# Post-quantum cryptography

@article{Bernstein2017PostquantumC, title={Post-quantum cryptography}, author={Daniel J. Bernstein and Tanja Lange}, journal={Nature}, year={2017}, volume={549}, pages={188-194} }

Cryptography is essential for the security of online communication, cars and implanted medical devices. However, many commonly used cryptosystems will be completely broken once large quantum computers exist. Post-quantum cryptography is cryptography under the assumption that the attacker has a large quantum computer; post-quantum cryptosystems strive to remain secure even in this scenario. This relatively young research area has seen some successes in identifying mathematical operations for…

## Topics from this paper

## 475 Citations

Quantum Cryptography: Security for the Post-Quantum world

- 2020

The predictions of quantum computing potential puts the world’s classical cryptography at risk of exploitation. Cryptographic protocols are used extensively on the World Wide Web. The…

Brief Study of Quantum Cryptography Applications

- Computer Science
- 2015

This paper is discussing possibilities of quantum cryptography applications and how many applications can use quantum cryptography as back bone like secure key distribution, secure direct communications, large prime factorization, e-commerce,e-governance, quantum internet and many more.

Post-quantum cryptography: lattice-based cryptography and analysis of NTRU public-key cryptosystem

- Art
- 2016

In 1994, Peter Shor has developed a quantum algorithm for integer factorization and the discrete logarithm problem, known as Shor’s algorithm. This was a great finding in the quantum field, given…

Quantum cryptography beyond quantum key distribution

- Mathematics, PhysicsDes. Codes Cryptogr.
- 2016

This review article, aimed primarily at cryptographers unfamiliar with the quantum world, survey the area of theoretical quantum cryptography, with an emphasis on the constructions and limitations beyond the realm of QKD.

Code-based Post-Quantum Cryptography

- Computer Science
- 2021

A review of the various post-quantum cryptography algorithms in specific, code-based cryptography research dimensions and the research directions that are yet to be explored is another key contribution of this paper.

Survey on Quantum Resist Public Key Algorithms Compatible for Java Card

- 2020

Public key cryptography is now a vital element of our global communication digital infrastructure.Most of our important communication protocols depend on primary cryptographic functionalities for…

Quantum-assisted QD-CFS signatures

- Computer Science, MathematicsJ. Comput. Syst. Sci.
- 2015

It is shown how a reasonably small quantum computer can assist in generating secure Courtois-Finiasz-Sendrier signatures based on Goppa codes, which could be a step towards a practical implementation of full-fledged cryptosystems in a truly post-quantum scenario.

Post-Quantum Cryptosystems for Internet-of-Things: A Survey on Lattice-Based Algorithms

- Computer Science
- 2021

The key aim of this survey was to provide the scientific community with comprehensive information on elementary mathematical facts, as well as to address real-time implementation, hardware architecture, open problems, attack vectors, and the significance for the IoT networks.

A practical hybrid quantum-safe cryptographic scheme between data centers

- Engineering, Computer ScienceSecurity + Defence
- 2020

The demonstration shows a first step of quantum-safe secure data transfer solution in real data center environment, with the advantages of low cost, high stability, and easy operation.

A quantum encryption scheme featuring confusion, diffusion, and mode of operation

- Physics, Computer Science
- 2020

This work proposes a non-OTP quantum encryption scheme utilizing a quantum state creation process to encrypt messages and stands out against existing methods with the following features: complex key-ciphertext relation and mode of operation design for practical encryption on multiple blocks.

## References

SHOWING 1-10 OF 71 REFERENCES

Hash-Based Signatures

- Mathematics
- 2019

This note describes a digital signature system based on cryptographic
hash functions, following the seminal work in this area of Lamport,
Diffie, Winternitz, and Merkle, as adapted by Leighton and…

The Security and Performance of the Galois/Counter Mode (GCM) of Operation

- Computer ScienceINDOCRYPT
- 2004

GCM is shown to be the most efficient mode of operation for high speed packet networks, by using a realistic model of a network crypto module and empirical data from studies of Internet traffic in conjunction with software experiments and hardware designs.

Public-Key Cryptosystem Based on Isogenies

- Computer ScienceIACR Cryptol. ePrint Arch.
- 2006

The paper describes theoretical background and a publickey encryption technique, followed by security analysis and consideration of cryptosystem parameters selection, and proposes ElGamal public-key encryption and Diffie-Hellman key agreement for an isogeny Cryptosystem.

New directions in cryptography

- Computer ScienceIEEE Trans. Inf. Theory
- 1976

This paper suggests ways to solve currently open problems in cryptography, and discusses how the theories of communication and computation are beginning to provide the tools to solve cryptographic problems of long standing.

NTRU: A Ring-Based Public Key Cryptosystem

- Computer ScienceANTS
- 1998

NTRU encryption and decryption use a mixing system suggested by polynomial algebra combined with a clustering principle based on elementary probability theory to create a new public key cryptosystem.

Applying Grover's Algorithm to AES: Quantum Resource Estimates

- Computer Science, MathematicsPQCrypto
- 2016

It is established that for all three variants of AES key size 128, 192, and 256i¾źbit that are standardized in FIPS-PUB 197, there are precise bounds for the number of qubits and thenumber of elementary logical quantum gates that are needed to implement Grover's quantum algorithm to extract the key from a small number of AES plaintext-ciphertext pairs.

Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems

- Computer ScienceCRYPTO
- 1996

By carefully measuring the amount of time required tm perform private key operalions, attackers may be able to find fixed Diffie-Hellman exponents, factor RSA keys, and break other cryptosystems.…

SPHINCS: Practical Stateless Hash-Based Signatures

- Computer ScienceEUROCRYPT
- 2014

A high-security post-quantum stateless hash-based signature scheme that signs hundreds of messages per second on a modern 4-core 3.5GHz Intel CPU, allowing it to be a drop-in replacement for current signature schemes.

McBits: Fast Constant-Time Code-Based Cryptography

- Computer ScienceCHES
- 2013

This paper presents extremely fast algorithms for code-based public-key cryptography, including full protection against timing attacks, and achieves a reciprocal decryption throughput of just 60493 cycles on a single Ivy Bridge core.

Algorithms for quantum computation: discrete logarithms and factoring

- Mathematics, Computer ScienceProceedings 35th Annual Symposium on Foundations of Computer Science
- 1994

Las Vegas algorithms for finding discrete logarithms and factoring integers on a quantum computer that take a number of steps which is polynomial in the input size, e.g., the number of digits of the integer to be factored are given.