Post Quantum Cryptography
Nitaj, A.
Corresponding Email: [email protected]
Received date: -
Accepted date: -
Abstract:
Public key cryptography is widely used for many applications such as signing contracts, electronic voting, encryption, securing transactions over the Internet and storing sensitive data. The discovery of an efficient algorithm based on quantum mechanics for factoring large integers and computing discrete logarithms by Peter Shor in 1994 undermined the security assumptions upon which currently used public-key
cryptographic algorithms are based, like RSA, El Gamal and ECC. However, some cryptosystems, called post-quantum cryptosystems, while not currently in widespread use are believed to be resistant to quantum computing based attacks. In this paper, we provide a survey of quantum and post-quantum cryptography. We review the principle of a quantum computer as well as Shor's algorithm and quantum key distribution. Then, we review some cryptosystems undermined by Shor's algorithm as well as some post-quantum cryptosystems, that are believed to resist classical and quantum computers.
Keywords: Quantum cryptography, Shor's algorithm, Quantum key distribution, Lattice reduction, LWE cryptosystem, NTRU cryptosystem