Post-Quantum Cryptography

Authors

DOI:

https://doi.org/10.56394/aris2.v2i2.17

Keywords:

post-quantum, Cryptography;, PQC, quantum computing

Abstract

Cryptography is used broadly in the digital age, making our communications secure, ensuring our data is safe, and enabling secure transactions on which we rely daily. Our reality is connected, we send an email without thinking about all the underlying protocols, we buy online, and we check the weather on our fridge. Utilizations are countless and so is our exposure. Cryptographic systems keep us safe, a shield for our privacy and our fundamental rights. However, we have arrived at the dawn of a new age, the quantum computing era. Seen for a long as a theoretical emanation of quantum mechanics it gives the first baby steps in the real world, making the world as we know it less safe and more dangerous. Post-quantum cryptography is the paladin that is coming to the rescue but will it be up to the challenge of keeping our world safe.

References

K. Limniotis, ‘Cryptography as the Means to Protect Fundamental Human Rights’, Cryptography, vol. 5, no. 4, p. 34, Nov. 2021, doi:10.3390/cryptography5040034. DOI: https://doi.org/10.3390/cryptography5040034

Kenny Paterson, ‘Applied_Cryptography_KA_webinar_slides.pdf’, 2021.

V. Mavroeidis, K. Vishi, M. D. Zych, and A. Jøsang, ‘The Impact of Quantum Computing on Present Cryptography’, ijacsa, vol. 9, no. 3, 2018, doi: 10.14569/IJACSA.2018.090354. DOI: https://doi.org/10.14569/IJACSA.2018.090354

Chen et al., ‘Report on Post-Quantum Cryptography’, National Institute of Standards and Technology, NIST IR 8105, Apr. 2016. doi: 10.6028/NIST.IR.8105. DOI: https://doi.org/10.6028/NIST.IR.8105

Downloads

Published

2022-12-30

How to Cite

[1]
J. Pinto, “Post-Quantum Cryptography”, ARIS2-Journal, vol. 2, no. 2, pp. 4–16, Dec. 2022.