# Making Existing Software Quantum Safe: Lessons Learned

@article{Zhang2021MakingES, title={Making Existing Software Quantum Safe: Lessons Learned}, author={Lei Zhang and Andriy V. Miranskyy and Walid Rjaibi and Greg Stager and Michael Gray and John Peck}, journal={ArXiv}, year={2021}, volume={abs/2110.08661} }

In the era of quantum computing, Shor’s algorithm running on quantum computers (QCs) can break asymmetric encryption algorithms that classical computers essentially cannot. QCs, with the help of Grover’s algorithm, can also speed up the breaking of symmetric encryption algorithms. Though the exact date when QCs will become “dangerous” for practical problems is unknown, the consensus is that this future is near. Thus, one needs to start preparing for the era of quantum advantage and ensure…

## References

SHOWING 1-10 OF 61 REFERENCES

Report on Post-Quantum Cryptography

- Computer Science
- 2016

The National Institute of Standards and Technology (NIST)'s current understanding about the status of quantum computing and post-quantum cryptography is shared, and NIST’s initial plan to move forward is outlined.

CRYSTALS - Kyber: A CCA-Secure Module-Lattice-Based KEM

- Computer Science2018 IEEE European Symposium on Security and Privacy (EuroS&P)
- 2018

This paper introduces Kyber, a portfolio of post-quantum cryptographic primitives built around a key-encapsulation mechanism (KEM), based on hardness assumptions over module lattices, and introduces a CPA-secure public-key encryption scheme and eventually construct, in a black-box manner, CCA-secure encryption, key exchange, and authenticated-key-exchange schemes.

A Note on Quantum Security for Post-Quantum Cryptography

- Computer Science, MathematicsPQCrypto
- 2014

Shor’s quantum factoring algorithm and a few other efficient quantum algorithms break many classical crypto-systems. In response, people proposed post-quantum cryptography based on computational…

The Impact of Quantum Computing on Present Cryptography

- Computer ScienceArXiv
- 2018

The aim of this paper is to elucidate the implications
of quantum computing in present cryptography and
to introduce the reader to basic post-quantum algorithms. In
particular the reader can delve…

A fast quantum mechanical algorithm for database search

- Computer Science, PhysicsSTOC '96
- 1996

In early 1994, it was demonstrated that a quantum mechanical computer could efficiently solve a well-known problem for which there was no known efficient algorithm using classical computers, i.e. testing whether or not a given integer, N, is prime, in a time which is a finite power of o (logN) .

The security of practical quantum key distribution

- Physics
- 2009

Quantum key distribution (QKD) is the first quantum information task to reach the level of mature technology, already fit for commercialization. It aims at the creation of a secret key between…

On Testing and Debugging Quantum Software

- Computer Science, PhysicsArXiv
- 2021

Various use-cases for quantum computers, either standalone or as part of a System of Systems are discussed, and some testing and debugging tactics that one can leverage to ensure the quality of the quantum software are highlighted.

Post-quantum cryptography

- Computer Science, MedicineNature
- 2017

The central challenge in post-quantum cryptography is to meet demands for cryptographic usability and flexibility without sacrificing confidence.

Benchmarking an 11-qubit quantum computer

- Computer Science, MedicineNature Communications
- 2019

The quality of the 11-qubit fully-connected, programmable quantum computer in a trapped ion system composed of 13 171Yb+ ions is characterised by successfully computing two quantum algorithms.

Surface codes: Towards practical large-scale quantum computation

- Physics
- 2012

This article provides an introduction to surface code quantum computing. We first estimate the size and speed of a surface code quantum computer. We then introduce the concept of the stabilizer,…