Affiliation:
1. Department of Computing, School of Electrical Engineering and Computer Science, National University of Sciences and Technology, Islamabad, Pakistan
Abstract
Cryptography is used to protect sensitive information, but it is also required in many applications to ensure secure functionality and availability. The 100-year-old principles of physics are becoming industrially controllable, which leads to the era of the industrial quantum revolution. Products and applications such as quantum sensors, quantum simulators, quantum computers, and quantum cryptography are developing, which will affect the design of secure cryptographic systems. Post-quantum cryptography is a new field of research developing parallel to the progress in quantum technologies. Post-quantum cryptography deals with the development and investigation of algorithms that are assumed to be unbreakable even with quantum computers. This chapter will discuss the quantum and post-quantum cryptographic algorithms in detail and the migration strategies from classical asymmetric algorithms to post-quantum algorithms. This chapter also discusses the finance organization's readiness and recommendation for the replacement of vulnerable asymmetric algorithms with post-quantum algorithms.
Reference62 articles.
1. Quantum supremacy using a programmable superconducting processor
2. Incoherent and coherent eavesdropping in the six-state protocol of quantum cryptography.;H.Bechmann-Pasquinucci;Physical Review A.,1999
3. Quantum cryptography using any two non-orthogonal states.;C. H.Bennett;Physical Review Letters,1992
4. Strengths and Weaknesses of Quantum Computing;C. H.Bennett;SIAM Journal on Computing,1997
5. Quantum cryptography: Public key distribution and coin tossing;C. H.Bennett;Proceedings of IEEE International Conference on Computers, Systems and Signal Processing,1984