Post-Quantum Cryptography
DOI:
https://doi.org/10.56394/aris2.v2i2.17Keywords:
post-quantum, Cryptography;, PQC, quantum computingAbstract
Cryptography is used broadly in the digital age, making our communications secure, ensuring our data is safe, and enabling secure transactions on which we rely daily. Our reality is connected, we send an email without thinking about all the underlying protocols, we buy online, and we check the weather on our fridge. Utilizations are countless and so is our exposure. Cryptographic systems keep us safe, a shield for our privacy and our fundamental rights. However, we have arrived at the dawn of a new age, the quantum computing era. Seen for a long as a theoretical emanation of quantum mechanics it gives the first baby steps in the real world, making the world as we know it less safe and more dangerous. Post-quantum cryptography is the paladin that is coming to the rescue but will it be up to the challenge of keeping our world safe.
References
K. Limniotis, ‘Cryptography as the Means to Protect Fundamental Human Rights’, Cryptography, vol. 5, no. 4, p. 34, Nov. 2021, doi:10.3390/cryptography5040034. DOI: https://doi.org/10.3390/cryptography5040034
Kenny Paterson, ‘Applied_Cryptography_KA_webinar_slides.pdf’, 2021.
V. Mavroeidis, K. Vishi, M. D. Zych, and A. Jøsang, ‘The Impact of Quantum Computing on Present Cryptography’, ijacsa, vol. 9, no. 3, 2018, doi: 10.14569/IJACSA.2018.090354. DOI: https://doi.org/10.14569/IJACSA.2018.090354
Chen et al., ‘Report on Post-Quantum Cryptography’, National Institute of Standards and Technology, NIST IR 8105, Apr. 2016. doi: 10.6028/NIST.IR.8105. DOI: https://doi.org/10.6028/NIST.IR.8105
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2022 José Pinto

This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.