehlé, D. (2019). CRYSTALS-Kyber algorithm specifications and supporting documentation. NIST PQC Round, 2(4), 1-43. https://pq-crystals.org/kyber/data/kyber-specification-round3-20210131.pdf

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3