Malaysian Journal of Mathematical Sciences, August 2017, Vol. 11(S)
Special Issue: The 5th International Cryptology and Information Security Conference (New Ideas in Cryptology)


Post Quantum Cryptography

Nitaj, A.

Corresponding Email: abderrahmane.nitaj@unicaen.fr

Received date: -
Accepted date: -

Abstract:
Public key cryptography is widely used for many applications such as signing contracts, electronic voting, encryption, securing transactions over the Internet and storing sensitive data. The discovery of an efficient algorithm based on quantum mechanics for factoring large integers and computing discrete logarithms by Peter Shor in 1994 undermined the security assumptions upon which currently used public-key cryptographic algorithms are based, like RSA, El Gamal and ECC. However, some cryptosystems, called post-quantum cryptosystems, while not currently in widespread use are believed to be resistant to quantum computing based attacks. In this paper, we provide a survey of quantum and post-quantum cryptography. We review the principle of a quantum computer as well as Shor's algorithm and quantum key distribution. Then, we review some cryptosystems undermined by Shor's algorithm as well as some post-quantum cryptosystems, that are believed to resist classical and quantum computers.

Keywords: Quantum cryptography, Shor's algorithm, Quantum key distribution, Lattice reduction, LWE cryptosystem, NTRU cryptosystem

  



Indexing



















SCImago Journal & Country Rank

Flag Counter