Post-quantum cryptography

@article{Bernstein2017PostquantumC,
  title={Post-quantum cryptography},
  author={Daniel J. Bernstein and Tanja Lange},
  journal={Nature},
  year={2017},
  volume={549},
  pages={188-194}
}
Cryptography is essential for the security of online communication, cars and implanted medical devices. However, many commonly used cryptosystems will be completely broken once large quantum computers exist. Post-quantum cryptography is cryptography under the assumption that the attacker has a large quantum computer; post-quantum cryptosystems strive to remain secure even in this scenario. This relatively young research area has seen some successes in identifying mathematical operations for… 

Topics from this paper

Quantum Cryptography: Security for the Post-Quantum world
  • 2020
The predictions of quantum computing potential puts the world’s classical cryptography at risk of exploitation. Cryptographic protocols are used extensively on the World Wide Web. The
Brief Study of Quantum Cryptography Applications
TLDR
This paper is discussing possibilities of quantum cryptography applications and how many applications can use quantum cryptography as back bone like secure key distribution, secure direct communications, large prime factorization, e-commerce,e-governance, quantum internet and many more.
Post-quantum cryptography: lattice-based cryptography and analysis of NTRU public-key cryptosystem
In 1994, Peter Shor has developed a quantum algorithm for integer factorization and the discrete logarithm problem, known as Shor’s algorithm. This was a great finding in the quantum field, given
Quantum cryptography beyond quantum key distribution
TLDR
This review article, aimed primarily at cryptographers unfamiliar with the quantum world, survey the area of theoretical quantum cryptography, with an emphasis on the constructions and limitations beyond the realm of QKD.
Code-based Post-Quantum Cryptography
TLDR
A review of the various post-quantum cryptography algorithms in specific, code-based cryptography research dimensions and the research directions that are yet to be explored is another key contribution of this paper.
Survey on Quantum Resist Public Key Algorithms Compatible for Java Card
Public key cryptography is now a vital element of our global communication digital infrastructure.Most of our important communication protocols depend on primary cryptographic functionalities for
Quantum-assisted QD-CFS signatures
TLDR
It is shown how a reasonably small quantum computer can assist in generating secure Courtois-Finiasz-Sendrier signatures based on Goppa codes, which could be a step towards a practical implementation of full-fledged cryptosystems in a truly post-quantum scenario.
Post-Quantum Cryptosystems for Internet-of-Things: A Survey on Lattice-Based Algorithms
TLDR
The key aim of this survey was to provide the scientific community with comprehensive information on elementary mathematical facts, as well as to address real-time implementation, hardware architecture, open problems, attack vectors, and the significance for the IoT networks.
A practical hybrid quantum-safe cryptographic scheme between data centers
TLDR
The demonstration shows a first step of quantum-safe secure data transfer solution in real data center environment, with the advantages of low cost, high stability, and easy operation.
A quantum encryption scheme featuring confusion, diffusion, and mode of operation
TLDR
This work proposes a non-OTP quantum encryption scheme utilizing a quantum state creation process to encrypt messages and stands out against existing methods with the following features: complex key-ciphertext relation and mode of operation design for practical encryption on multiple blocks.
...
1
2
3
4
5
...

References

SHOWING 1-10 OF 71 REFERENCES
Hash-Based Signatures
This note describes a digital signature system based on cryptographic hash functions, following the seminal work in this area of Lamport, Diffie, Winternitz, and Merkle, as adapted by Leighton and
The Security and Performance of the Galois/Counter Mode (GCM) of Operation
TLDR
GCM is shown to be the most efficient mode of operation for high speed packet networks, by using a realistic model of a network crypto module and empirical data from studies of Internet traffic in conjunction with software experiments and hardware designs.
Public-Key Cryptosystem Based on Isogenies
TLDR
The paper describes theoretical background and a publickey encryption technique, followed by security analysis and consideration of cryptosystem parameters selection, and proposes ElGamal public-key encryption and Diffie-Hellman key agreement for an isogeny Cryptosystem.
New directions in cryptography
TLDR
This paper suggests ways to solve currently open problems in cryptography, and discusses how the theories of communication and computation are beginning to provide the tools to solve cryptographic problems of long standing.
NTRU: A Ring-Based Public Key Cryptosystem
TLDR
NTRU encryption and decryption use a mixing system suggested by polynomial algebra combined with a clustering principle based on elementary probability theory to create a new public key cryptosystem.
Applying Grover's Algorithm to AES: Quantum Resource Estimates
TLDR
It is established that for all three variants of AES key size 128, 192, and 256i¾źbit that are standardized in FIPS-PUB 197, there are precise bounds for the number of qubits and thenumber of elementary logical quantum gates that are needed to implement Grover's quantum algorithm to extract the key from a small number of AES plaintext-ciphertext pairs.
Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems
By carefully measuring the amount of time required tm perform private key operalions, attackers may be able to find fixed Diffie-Hellman exponents, factor RSA keys, and break other cryptosystems.
SPHINCS: Practical Stateless Hash-Based Signatures
TLDR
A high-security post-quantum stateless hash-based signature scheme that signs hundreds of messages per second on a modern 4-core 3.5GHz Intel CPU, allowing it to be a drop-in replacement for current signature schemes.
McBits: Fast Constant-Time Code-Based Cryptography
TLDR
This paper presents extremely fast algorithms for code-based public-key cryptography, including full protection against timing attacks, and achieves a reciprocal decryption throughput of just 60493 cycles on a single Ivy Bridge core.
Algorithms for quantum computation: discrete logarithms and factoring
  • P. Shor
  • Mathematics, Computer Science
    Proceedings 35th Annual Symposium on Foundations of Computer Science
  • 1994
TLDR
Las Vegas algorithms for finding discrete logarithms and factoring integers on a quantum computer that take a number of steps which is polynomial in the input size, e.g., the number of digits of the integer to be factored are given.
...
1
2
3
4
5
...